Lucene search

K
centosCentOS ProjectCESA-2010:0678
HistorySep 08, 2010 - 10:45 p.m.

popt, rpm security update

2010-09-0822:45:33
CentOS Project
lists.centos.org
46

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

9.3%

CentOS Errata and Security Advisory CESA-2010:0678

The RPM Package Manager (RPM) is a command line driven package management
system capable of installing, uninstalling, verifying, querying, and
updating software packages.

It was discovered that RPM did not remove setuid and setgid bits set on
binaries when upgrading or removing packages. A local attacker able to
create hard links to binaries could use this flaw to keep those binaries on
the system, at a specific version level and with the setuid or setgid bit
set, even if the package providing them was upgraded or removed by a system
administrator. This could have security implications if a package was
upgraded or removed because of a security flaw in a setuid or setgid
program. (CVE-2005-4889, CVE-2010-2059)

All users of rpm are advised to upgrade to these updated packages, which
contain a backported patch to correct these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2010-September/079128.html
https://lists.centos.org/pipermail/centos-announce/2010-September/079129.html

Affected packages:
popt
rpm
rpm-build
rpm-devel
rpm-libs
rpm-python

Upstream details at:
https://access.redhat.com/errata/RHSA-2010:0678

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

9.3%