Synopsis: Critical: tog-pegasus security update
Issue date: 2008-01-07
CVE Names: CVE-2008-0003
During a security audit, a stack buffer overflow flaw was found in the PAM
authentication code in the OpenPegasus CIM management server. An
unauthenticated remote user could trigger this flaw and potentially execute
arbitrary code with root privileges. (CVE-2008-0003)
Users of tog-pegasus should upgrade to these updated packages, which
contain a backported patch to resolve this issue. After installing the
updated packages the tog-pegasus service should be restarted.
SL 4.x
SRPMS:
tog-pegasus-2.5.1-5.el4_6.1.src.rpm
i386:
tog-pegasus-2.5.1-5.el4_6.1.i386.rpm
tog-pegasus-devel-2.5.1-5.el4_6.1.i386.rpm
tog-pegasus-test-2.5.1-5.el4_6.1.i386.rpm
x86_64:
tog-pegasus-2.5.1-5.el4.1.x86_64.rpm
tog-pegasus-devel-2.5.1-5.el4.1.x86_64.rpm
tog-pegasus-test-2.5.1-5.el4.1.x86_64.rpm
SL 5.x
SRPMS:
tog-pegasus-2.6.1-2.el5_1.1.src.rpm
i386:
tog-pegasus-2.6.1-2.el5_1.1.i386.rpm
tog-pegasus-devel-2.6.1-2.el5_1.1.i386.rpm
x86_64:
tog-pegasus-2.6.1-2.el5_1.1.i386.rpm
tog-pegasus-2.6.1-2.el5_1.1.x86_64.rpm
tog-pegasus-devel-2.6.1-2.el5_1.1.i386.rpm
tog-pegasus-devel-2.6.1-2.el5_1.1.x86_64.rpm
-Connie Sieh
-Troy Dawson