Subject: | |
From: | |
Reply To: | |
Date: | Tue, 7 Sep 2010 13:48:09 -0500 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Synopsis: Moderate: rpm security and bug fix update
Issue date: 2010-09-07
CVE Names: CVE-2010-2059
It was discovered that RPM did not remove setuid and setgid bits set on
binaries when upgrading packages. A local attacker able to create hard
links to binaries could use this flaw to keep those binaries on the
system, at a specific version level and with the setuid or setgid bit
set, even if the package providing them was upgraded by a system
administrator. This could have security implications if a package was
upgraded because of a security flaw in a setuid or setgid program.
(CVE-2010-2059)
This update also fixes the following bug:
* A memory leak in the communication between RPM and the
Security-Enhanced Linux (SELinux) subsystem, which could have caused
extensive memory consumption. In reported cases, this issue was
triggered by running rhn_check when errata were scheduled to be applied.
(BZ#627630)
SL 5.x
SRPMS:
rpm-4.4.2.3-20.el5_5.1.src.rpm
i386:
popt-1.10.2.3-20.el5_5.1.i386.rpm
rpm-4.4.2.3-20.el5_5.1.i386.rpm
rpm-apidocs-4.4.2.3-20.el5_5.1.i386.rpm
rpm-build-4.4.2.3-20.el5_5.1.i386.rpm
rpm-devel-4.4.2.3-20.el5_5.1.i386.rpm
rpm-libs-4.4.2.3-20.el5_5.1.i386.rpm
rpm-python-4.4.2.3-20.el5_5.1.i386.rpm
x86_64:
popt-1.10.2.3-20.el5_5.1.i386.rpm
popt-1.10.2.3-20.el5_5.1.x86_64.rpm
rpm-4.4.2.3-20.el5_5.1.x86_64.rpm
rpm-apidocs-4.4.2.3-20.el5_5.1.x86_64.rpm
rpm-build-4.4.2.3-20.el5_5.1.x86_64.rpm
rpm-devel-4.4.2.3-20.el5_5.1.i386.rpm
rpm-devel-4.4.2.3-20.el5_5.1.x86_64.rpm
rpm-libs-4.4.2.3-20.el5_5.1.i386.rpm
rpm-libs-4.4.2.3-20.el5_5.1.x86_64.rpm
rpm-python-4.4.2.3-20.el5_5.1.x86_64.rpm
-Connie Sieh
-Troy Dawson
|
|
|