Low: sos security, bug fix, and enhancement update

Related Vulnerabilities: CVE-2012-2664   CVE-2012-2664  

Synopsis

Low: sos security, bug fix, and enhancement update

Type/Severity

Security Advisory: Low

Topic

An updated sos package that fixes one security issue, several bugs, and
adds various enhancements is now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

The sos package contains a set of tools that gather information from system
hardware, logs and configuration files. The information can then be used
for diagnostic purposes and debugging.

The sosreport utility collected the Kickstart configuration file
("/root/anaconda-ks.cfg"), but did not remove the root user's password from
it before adding the file to the resulting archive of debugging
information. An attacker able to access the archive could possibly use this
flaw to obtain the root user's password. "/root/anaconda-ks.cfg" usually
only contains a hash of the password, not the plain text password.
(CVE-2012-2664)

Note: This issue affected all installations, not only systems installed via
Kickstart. A "/root/anaconda-ks.cfg" file is created by all installation
types.

This updated sos package also includes numerous bug fixes and enhancements.
Space precludes documenting all of these changes in this advisory. Users
are directed to the Red Hat Enterprise Linux 6.3 Technical Notes for
information on the most significant of these changes.

All users of sos are advised to upgrade to this updated package, which
contains backported patches to correct these issues and add these
enhancements.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386

Fixes

  • BZ - 730641 - sosreport does not collect /proc/net details
  • BZ - 749262 - sosreport does not gather RHN Proxy squid logs
  • BZ - 749279 - rhn plugin should collect tomcat version 6 info, instead of obsoleted version 5
  • BZ - 749919 - teach sos to collect /etc/modprobe.d/*
  • BZ - 771393 - Sosreport fails for default values when rhn user name contains character '/' in it.
  • BZ - 771501 - capture non standard log files via syslog - fix filename regexp
  • BZ - 782589 - When copying directory into report using addCopySpec, links inside are not handled correctly
  • BZ - 784862 - sos does not collect /proc/irq
  • BZ - 784874 - sos does not collect /proc/cgroups
  • BZ - 790402 - sosreport should blank root password in anaconda plugin
  • BZ - 826884 - CVE-2012-2664 sosreport does not blank root password in anaconda plugin

CVEs

References