Skip to navigation

Bug Fix Advisory sos bug fix and enhancement update

Advisory: RHBA-2012:0556-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-05-10
Last updated on: 2012-05-10
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.2)
Red Hat Enterprise Linux Server EUS (v. 6.2.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated sos packages that fix two bugs and add one enhancement are now available
for Red Hat Enterprise Linux 6.

The sos packages contain a set of tools that gather information from system
hardware, logs and configuration files. The information can then be used for
diagnostic purposes and debugging.

This update fixes the following bugs:

* An error in the parsing of the "brctl" command's output caused the sosreport
utility to log errors on systems with bridged network configurations. The
"sosreport" command printed a Python backtrace and certain bridge configuration
information was not collected from the system. This update corrects the parsing
of the "brctl" command's output so that no backtrace is printed and full bridge
configuration data is collected from the system. (BZ#800460)

* Previously, sos used a single fixed path to collect all libvirt logs in one
directory. On certain releases of Red Hat Enterprise Virtualization, the
libvirtd.log file could be located in the parent directory and, therefore, the
libvirtd.log file was not collected on such systems. The sosreport utility now
uses a wildcard character that matches both possible locations for the file. The
livirtd.log file is now collected reliably on all supported versions of Red Hat
Enterprise Virtualization. (BZ#817921)

This update also adds the following enhancement:

* This update adds a new plug-in that is necessary to collect the requisite logs
for the Gluster product. Information is collected from the files located in the
/etc/glusterd/ and /var/log/glusterfs/ directories. (BZ#801328)

All users of sos are advised to upgrade to this updated package, which fixes
these bugs.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat
Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
sos-2.2-17.el6_2.3.src.rpm
File outdated by:  RHBA-2013:1688
    MD5: 2b7f3068eab54c5ae4c5e90250f36b8b
SHA-256: 78aaceafddb199584b4998737635952d41f2ea1677972f8b7c9141bc7e34aa46
 
IA-32:
sos-2.2-17.el6_2.3.noarch.rpm
File outdated by:  RHBA-2013:1688
    MD5: f218a896694a33fe8d6d64fd3ce53b07
SHA-256: f1070e5a494632453c51707ce6251087aaefcb6e84f53ce633a5ab1182adbf68
 
x86_64:
sos-2.2-17.el6_2.3.noarch.rpm
File outdated by:  RHBA-2013:1688
    MD5: f218a896694a33fe8d6d64fd3ce53b07
SHA-256: f1070e5a494632453c51707ce6251087aaefcb6e84f53ce633a5ab1182adbf68
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
sos-2.2-17.el6_2.3.src.rpm
File outdated by:  RHBA-2013:1688
    MD5: 2b7f3068eab54c5ae4c5e90250f36b8b
SHA-256: 78aaceafddb199584b4998737635952d41f2ea1677972f8b7c9141bc7e34aa46
 
x86_64:
sos-2.2-17.el6_2.3.noarch.rpm
File outdated by:  RHBA-2013:1688
    MD5: f218a896694a33fe8d6d64fd3ce53b07
SHA-256: f1070e5a494632453c51707ce6251087aaefcb6e84f53ce633a5ab1182adbf68
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
sos-2.2-17.el6_2.3.src.rpm
File outdated by:  RHBA-2013:1688
    MD5: 2b7f3068eab54c5ae4c5e90250f36b8b
SHA-256: 78aaceafddb199584b4998737635952d41f2ea1677972f8b7c9141bc7e34aa46
 
IA-32:
sos-2.2-17.el6_2.3.noarch.rpm
File outdated by:  RHBA-2013:1688
    MD5: f218a896694a33fe8d6d64fd3ce53b07
SHA-256: f1070e5a494632453c51707ce6251087aaefcb6e84f53ce633a5ab1182adbf68
 
