A flaw was found in the cockpit package. This flaw allows an authenticated user to kill any process when enabling the pamenv's userreadenv option, which leads to a denial of service (DoS) attack.
{ "binaries": [ { "binary_name": "cockpit", "binary_version": "324-1" }, { "binary_name": "cockpit-bridge", "binary_version": "324-1" }, { "binary_name": "cockpit-bridge-dbgsym", "binary_version": "324-1" }, { "binary_name": "cockpit-doc", "binary_version": "324-1" }, { "binary_name": "cockpit-networkmanager", "binary_version": "324-1" }, { "binary_name": "cockpit-packagekit", "binary_version": "324-1" }, { "binary_name": "cockpit-sosreport", "binary_version": "324-1" }, { "binary_name": "cockpit-storaged", "binary_version": "324-1" }, { "binary_name": "cockpit-system", "binary_version": "324-1" }, { "binary_name": "cockpit-tests", "binary_version": "324-1" }, { "binary_name": "cockpit-tests-dbgsym", "binary_version": "324-1" }, { "binary_name": "cockpit-ws", "binary_version": "324-1" }, { "binary_name": "cockpit-ws-dbgsym", "binary_version": "324-1" } ], "availability": "No subscription required", "ubuntu_priority": "medium" }