- Issued:
- 2017-01-17
- Updated:
- 2017-01-17
RHBA-2017:0122 - Bug Fix Advisory
Synopsis
cockpit bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated cockpit packages that fix several bugs and add various enhancements are now available for Red Hat Enterprise Linux 7 Extras.
Description
Cockpit is a server administration interface that makes it easy to administer GNU/Linux servers through a web browser.
The cockpit packages have been upgraded to upstream version 126, which provides a number of bug fixes and enhancements over the previous version. Most notable changes are:
- Show security scan information about containers.
- Display OSTree signatures on RHEL Atomic Host.
- During login users can choose whether their password is cached and reused.
- Allow renaming of active devices in the networking interface.
- More clearly indicate when checking for network connectivity.
- Allow more time for rollback when making network changes.
- The "remotectl" command can now combine certificate and key files.
- Domain join operations can now be properly canceled.
- Kerberos authentication now works even if gss-proxy is in use.
- When proxied, support for the X-Forwarded-Proto HTTP header.
- Ignore block devices with zero size in the storage interface.
- Expand logical volumes and partitions inline on their devices.
- No longer offer to format read-only block devices.
- Use stored passphrases for LUKS devices properly.
- System shutdown can be scheduled by date.
- Properly terminate user sessions on the Accounts page.
- Fixed regression on login screen in older Internet Explorer browsers.
Users of cockpit are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux Server 7 x86_64
- Red Hat Enterprise Linux Workstation 7 x86_64
Fixes
- BZ - 1403171 - Rebase Cockpit in RHEL Extras 7.3.2
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 7
SRPM | |
---|---|
cockpit-126-1.el7.src.rpm | SHA-256: ff5cdd50bf47171e4f5910ea61615db5829c1a03744c3c801acd0a5dc791755d |
x86_64 | |
cockpit-126-1.el7.x86_64.rpm | SHA-256: aceaec19ed8688e793a36ab654d6746f1a73545e3d2578b563fa465971f3ae4b |
cockpit-bridge-126-1.el7.x86_64.rpm | SHA-256: 7c2f8b247671ed1e1f9413c01ef8de8ad2ac155d57637d7447471b8d41562fb3 |
cockpit-debuginfo-126-1.el7.x86_64.rpm | SHA-256: 8ab7f72a87ba3913ca50326b4d4011bfb6b52681951b87437b92c3fc725462c9 |
cockpit-doc-126-1.el7.x86_64.rpm | SHA-256: 70c4c46386c36bd20e1ed47adf453aeff8a3517ea25e2f317ac80777949be078 |
cockpit-docker-126-1.el7.x86_64.rpm | SHA-256: e4a23f04339248be470eaf3e38aaa595106dac16be698a70768bbd9de7cdbc33 |
cockpit-pcp-126-1.el7.x86_64.rpm | SHA-256: 74f0d932d8e0e9b9426ea083349cd1aa4230316f2c71020d51bda0fd445c269c |
cockpit-shell-126-1.el7.noarch.rpm | SHA-256: 51139a347fc93a77e98c2d4e8fced18a9f117b56f1d5547cd52e9351c9ce9d0e |
cockpit-storaged-126-1.el7.noarch.rpm | SHA-256: 428cbfd361f2a95a18eee4fcb1afb313881d147440aaff14b4bcea6def8451f5 |
cockpit-ws-126-1.el7.x86_64.rpm | SHA-256: 6bd11dd6cbf7df95de0625b29b375da16aaeaa360eaf22ccfcf666d39645d50a |
Red Hat Enterprise Linux Workstation 7
SRPM | |
---|---|
cockpit-126-1.el7.src.rpm | SHA-256: ff5cdd50bf47171e4f5910ea61615db5829c1a03744c3c801acd0a5dc791755d |
x86_64 | |
cockpit-debuginfo-126-1.el7.x86_64.rpm | SHA-256: 8ab7f72a87ba3913ca50326b4d4011bfb6b52681951b87437b92c3fc725462c9 |
cockpit-doc-126-1.el7.x86_64.rpm | SHA-256: 70c4c46386c36bd20e1ed47adf453aeff8a3517ea25e2f317ac80777949be078 |
cockpit-pcp-126-1.el7.x86_64.rpm | SHA-256: 74f0d932d8e0e9b9426ea083349cd1aa4230316f2c71020d51bda0fd445c269c |
cockpit-storaged-126-1.el7.noarch.rpm | SHA-256: 428cbfd361f2a95a18eee4fcb1afb313881d147440aaff14b4bcea6def8451f5 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.