openSUSE-SU-2010:0629-1 (low): rpm: Fix security problem where we miss to clear the SUID/SGID bits during package updates.
openSUSE Security Update: rpm: Fix security problem where we miss to clear the SUID/SGID bits during package updates. ______________________________________________________________________________ Announcement ID: openSUSE-SU-2010:0629-1 Rating: low References: #445037 #456695 #457908 #536256 #552622 #572280 #592269 #610941 Cross-References: CVE-2010-2059 Affected Products: openSUSE 11.1 ______________________________________________________________________________ An update that solves one vulnerability and has 7 fixes is now available. Description: This update fixes the problem where RPM misses to clear the SUID/SGID bit of old files during package updates. (CVE-2010-2059) Also following bugfixes were merged from SLE11: - make 'rpmconfigcheck status' exit with 4 [bnc#592269] - do not use glibc for passwd/group lookups when --root is used [bnc#536256] - disable cpio md5 checking for repackaged rpms [bnc#572280] - Add rpm-4.4.2.3-no-order-rescan-limit.patch from upstream (bnc#552622) - backport lazy statfs patch [fate#302038] - define disttag as optional tag with macro just like disturl - add popt-devel and rpm-devel to baselibs config (bnc#445037) - brp-symlink: whitelist kde4 doc path (bnc#457908) - find-supplements.ksyms: Module aliases may contain special characters that rpm does not allow in dependencies, such as commas. Encode those as %XX to avoid generating broken dependencies (bnc#456695). - find-debuginfo.sh: Don't convert to binary. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.1: zypper in -t patch popt-2531 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 11.1 (i586 ppc x86_64): popt-1.7-20.4.1 popt-devel-1.7-20.4.1 rpm-4.4.2.3-20.4.1 rpm-devel-4.4.2.3-20.4.1 rpm-devel-static-4.4.2.3-20.4.1 - openSUSE 11.1 (x86_64): popt-32bit-1.7-20.4.1 rpm-32bit-4.4.2.3-20.4.1 - openSUSE 11.1 (ppc): popt-64bit-1.7-20.4.1 rpm-64bit-4.4.2.3-20.4.1 References: http://support.novell.com/security/cve/CVE-2010-2059.html https://bugzilla.novell.com/445037 https://bugzilla.novell.com/456695 https://bugzilla.novell.com/457908 https://bugzilla.novell.com/536256 https://bugzilla.novell.com/552622 https://bugzilla.novell.com/572280 https://bugzilla.novell.com/592269 https://bugzilla.novell.com/610941
participants (1)
-
opensuse-security@opensuse.org