- Issued:
- 2015-04-23
- Updated:
- 2015-04-23
RHSA-2015:0884 - Security Advisory
Synopsis
Moderate: novnc security update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated novnc package that fixes one security issue is now available for
Red Hat Enterprise Linux OpenStack Platform 4.0.
Red Hat Product Security has rated this update as having Moderate security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Description
The novnc package provides a VNC client that uses HTML5 (Web Sockets,
Canvas) and includes encryption support.
It was discovered that noVNC did not properly set the 'secure' flag when
issuing cookies. An attacker could use this flaw to intercept cookies via a
man-in-the-middle attack. (CVE-2013-7436)
All novnc users are advised to upgrade to this updated package, which
corrects this issue.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat OpenStack 4.0 x86_64
Fixes
- BZ - 1193451 - CVE-2013-7436 novnc: session hijack through insecurely set session token cookies
CVEs
Red Hat OpenStack 4.0
SRPM | |
---|---|
novnc-0.5.1-2.el6ost.src.rpm | SHA-256: c56671bd69ddd08191ffcac7ca50efd53e90b76413c866ee943a3b72104cb69a |
x86_64 | |
novnc-0.5.1-2.el6ost.noarch.rpm | SHA-256: 5afe561b74c84252bfec5c83fb9d211875548d14212cb1df391a46b0fe72c62b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.