sosreport in SoS 3.x allows local users to obtain sensitive information from sosreport files or gain privileges via a symlink attack on an archive file in a temporary directory, as demonstrated by sosreport-$hostname-$date.tar in /tmp/sosreport-$hostname-$date.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Sos | Sos_project | 3.0 (including) | 3.8 (including) |
| Red Hat Enterprise Linux 6 | RedHat | sos-0:3.2-28.el6_7.2 | * |
| Red Hat Enterprise Linux 7 | RedHat | sos-0:3.2-35.el7_2.3 | * |
| Sosreport | Ubuntu | esm-infra-legacy/trusty | * |
| Sosreport | Ubuntu | trusty | * |
| Sosreport | Ubuntu | trusty/esm | * |
| Sosreport | Ubuntu | upstream | * |
| Sosreport | Ubuntu | vivid | * |
| Sosreport | Ubuntu | wily | * |