A flaw was found in Cockpit. Deleting a sosreport with a crafted name via the Cockpit web interface can lead to a command injection vulnerability, resulting in privilege escalation. This issue affects Cockpit versions 270 and newer.
{
"binaries": [
{
"binary_version": "314-1",
"binary_name": "cockpit"
},
{
"binary_version": "314-1",
"binary_name": "cockpit-bridge"
},
{
"binary_version": "314-1",
"binary_name": "cockpit-bridge-dbgsym"
},
{
"binary_version": "314-1",
"binary_name": "cockpit-doc"
},
{
"binary_version": "314-1",
"binary_name": "cockpit-networkmanager"
},
{
"binary_version": "314-1",
"binary_name": "cockpit-packagekit"
},
{
"binary_version": "314-1",
"binary_name": "cockpit-pcp"
},
{
"binary_version": "314-1",
"binary_name": "cockpit-pcp-dbgsym"
},
{
"binary_version": "314-1",
"binary_name": "cockpit-sosreport"
},
{
"binary_version": "314-1",
"binary_name": "cockpit-storaged"
},
{
"binary_version": "314-1",
"binary_name": "cockpit-system"
},
{
"binary_version": "314-1",
"binary_name": "cockpit-tests"
},
{
"binary_version": "314-1",
"binary_name": "cockpit-tests-dbgsym"
},
{
"binary_version": "314-1",
"binary_name": "cockpit-ws"
},
{
"binary_version": "314-1",
"binary_name": "cockpit-ws-dbgsym"
}
],
"ubuntu_priority": "medium",
"availability": "No subscription required"
}