openSUSE Security Update : popt (openSUSE-SU-2010:0629-1)

This script is Copyright (C) 2010-2014 Tenable Network Security, Inc.

Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update fixes the problem where RPM misses to clear the SUID/SGID
bit of old files during package updates. (CVE-2010-2059)

Also following bugfixes were merged from SLE11 :

- make 'rpmconfigcheck status' exit with 4 [bnc#592269]

- do not use glibc for passwd/group lookups when --root is
used [bnc#536256]

- disable cpio md5 checking for repackaged rpms

- Add rpm- from
upstream (bnc#552622)

- backport lazy statfs patch [fate#302038]

- define disttag as optional tag with macro just like

- add popt-devel and rpm-devel to baselibs config

- brp-symlink: whitelist kde4 doc path (bnc#457908)

- find-supplements.ksyms: Module aliases may contain
special characters that rpm does not allow in
dependencies, such as commas. Encode those as %XX to
avoid generating broken dependencies (bnc#456695).

- Don't convert to binary.

See also :

Solution :

Update the affected popt packages.

Risk factor :

High / CVSS Base Score : 7.2

Family: SuSE Local Security Checks

Nessus Plugin ID: 49265 ()

Bugtraq ID:

CVE ID: CVE-2010-2059

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now