PPC:
sos-2.2-17.el6_2.3.noarch.rpm
File outdated by:  RHBA-2013:1688
    MD5: f218a896694a33fe8d6d64fd3ce53b07
SHA-256: f1070e5a494632453c51707ce6251087aaefcb6e84f53ce633a5ab1182adbf68
 
s390x:
sos-2.2-17.el6_2.3.noarch.rpm
File outdated by:  RHBA-2013:1688
    MD5: f218a896694a33fe8d6d64fd3ce53b07
SHA-256: f1070e5a494632453c51707ce6251087aaefcb6e84f53ce633a5ab1182adbf68
 
x86_64:
sos-2.2-17.el6_2.3.noarch.rpm
File outdated by:  RHBA-2013:1688
    MD5: f218a896694a33fe8d6d64fd3ce53b07
SHA-256: f1070e5a494632453c51707ce6251087aaefcb6e84f53ce633a5ab1182adbf68
 
Red Hat Enterprise Linux Server AUS (v. 6.2)

SRPMS:
sos-2.2-17.el6_2.3.src.rpm
File outdated by:  RHBA-2013:1688
    MD5: 2b7f3068eab54c5ae4c5e90250f36b8b
SHA-256: 78aaceafddb199584b4998737635952d41f2ea1677972f8b7c9141bc7e34aa46
 
x86_64:
sos-2.2-17.el6_2.3.noarch.rpm     MD5: f218a896694a33fe8d6d64fd3ce53b07
SHA-256: f1070e5a494632453c51707ce6251087aaefcb6e84f53ce633a5ab1182adbf68
 
Red Hat Enterprise Linux Server EUS (v. 6.2.z)

SRPMS:
sos-2.2-17.el6_2.3.src.rpm
File outdated by:  RHBA-2013:1688
    MD5: 2b7f3068eab54c5ae4c5e90250f36b8b
SHA-256: 78aaceafddb199584b4998737635952d41f2ea1677972f8b7c9141bc7e34aa46
 
IA-32:
sos-2.2-17.el6_2.3.noarch.rpm     MD5: f218a896694a33fe8d6d64fd3ce53b07
SHA-256: f1070e5a494632453c51707ce6251087aaefcb6e84f53ce633a5ab1182adbf68
 
PPC:
sos-2.2-17.el6_2.3.noarch.rpm     MD5: f218a896694a33fe8d6d64fd3ce53b07
SHA-256: f1070e5a494632453c51707ce6251087aaefcb6e84f53ce633a5ab1182adbf68
 
s390x:
sos-2.2-17.el6_2.3.noarch.rpm     MD5: f218a896694a33fe8d6d64fd3ce53b07
SHA-256: f1070e5a494632453c51707ce6251087aaefcb6e84f53ce633a5ab1182adbf68
 
x86_64:
sos-2.2-17.el6_2.3.noarch.rpm     MD5: f218a896694a33fe8d6d64fd3ce53b07
SHA-256: f1070e5a494632453c51707ce6251087aaefcb6e84f53ce633a5ab1182adbf68
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
sos-2.2-17.el6_2.3.src.rpm
File outdated by:  RHBA-2013:1688
    MD5: 2b7f3068eab54c5ae4c5e90250f36b8b
SHA-256: 78aaceafddb199584b4998737635952d41f2ea1677972f8b7c9141bc7e34aa46
 
IA-32:
sos-2.2-17.el6_2.3.noarch.rpm
File outdated by:  RHBA-2013:1688
    MD5: f218a896694a33fe8d6d64fd3ce53b07
SHA-256: f1070e5a494632453c51707ce6251087aaefcb6e84f53ce633a5ab1182adbf68
 
x86_64:
sos-2.2-17.el6_2.3.noarch.rpm
File outdated by:  RHBA-2013:1688
    MD5: f218a896694a33fe8d6d64fd3ce53b07
SHA-256: f1070e5a494632453c51707ce6251087aaefcb6e84f53ce633a5ab1182adbf68
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/