First published: Tue May 05 2015(Updated: )
It was reported that sosreport creates output files with world-readable permissions: -rw-r--r--. 1 root root 7331624 May 4 08:55 sosreport-localhost.localdomain-20150504084328.tar.xz -rw-r--r--. 1 root root 33 May 4 08:55 sosreport-localhost.localdomain-20150504084328.tar.xz.md5 The archive may consists of files originally only accessible by the root user. However, after extracting the archive, all of the files are readable by regular users with access to /var/tmp/. Acknowledgements: Red Hat would like to thank Grant Murphy for reporting this issue.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/sosreport | <3.3 | 3.3 |
Sos-collector | =3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3171 is considered to have a medium severity due to the potential exposure of sensitive information.
To fix CVE-2015-3171, upgrade to sosreport version 3.3 or later.
CVE-2015-3171 affects the sosreport tool, specifically versions below 3.3.
The main risk associated with CVE-2015-3171 is that the output files generated may contain sensitive data that is publicly readable.
CVE-2015-3171 is not typically considered remotely exploitable; it primarily pertains to local file permission issues.