Synopsis: Moderate: rpm security and bug fix update Issue date: 2010-09-07 CVE Names: CVE-2010-2059 It was discovered that RPM did not remove setuid and setgid bits set on binaries when upgrading packages. A local attacker able to create hard links to binaries could use this flaw to keep those binaries on the system, at a specific version level and with the setuid or setgid bit set, even if the package providing them was upgraded by a system administrator. This could have security implications if a package was upgraded because of a security flaw in a setuid or setgid program. (CVE-2010-2059) This update also fixes the following bug: * A memory leak in the communication between RPM and the Security-Enhanced Linux (SELinux) subsystem, which could have caused extensive memory consumption. In reported cases, this issue was triggered by running rhn_check when errata were scheduled to be applied. (BZ#627630) SL 5.x SRPMS: rpm-4.4.2.3-20.el5_5.1.src.rpm i386: popt-1.10.2.3-20.el5_5.1.i386.rpm rpm-4.4.2.3-20.el5_5.1.i386.rpm rpm-apidocs-4.4.2.3-20.el5_5.1.i386.rpm rpm-build-4.4.2.3-20.el5_5.1.i386.rpm rpm-devel-4.4.2.3-20.el5_5.1.i386.rpm rpm-libs-4.4.2.3-20.el5_5.1.i386.rpm rpm-python-4.4.2.3-20.el5_5.1.i386.rpm x86_64: popt-1.10.2.3-20.el5_5.1.i386.rpm popt-1.10.2.3-20.el5_5.1.x86_64.rpm rpm-4.4.2.3-20.el5_5.1.x86_64.rpm rpm-apidocs-4.4.2.3-20.el5_5.1.x86_64.rpm rpm-build-4.4.2.3-20.el5_5.1.x86_64.rpm rpm-devel-4.4.2.3-20.el5_5.1.i386.rpm rpm-devel-4.4.2.3-20.el5_5.1.x86_64.rpm rpm-libs-4.4.2.3-20.el5_5.1.i386.rpm rpm-libs-4.4.2.3-20.el5_5.1.x86_64.rpm rpm-python-4.4.2.3-20.el5_5.1.x86_64.rpm -Connie Sieh -Troy Dawson