Skip to navigation

Bug Fix Advisory sos bug fix update

Advisory: RHBA-2008:8237-2
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2008-04-08
Last updated on: 2008-04-08
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.1.z server)

Details

An updated sos package that fixes a serious bug is now available.

Sos is a set of tools that gathers information about system hardware and
configuration. The information can then be used for diagnostic purposes and
debugging. Sos is commonly used to help support technicians and developers.

This updated package addresses the following bug:

The sysreport utility did not check the report case number entered by an
administrator. If no value was provided for the case number, sysreport
derived a value from two environment variables: $LOGNAME and $HOSTNAME. As
with values entered by an administrator, the data provided by these
environment variables was not checked.

When prompted for a case number, if an administrator entered certain
invalid data -- eg " / " (a forward slash with a space character either
side) -- the sysreport script would attempt to recursively remove all
directories.

Less likely, but still possible, if no case number was provided and the
data derived from the $HOSTNAME environment variable was similarly invalid,
the same recursive attempt to remove all directories could occur.

This updated package adds a sanity check to the case number. If a case
number entered by an administrator contains anything other than numeric
characters, the entered data is not accepted and an alert noting the 'input
contains non-numeric characters!' presents.

If no case number is entered, the script now derives a case number from the
short hostname, which cannot contain a space or slash character.

All sos users should upgrade to this updated package, which fixes this bug.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188


Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
sos-1.7-9.2.el5.src.rpm
File outdated by:  RHBA-2013:1356
    MD5: 813816eec624346d1fac1675fa3de193
 
IA-32:
sos-1.7-9.2.el5.noarch.rpm
File outdated by:  RHBA-2013:1356
    MD5: 14b8ee8ab2af02e8d95e5b6d54ad8d4c
 
IA-64:
sos-1.7-9.2.el5.noarch.rpm
File outdated by:  RHBA-2013:1356
    MD5: 14b8ee8ab2af02e8d95e5b6d54ad8d4c
 
PPC:
sos-1.7-9.2.el5.noarch.rpm
File outdated by:  RHBA-2013:1356
    MD5: 14b8ee8ab2af02e8d95e5b6d54ad8d4c
 
s390x:
sos-1.7-9.2.el5.noarch.rpm
File outdated by:  RHBA-2013:1356
    MD5: 14b8ee8ab2af02e8d95e5b6d54ad8d4c
 
x86_64:
sos-1.7-9.2.el5.noarch.rpm
File outdated by:  RHBA-2013:1356
    MD5: 14b8ee8ab2af02e8d95e5b6d54ad8d4c
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
sos-1.7-9.2.el5.src.rpm
File outdated by:  RHBA-2013:1356
    MD5: 813816eec624346d1fac1675fa3de193
 
IA-32:
sos-1.7-9.2.el5.noarch.rpm
File outdated by:  RHBA-2013:1356
    MD5: 14b8ee8ab2af02e8d95e5b6d54ad8d4c
 
x86_64:
sos-1.7-9.2.el5.noarch.rpm
File outdated by:  RHBA-2013:1356
    MD5: 14b8ee8ab2af02e8d95e5b6d54ad8d4c
 
Red Hat Enterprise Linux EUS (v. 5.1.z server)

SRPMS:
sos-1.7-9.2.el5.src.rpm
File outdated by:  RHBA-2013:1356
    MD5: 813816eec624346d1fac1675fa3de193
 
IA-32:
sos-1.7-9.2.el5.noarch.rpm     MD5: 14b8ee8ab2af02e8d95e5b6d54ad8d4c
 
IA-64:
sos-1.7-9.2.el5.noarch.rpm     MD5: 14b8ee8ab2af02e8d95e5b6d54ad8d4c
 
PPC:
sos-1.7-9.2.el5.noarch.rpm     MD5: 14b8ee8ab2af02e8d95e5b6d54ad8d4c
 
s390x:
sos-1.7-9.2.el5.noarch.rpm     MD5: 14b8ee8ab2af02e8d95e5b6d54ad8d4c
 
x86_64:
sos-1.7-9.2.el5.noarch.rpm     MD5: 14b8ee8ab2af02e8d95e5b6d54ad8d4c
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

424161 - Tricking sysreport into running 'rm -rf /' critical data loss



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/