First published: Tue Nov 12 2024(Updated: )
Cockpit enables users to administer GNU/Linux servers using a web browser. It offers network configuration, log inspection, diagnostic reports, SELinux troubleshooting, interactive command-line sessions, and more.<br>Security Fix(es):<br><li> cockpit: Authenticated user can kill any process when enabling pam_env's user_readenv option (CVE-2024-6126)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Additional Changes:<br>For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.5 Release Notes linked from the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cockpit | <323.1-1.el9_5 | 323.1-1.el9_5 |
redhat/cockpit | <323.1-1.el9_5 | 323.1-1.el9_5 |
redhat/cockpit-bridge | <323.1-1.el9_5 | 323.1-1.el9_5 |
redhat/cockpit-debuginfo | <323.1-1.el9_5 | 323.1-1.el9_5 |
redhat/cockpit-debugsource | <323.1-1.el9_5 | 323.1-1.el9_5 |
redhat/cockpit-doc | <323.1-1.el9_5 | 323.1-1.el9_5 |
redhat/cockpit-packagekit | <323.1-1.el9_5 | 323.1-1.el9_5 |
redhat/cockpit-pcp | <323.1-1.el9_5 | 323.1-1.el9_5 |
redhat/cockpit-storaged | <323.1-1.el9_5 | 323.1-1.el9_5 |
redhat/cockpit-system | <323.1-1.el9_5 | 323.1-1.el9_5 |
redhat/cockpit-ws | <323.1-1.el9_5 | 323.1-1.el9_5 |
redhat/cockpit-bridge | <323.1-1.el9_5 | 323.1-1.el9_5 |
redhat/cockpit-debuginfo | <323.1-1.el9_5 | 323.1-1.el9_5 |
redhat/cockpit-debugsource | <323.1-1.el9_5 | 323.1-1.el9_5 |
redhat/cockpit-pcp | <323.1-1.el9_5 | 323.1-1.el9_5 |
redhat/cockpit-ws | <323.1-1.el9_5 | 323.1-1.el9_5 |
redhat/cockpit | <323.1-1.el9_5 | 323.1-1.el9_5 |
redhat/cockpit-bridge | <323.1-1.el9_5 | 323.1-1.el9_5 |
redhat/cockpit-debuginfo | <323.1-1.el9_5 | 323.1-1.el9_5 |
redhat/cockpit-debugsource | <323.1-1.el9_5 | 323.1-1.el9_5 |
redhat/cockpit-pcp | <323.1-1.el9_5 | 323.1-1.el9_5 |
redhat/cockpit-ws | <323.1-1.el9_5 | 323.1-1.el9_5 |
redhat/cockpit | <323.1-1.el9_5.aa | 323.1-1.el9_5.aa |
redhat/cockpit-bridge | <323.1-1.el9_5.aa | 323.1-1.el9_5.aa |
redhat/cockpit-debuginfo | <323.1-1.el9_5.aa | 323.1-1.el9_5.aa |
redhat/cockpit-debugsource | <323.1-1.el9_5.aa | 323.1-1.el9_5.aa |
redhat/cockpit-pcp | <323.1-1.el9_5.aa | 323.1-1.el9_5.aa |
redhat/cockpit-ws | <323.1-1.el9_5.aa | 323.1-1.el9_5.aa |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux Server for IBM z Systems | ||
Red Hat Enterprise Linux for ARM 64 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2024:9325 addresses vulnerabilities in Cockpit that allow authenticated users to terminate any process on the server, potentially disrupting services.
To mitigate the vulnerabilities in RHSA-2024:9325, you should update to the fixed Cockpit package version 323.1-1.el9_5.
Red Hat Enterprise Linux for x86_64, Power, IBM z Systems, and ARM 64 are affected by RHSA-2024:9325.
The Cockpit package, specifically version 323.1-1.el9_5, must be updated to resolve the vulnerabilities in RHSA-2024:9325.
Yes, related packages such as cockpit-bridge, cockpit-pcp, and cockpit-ws also need to be updated to version 323.1-1.el9_5.