SuSE 11 / 11.1 Security Update : popt (SAT Patch Numbers 2647 / 2648)

high Nessus Plugin ID 50957

Language:

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

This update fixes a security problem where RPM misses to clear the SUID/SGID bit of old files during package updates. (CVE-2010-2059)

Also the following bugs were fixed :

- make 'rpmconfigcheck status' exit with 4 [bnc#592269]

- do not use glibc for passwd/group lookups when --root is used [bnc#536256]

- disable cpio md5 checking for repackaged rpms [bnc#572280]

- Add rpm-4.4.2.3-no-order-rescan-limit.patch from upstream. (bnc#552622)

- backport lazy statfs patch [fate#302038]

- findksyms.diff: backport changes from Factory for fate#305945.

- fix v4 rsa signature verification code [bnc#615409]

Solution

Apply SAT patch number 2647 / 2648 as appropriate.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=536256

https://bugzilla.novell.com/show_bug.cgi?id=552622

https://bugzilla.novell.com/show_bug.cgi?id=572280

https://bugzilla.novell.com/show_bug.cgi?id=592269

https://bugzilla.novell.com/show_bug.cgi?id=610941

https://bugzilla.novell.com/show_bug.cgi?id=615409

http://support.novell.com/security/cve/CVE-2010-2059.html

Plugin Details

Severity: High

ID: 50957

File Name: suse_11_popt-100706.nasl

Version: 1.9

Type: local

Agent: unix

Published: 12/2/2010

Updated: 1/14/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:popt, p-cpe:/a:novell:suse_linux:11:popt-32bit, p-cpe:/a:novell:suse_linux:11:rpm, cpe:/o:novell:suse_linux:11, p-cpe:/a:novell:suse_linux:11:rpm-32bit

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 7/6/2010

Reference Information

CVE: CVE-2010-2059