Mailinglist Archive: opensuse-updates (59 mails)

< Previous Next >
openSUSE-SU-2010:0629-1 (low): rpm: Fix security problem where we miss to clear the SUID/SGID bits during package updates.
  • From: opensuse-security@xxxxxxxxxxxx
  • Date: Thu, 16 Sep 2010 18:08:16 +0200 (CEST)
  • Message-id: <20100916160816.F18E0BE37@xxxxxxxxxxxxxx>
openSUSE Security Update: rpm: Fix security problem where we miss to clear
the SUID/SGID bits during package updates.
______________________________________________________________________________

Announcement ID: openSUSE-SU-2010:0629-1
Rating: low
References: #445037 #456695 #457908 #536256 #552622 #572280
#592269 #610941
Cross-References: CVE-2010-2059
Affected Products:
openSUSE 11.1
______________________________________________________________________________

An update that solves one vulnerability and has 7 fixes is
now available.

Description:

This update fixes the problem where RPM misses to clear the
SUID/SGID bit of old files during package updates.
(CVE-2010-2059)

Also following bugfixes were merged from SLE11:
- make 'rpmconfigcheck status' exit with 4 [bnc#592269]
- do not use glibc for passwd/group lookups when --root is
used [bnc#536256]
- disable cpio md5 checking for repackaged rpms [bnc#572280]
- Add rpm-4.4.2.3-no-order-rescan-limit.patch from
upstream (bnc#552622)
- backport lazy statfs patch [fate#302038]
- define disttag as optional tag with macro just like
disturl
- add popt-devel and rpm-devel to baselibs config
(bnc#445037)
- brp-symlink: whitelist kde4 doc path (bnc#457908)
- find-supplements.ksyms: Module aliases may contain
special characters that rpm does not allow in
dependencies, such as commas. Encode those as %XX to
avoid generating broken dependencies (bnc#456695).
- find-debuginfo.sh: Don't convert to binary.


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 11.1:

zypper in -t patch popt-2531

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 11.1 (i586 ppc x86_64):

popt-1.7-20.4.1
popt-devel-1.7-20.4.1
rpm-4.4.2.3-20.4.1
rpm-devel-4.4.2.3-20.4.1
rpm-devel-static-4.4.2.3-20.4.1

- openSUSE 11.1 (x86_64):

popt-32bit-1.7-20.4.1
rpm-32bit-4.4.2.3-20.4.1

- openSUSE 11.1 (ppc):

popt-64bit-1.7-20.4.1
rpm-64bit-4.4.2.3-20.4.1


References:

http://support.novell.com/security/cve/CVE-2010-2059.html
https://bugzilla.novell.com/445037
https://bugzilla.novell.com/456695
https://bugzilla.novell.com/457908
https://bugzilla.novell.com/536256
https://bugzilla.novell.com/552622
https://bugzilla.novell.com/572280
https://bugzilla.novell.com/592269
https://bugzilla.novell.com/610941


< Previous Next >
This Thread
  • No further messages