openSUSE Security Update : popt (openSUSE-SU-2010:0629-1)

High Nessus Plugin ID 49265


The remote openSUSE host is missing a security update.


This update fixes the problem where RPM misses to clear the SUID/SGID bit of old files during package updates. (CVE-2010-2059)

Also following bugfixes were merged from SLE11 :

- make 'rpmconfigcheck status' exit with 4 [bnc#592269]

- do not use glibc for passwd/group lookups when --root is used [bnc#536256]

- disable cpio md5 checking for repackaged rpms [bnc#572280]

- Add rpm- from upstream (bnc#552622)

- backport lazy statfs patch [fate#302038]

- define disttag as optional tag with macro just like disturl

- add popt-devel and rpm-devel to baselibs config (bnc#445037)

- brp-symlink: whitelist kde4 doc path (bnc#457908)

- find-supplements.ksyms: Module aliases may contain special characters that rpm does not allow in dependencies, such as commas. Encode those as %XX to avoid generating broken dependencies (bnc#456695).

- Don't convert to binary.


Update the affected popt packages.

See Also

Plugin Details

Severity: High

ID: 49265

File Name: suse_11_1_popt-100609.nasl

Version: $Revision: 1.3 $

Type: local

Agent: unix

Published: 2010/09/17

Modified: 2014/06/13

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:popt, p-cpe:/a:novell:opensuse:popt-32bit, p-cpe:/a:novell:opensuse:popt-devel, p-cpe:/a:novell:opensuse:rpm, p-cpe:/a:novell:opensuse:rpm-32bit, p-cpe:/a:novell:opensuse:rpm-devel, p-cpe:/a:novell:opensuse:rpm-devel-static, cpe:/o:novell:opensuse:11.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2010/06/09

Reference Information

CVE: CVE-2010-2059