Skip to navigation

Security Advisory sysreport security update

Advisory: RHSA-2005:598-04
Type: Security Advisory
Severity: Low
Issued on: 2005-08-09
Last updated on: 2005-08-09
Affected Products: Red Hat Desktop (v. 3)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Enterprise Linux WS (v. 4)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
CVEs (cve.mitre.org): CVE-2005-2104

Details

An updated sysreport package that fixes an insecure temporary file flaw is
now available.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

Sysreport is a utility that gathers information about a system's hardware
and configuration. The information can then be used for diagnostic purposes
and debugging.

Bill Stearns discovered a bug in the way sysreport creates temporary files.
It is possible that a local attacker could obtain sensitive information
about the system when sysreport is run. The Common Vulnerabilities and
Exposures project assigned the name CAN-2005-2104 to this issue.

Users of sysreport should update to this erratum package, which contains a
patch that resolves this issue.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Red Hat Desktop (v. 3)

IA-32:
sysreport-1.3.7.2-9.noarch.rpm
File outdated by:  RHBA-2007:1071
    MD5: 6f4d2d6c29e37480481c63f6926fe0bd
 
x86_64:
sysreport-1.3.7.2-9.noarch.rpm
File outdated by:  RHBA-2007:1071
    MD5: 6f4d2d6c29e37480481c63f6926fe0bd
 
Red Hat Desktop (v. 4)

IA-32:
sysreport-1.3.15-5.noarch.rpm
File outdated by:  RHBA-2006:0723
    MD5: f7f12746b9e39765250b75ccca71a9b6
 
x86_64:
sysreport-1.3.15-5.noarch.rpm
File outdated by:  RHBA-2006:0723
    MD5: f7f12746b9e39765250b75ccca71a9b6
 
Red Hat Enterprise Linux AS (v. 2.1)

IA-32:
sysreport-1.3.7.0-7.noarch.rpm
File outdated by:  RHBA-2006:0741
    MD5: daf737b43a6d4f16404f5770611c65a3
 
IA-64:
sysreport-1.3.7.0-7.noarch.rpm
File outdated by:  RHBA-2006:0741
    MD5: daf737b43a6d4f16404f5770611c65a3
 
Red Hat Enterprise Linux AS (v. 3)

IA-32:
sysreport-1.3.7.2-9.noarch.rpm
File outdated by:  RHBA-2007:1071
    MD5: 6f4d2d6c29e37480481c63f6926fe0bd
 
IA-64:
sysreport-1.3.7.2-9.noarch.rpm
File outdated by:  RHBA-2007:1071
    MD5: 6f4d2d6c29e37480481c63f6926fe0bd
 
PPC:
sysreport-1.3.7.2-9.noarch.rpm
File outdated by:  RHBA-2007:1071
    MD5: 6f4d2d6c29e37480481c63f6926fe0bd
 
s390:
sysreport-1.3.7.2-9.noarch.rpm
File outdated by:  RHBA-2007:1071
    MD5: 6f4d2d6c29e37480481c63f6926fe0bd
 
s390x:
sysreport-1.3.7.2-9.noarch.rpm
File outdated by:  RHBA-2007:1071
    MD5: 6f4d2d6c29e37480481c63f6926fe0bd
 
x86_64:
sysreport-1.3.7.2-9.noarch.rpm
File outdated by:  RHBA-2007:1071
    MD5: 6f4d2d6c29e37480481c63f6926fe0bd
 
Red Hat Enterprise Linux AS (v. 4)

IA-32:
sysreport-1.3.15-5.noarch.rpm
File outdated by:  RHBA-2006:0723
    MD5: f7f12746b9e39765250b75ccca71a9b6
 
IA-64:
sysreport-1.3.15-5.noarch.rpm
File outdated by:  RHBA-2006:0723
    MD5: f7f12746b9e39765250b75ccca71a9b6
 
