cockpit-264.1-1.el8.ML.1

エラータID: AXSA:2022-3632:04

Release date: 
Friday, July 29, 2022 - 07:30
Subject: 
cockpit-264.1-1.el8.ML.1
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
Moderate
Description: 

Cockpit enables users to administer GNU/Linux servers using a web browser. It offers network configuration, log inspection, diagnostic reports, SELinux troubleshooting, interactive command-line sessions, and more.

The following packages have been upgraded to a later upstream version: cockpit (264.1).

Security Fix(es):

* cockpit: authenticates with revoked certificates (CVE-2021-3698)
* cockpit: pages vulnerable to clickjacking (CVE-2021-3660)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2021-3660
Cockpit (and its plugins) do not seem to protect itself against clickjacking. It is possible to render a page from a cockpit server via another website, inside an iFrame HTML entry. This may be used by a malicious website in clickjacking or similar attacks.
CVE-2021-3698
A flaw was found in Cockpit in versions prior to 260 in the way it handles the certificate verification performed by the System Security Services Daemon (SSSD). This flaw allows client certificates to authenticate successfully, regardless of the Certificate Revocation List (CRL) configuration or the certificate status. The highest threat from this vulnerability is to confidentiality.

CVE:
CVE-2021-3660
Cockpit (and its plugins) do not seem to protect itself against clickjacking. It is possible to render a page from a cockpit server via another website, inside an iFrame HTML entry. This may be used by a malicious website in clickjacking or similar attacks.

CVE-2021-3698
A flaw was found in Cockpit in versions prior to 260 in the way it handles the certificate verification performed by the System Security Services Daemon (SSSD). This flaw allows client certificates to authenticate successfully, regardless of the Certificate Revocation List (CRL) configuration or the certificate status. The highest threat from this vulnerability is to confidentiality.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. cockpit-264.1-1.el8.ML.1.src.rpm
    MD5: a2c703a574805bc16156914797643b48
    SHA-256: dba176a0380bd40cefe021e6cd609cc29a42e36f694cec4c680819962ac82a84
    Size: 8.40 MB

Asianux Server 8 for x86_64
  1. cockpit-264.1-1.el8.ML.1.x86_64.rpm
    MD5: fb3b2e827bf39a75d4c6eb6cd04787db
    SHA-256: e1157050379944a25e7073e968a5621ee43955374a4adec3333a171df392da46
    Size: 77.77 kB
  2. cockpit-bridge-264.1-1.el8.ML.1.x86_64.rpm
    MD5: b2ec9d548b0ec99fbd4b3807b1ce2433
    SHA-256: fdb768266d9788529e6e0cd6af32caffc5d61957ad255e84538af7c1cd4ed2c1
    Size: 533.42 kB
  3. cockpit-doc-264.1-1.el8.ML.1.noarch.rpm
    MD5: 3f164dc20e22016764207b858f8e58ce
    SHA-256: e250ee49c52a9a43e25e87abe3893ae6192320f0cfcde9e300d51a4a2a460d12
    Size: 185.30 kB
  4. cockpit-system-264.1-1.el8.ML.1.noarch.rpm
    MD5: 426d601352fdeda2d59fc82775bbcec1
    SHA-256: db248ae12c1141a55b9f1d5a76679d0473c180af8f5d2d6537a75ba7bcc7b1c4
    Size: 3.22 MB
  5. cockpit-ws-264.1-1.el8.ML.1.x86_64.rpm
    MD5: 1f95bcf8bb305ff756c4589879c16989
    SHA-256: a417a638ebd87af844a08aa773b138f4ad8f1753ff9b955886d1b90ac208dfe9
    Size: 1.34 MB