Scientific Linux Security Update : rpm on SL5.x i386/x86_64

This script is Copyright (C) 2012 Tenable Network Security, Inc.


Synopsis :

The remote Scientific Linux host is missing one or more security
updates.

Description :

It was discovered that RPM did not remove setuid and setgid bits set
on binaries when upgrading packages. A local attacker able to create
hard links to binaries could use this flaw to keep those binaries on
the system, at a specific version level and with the setuid or setgid
bit set, even if the package providing them was upgraded by a system
administrator. This could have security implications if a package was
upgraded because of a security flaw in a setuid or setgid program.
(CVE-2010-2059)

This update also fixes the following bug :

- A memory leak in the communication between RPM and the
Security-Enhanced Linux (SELinux) subsystem, which could
have caused extensive memory consumption. In reported
cases, this issue was triggered by running rhn_check
when errata were scheduled to be applied. (BZ#627630)

See also :

http://www.nessus.org/u?78b44a8f
https://bugzilla.redhat.com/show_bug.cgi?id=627630

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 60852 ()

Bugtraq ID:

CVE ID: CVE-2010-2059