RHEL 6 : sos (RHSA-2016:0152)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing a security update.

Description :

An updated sos package that fixes one security issue and one bug is
now available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having Moderate
security impact. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available from the
CVE link in the References section.

The sos package contains a set of tools that gather information from
system hardware, logs and configuration files. The information can
then be used for diagnostic purposes and debugging.

An insecure temporary file use flaw was found in the way sos created
certain sosreport files. A local attacker could possibly use this flaw
to perform a symbolic link attack to reveal the contents of sosreport
files, or in some cases modify arbitrary files and escalate their
privileges on the system. (CVE-2015-7529)

This issue was discovered by Mateusz Guzik of Red Hat.

This update also fixes the following bug :

* Previously, when the hpasm plug-in ran the 'hpasmcli' command in a
Python Popen constructor or a system pipeline, the command would hang
and eventually time out after 300 seconds. Sos was forced to wait for
the time out to finish, unnecessarily prolonging its run time. With
this update, the timeout of the 'hpasmcli' command has been set to 0,
eliminating the delay and speeding up sos completion time.
(BZ#1291828)

All sos users are advised to upgrade to this updated package, which
contains backported patches to correct these issues.

See also :

https://www.redhat.com/security/data/cve/CVE-2015-7529.html
http://rhn.redhat.com/errata/RHSA-2016-0152.html

Solution :

Update the affected sos package.

Risk factor :

Medium / CVSS Base Score : 6.0
(CVSS2#AV:L/AC:H/Au:S/C:C/I:C/A:C)
CVSS Temporal Score : 4.6
(CVSS2#E:U/RL:U/RC:UC)
Public Exploit Available : false

Family: Red Hat Local Security Checks

Nessus Plugin ID: 88675 ()

Bugtraq ID:

CVE ID: CVE-2015-7529

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now