PPC:
sysreport-1.3.15-5.noarch.rpm
File outdated by:  RHBA-2006:0723
    MD5: f7f12746b9e39765250b75ccca71a9b6
 
s390:
sysreport-1.3.15-5.noarch.rpm
File outdated by:  RHBA-2006:0723
    MD5: f7f12746b9e39765250b75ccca71a9b6
 
s390x:
sysreport-1.3.15-5.noarch.rpm
File outdated by:  RHBA-2006:0723
    MD5: f7f12746b9e39765250b75ccca71a9b6
 
x86_64:
sysreport-1.3.15-5.noarch.rpm
File outdated by:  RHBA-2006:0723
    MD5: f7f12746b9e39765250b75ccca71a9b6
 
Red Hat Enterprise Linux ES (v. 2.1)

IA-32:
sysreport-1.3.7.0-7.noarch.rpm
File outdated by:  RHBA-2006:0741
    MD5: daf737b43a6d4f16404f5770611c65a3
 
Red Hat Enterprise Linux ES (v. 3)

IA-32:
sysreport-1.3.7.2-9.noarch.rpm
File outdated by:  RHBA-2007:1071
    MD5: 6f4d2d6c29e37480481c63f6926fe0bd
 
IA-64:
sysreport-1.3.7.2-9.noarch.rpm
File outdated by:  RHBA-2007:1071
    MD5: 6f4d2d6c29e37480481c63f6926fe0bd
 
x86_64:
sysreport-1.3.7.2-9.noarch.rpm
File outdated by:  RHBA-2007:1071
    MD5: 6f4d2d6c29e37480481c63f6926fe0bd
 
Red Hat Enterprise Linux ES (v. 4)

IA-32:
sysreport-1.3.15-5.noarch.rpm
File outdated by:  RHBA-2006:0723
    MD5: f7f12746b9e39765250b75ccca71a9b6
 
IA-64:
sysreport-1.3.15-5.noarch.rpm
File outdated by:  RHBA-2006:0723
    MD5: f7f12746b9e39765250b75ccca71a9b6
 
x86_64:
sysreport-1.3.15-5.noarch.rpm
File outdated by:  RHBA-2006:0723
    MD5: f7f12746b9e39765250b75ccca71a9b6
 
Red Hat Enterprise Linux WS (v. 2.1)

IA-32:
sysreport-1.3.7.0-7.noarch.rpm
File outdated by:  RHBA-2006:0741
    MD5: daf737b43a6d4f16404f5770611c65a3
 
Red Hat Enterprise Linux WS (v. 3)

IA-32:
sysreport-1.3.7.2-9.noarch.rpm
File outdated by:  RHBA-2007:1071
    MD5: 6f4d2d6c29e37480481c63f6926fe0bd
 
IA-64:
sysreport-1.3.7.2-9.noarch.rpm
File outdated by:  RHBA-2007:1071
    MD5: 6f4d2d6c29e37480481c63f6926fe0bd
 
x86_64:
sysreport-1.3.7.2-9.noarch.rpm
File outdated by:  RHBA-2007:1071
    MD5: 6f4d2d6c29e37480481c63f6926fe0bd
 
Red Hat Enterprise Linux WS (v. 4)

IA-32:
sysreport-1.3.15-5.noarch.rpm
File outdated by:  RHBA-2006:0723
    MD5: f7f12746b9e39765250b75ccca71a9b6
 
IA-64:
sysreport-1.3.15-5.noarch.rpm
File outdated by:  RHBA-2006:0723
    MD5: f7f12746b9e39765250b75ccca71a9b6
 
x86_64:
sysreport-1.3.15-5.noarch.rpm
File outdated by:  RHBA-2006:0723
    MD5: f7f12746b9e39765250b75ccca71a9b6
 
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

IA-64:
sysreport-1.3.7.0-7.noarch.rpm
File outdated by:  RHBA-2006:0741
    MD5: daf737b43a6d4f16404f5770611c65a3
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

162978 - CAN-2005-2104 sysreport insecure temporary directory usage


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/