openSUSE Security Update : rpm (openSUSE-SU-2010:0627-1)

high Nessus Plugin ID 49267

Language:

New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote openSUSE host is missing a security update.

Description

This update fixes the problem where RPM misses to clear the SUID/SGID bit of old files during package updates. (CVE-2010-2059)

Also following bugs were fixed :

- backport nosource/nopatch srpm tag generation fix

- backport spurious tar message fix [bnc#558475]

- do not use glibc for passwd/group lookups when --root is used [bnc#536256]

- disable cpio md5 checking for repackaged rpms [bnc#572280]

- fix endless loop when rpm database lock fails

Solution

Update the affected rpm packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=536256

https://bugzilla.novell.com/show_bug.cgi?id=558475

https://bugzilla.novell.com/show_bug.cgi?id=572280

https://bugzilla.novell.com/show_bug.cgi?id=610941

https://lists.opensuse.org/opensuse-updates/2010-09/msg00027.html

Plugin Details

Severity: High

ID: 49267

File Name: suse_11_2_rpm-100609.nasl

Version: 1.7

Type: local

Agent: unix

Published: 9/17/2010

Updated: 1/14/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:rpm, p-cpe:/a:novell:opensuse:rpm-32bit, p-cpe:/a:novell:opensuse:rpm-devel, cpe:/o:novell:opensuse:11.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 6/9/2010

Reference Information

CVE: CVE-2010-2059