Scientific Linux Security Update : rpm on SL5.x i386/x86_64

This script is Copyright (C) 2012 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

It was discovered that RPM did not remove setuid and setgid bits set
on binaries when upgrading packages. A local attacker able to create
hard links to binaries could use this flaw to keep those binaries on
the system, at a specific version level and with the setuid or setgid
bit set, even if the package providing them was upgraded by a system
administrator. This could have security implications if a package was
upgraded because of a security flaw in a setuid or setgid program.

This update also fixes the following bug :

- A memory leak in the communication between RPM and the
Security-Enhanced Linux (SELinux) subsystem, which could
have caused extensive memory consumption. In reported
cases, this issue was triggered by running rhn_check
when errata were scheduled to be applied. (BZ#627630)

See also :

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.2

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 60852 ()

Bugtraq ID:

CVE ID: CVE-2010-2059