Synopsis:	Moderate: rpm security and bug fix update
Issue date:	2010-09-07
CVE Names:	CVE-2010-2059

It was discovered that RPM did not remove setuid and setgid bits set on
binaries when upgrading packages. A local attacker able to create hard
links to binaries could use this flaw to keep those binaries on the 
system, at a specific version level and with the setuid or setgid bit 
set, even if the package providing them was upgraded by a system 
administrator. This could have security implications if a package was 
upgraded because of a security flaw in a setuid or setgid program. 
(CVE-2010-2059)

This update also fixes the following bug:

* A memory leak in the communication between RPM and the 
Security-Enhanced Linux (SELinux) subsystem, which could have caused 
extensive memory consumption. In reported cases, this issue was 
triggered by running rhn_check when errata were scheduled to be applied. 
(BZ#627630)

SL 5.x

     SRPMS:
rpm-4.4.2.3-20.el5_5.1.src.rpm
     i386:
popt-1.10.2.3-20.el5_5.1.i386.rpm
rpm-4.4.2.3-20.el5_5.1.i386.rpm
rpm-apidocs-4.4.2.3-20.el5_5.1.i386.rpm
rpm-build-4.4.2.3-20.el5_5.1.i386.rpm
rpm-devel-4.4.2.3-20.el5_5.1.i386.rpm
rpm-libs-4.4.2.3-20.el5_5.1.i386.rpm
rpm-python-4.4.2.3-20.el5_5.1.i386.rpm
     x86_64:
popt-1.10.2.3-20.el5_5.1.i386.rpm
popt-1.10.2.3-20.el5_5.1.x86_64.rpm
rpm-4.4.2.3-20.el5_5.1.x86_64.rpm
rpm-apidocs-4.4.2.3-20.el5_5.1.x86_64.rpm
rpm-build-4.4.2.3-20.el5_5.1.x86_64.rpm
rpm-devel-4.4.2.3-20.el5_5.1.i386.rpm
rpm-devel-4.4.2.3-20.el5_5.1.x86_64.rpm
rpm-libs-4.4.2.3-20.el5_5.1.i386.rpm
rpm-libs-4.4.2.3-20.el5_5.1.x86_64.rpm
rpm-python-4.4.2.3-20.el5_5.1.x86_64.rpm

-Connie Sieh
-Troy Dawson