Описание
ELSA-2010-0679: rpm security and bug fix update (MODERATE)
[4.4.2.3-20.el5_5.1]
- make the sbits removal behavior consistent with all the RHELs
- add proper suffix for Z branch
[4.4.2.3-19]
- fix CVE-2010-2059, fails to drop SUID/SGID bits on package upgrade (#626707)
- fix SELinux memory leak (#627630), patch from Florian Festi
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
popt
1.10.2.3-20.el5_5.1
rpm
4.4.2.3-20.el5_5.1
rpm-apidocs
4.4.2.3-20.el5_5.1
rpm-build
4.4.2.3-20.el5_5.1
rpm-devel
4.4.2.3-20.el5_5.1
rpm-libs
4.4.2.3-20.el5_5.1
rpm-python
4.4.2.3-20.el5_5.1
Oracle Linux x86_64
popt
1.10.2.3-20.el5_5.1
rpm
4.4.2.3-20.el5_5.1
rpm-apidocs
4.4.2.3-20.el5_5.1
rpm-build
4.4.2.3-20.el5_5.1
rpm-devel
4.4.2.3-20.el5_5.1
rpm-libs
4.4.2.3-20.el5_5.1
rpm-python
4.4.2.3-20.el5_5.1
Oracle Linux i386
popt
1.10.2.3-20.el5_5.1
rpm
4.4.2.3-20.el5_5.1
rpm-apidocs
4.4.2.3-20.el5_5.1
rpm-build
4.4.2.3-20.el5_5.1
rpm-devel
4.4.2.3-20.el5_5.1
rpm-libs
4.4.2.3-20.el5_5.1
rpm-python
4.4.2.3-20.el5_5.1
Связанные CVE
Связанные уязвимости
lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file.
lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file.
lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and R ...
lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file.
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации