- Issued:
- 2016-05-10
- Updated:
- 2016-05-10
RHBA-2016:1008 - Bug Fix Advisory
Synopsis
sos bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated sos package that fixes one bug is now available for Red Hat
Enterprise Linux 5.
Description
The sos package contains a set of utilities that gather information from system
hardware, logs, and configuration files. The information can then be used for
diagnostic purposes and debugging.
This update fixes the following bug:
- Previously, the sosreport utility generated incorrect warning messages about
the absence of gfs2 components on systems that do not use the gfs2 file system.
This update improves sosreport detection of gfs2 components, and sosreport no
longer generates these irrelevant warnings. (BZ#1153665)
Users of sos are advised to upgrade to this updated package, which fixes this
bug.
Solution
Before applying this update, make sure all previously released errata relevant
to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
sos-1.7-9.74.el5_11.src.rpm | SHA-256: f895c47a5f7b7e33c21966be9ff81d50f75a57cf028e283c005ab0fd01753e31 |
x86_64 | |
sos-1.7-9.74.el5_11.noarch.rpm | SHA-256: 36469eea4346115491c30fe2a7418aba7584cdba41035d64d3dae0901df8f5a4 |
ia64 | |
sos-1.7-9.74.el5_11.noarch.rpm | SHA-256: 36469eea4346115491c30fe2a7418aba7584cdba41035d64d3dae0901df8f5a4 |
i386 | |
sos-1.7-9.74.el5_11.noarch.rpm | SHA-256: 36469eea4346115491c30fe2a7418aba7584cdba41035d64d3dae0901df8f5a4 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
sos-1.7-9.74.el5_11.src.rpm | SHA-256: f895c47a5f7b7e33c21966be9ff81d50f75a57cf028e283c005ab0fd01753e31 |
x86_64 | |
sos-1.7-9.74.el5_11.noarch.rpm | SHA-256: 36469eea4346115491c30fe2a7418aba7584cdba41035d64d3dae0901df8f5a4 |
i386 | |
sos-1.7-9.74.el5_11.noarch.rpm | SHA-256: 36469eea4346115491c30fe2a7418aba7584cdba41035d64d3dae0901df8f5a4 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
sos-1.7-9.74.el5_11.src.rpm | SHA-256: f895c47a5f7b7e33c21966be9ff81d50f75a57cf028e283c005ab0fd01753e31 |
x86_64 | |
sos-1.7-9.74.el5_11.noarch.rpm | SHA-256: 36469eea4346115491c30fe2a7418aba7584cdba41035d64d3dae0901df8f5a4 |
i386 | |
sos-1.7-9.74.el5_11.noarch.rpm | SHA-256: 36469eea4346115491c30fe2a7418aba7584cdba41035d64d3dae0901df8f5a4 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
sos-1.7-9.74.el5_11.src.rpm | SHA-256: f895c47a5f7b7e33c21966be9ff81d50f75a57cf028e283c005ab0fd01753e31 |
s390x | |
sos-1.7-9.74.el5_11.noarch.rpm | SHA-256: 36469eea4346115491c30fe2a7418aba7584cdba41035d64d3dae0901df8f5a4 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
sos-1.7-9.74.el5_11.src.rpm | SHA-256: f895c47a5f7b7e33c21966be9ff81d50f75a57cf028e283c005ab0fd01753e31 |
ppc | |
sos-1.7-9.74.el5_11.noarch.rpm | SHA-256: 36469eea4346115491c30fe2a7418aba7584cdba41035d64d3dae0901df8f5a4 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
sos-1.7-9.74.el5_11.src.rpm | SHA-256: f895c47a5f7b7e33c21966be9ff81d50f75a57cf028e283c005ab0fd01753e31 |
x86_64 | |
sos-1.7-9.74.el5_11.noarch.rpm | SHA-256: 36469eea4346115491c30fe2a7418aba7584cdba41035d64d3dae0901df8f5a4 |
i386 | |
sos-1.7-9.74.el5_11.noarch.rpm | SHA-256: 36469eea4346115491c30fe2a7418aba7584cdba41035d64d3dae0901df8f5a4 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.