openSUSE Security Update : popt (openSUSE-SU-2010:0629-1)

This script is Copyright (C) 2010-2014 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update fixes the problem where RPM misses to clear the SUID/SGID
bit of old files during package updates. (CVE-2010-2059)

Also following bugfixes were merged from SLE11 :

- make 'rpmconfigcheck status' exit with 4 [bnc#592269]

- do not use glibc for passwd/group lookups when --root is
used [bnc#536256]

- disable cpio md5 checking for repackaged rpms
[bnc#572280]

- Add rpm-4.4.2.3-no-order-rescan-limit.patch from
upstream (bnc#552622)

- backport lazy statfs patch [fate#302038]

- define disttag as optional tag with macro just like
disturl

- add popt-devel and rpm-devel to baselibs config
(bnc#445037)

- brp-symlink: whitelist kde4 doc path (bnc#457908)

- find-supplements.ksyms: Module aliases may contain
special characters that rpm does not allow in
dependencies, such as commas. Encode those as %XX to
avoid generating broken dependencies (bnc#456695).

- find-debuginfo.sh: Don't convert to binary.

See also :

http://lists.opensuse.org/opensuse-updates/2010-09/msg00028.html
https://bugzilla.novell.com/show_bug.cgi?id=445037
https://bugzilla.novell.com/show_bug.cgi?id=456695
https://bugzilla.novell.com/show_bug.cgi?id=457908
https://bugzilla.novell.com/show_bug.cgi?id=536256
https://bugzilla.novell.com/show_bug.cgi?id=552622
https://bugzilla.novell.com/show_bug.cgi?id=572280
https://bugzilla.novell.com/show_bug.cgi?id=592269
https://bugzilla.novell.com/show_bug.cgi?id=610941

Solution :

Update the affected popt packages.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

Family: SuSE Local Security Checks

Nessus Plugin ID: 49265 ()

Bugtraq ID:

CVE ID: CVE-2010-2059

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now