SCIENTIFIC-LINUX-ERRATA Archives

January 2008

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Troy Dawson <[log in to unmask]>
Reply To:
Troy Dawson <[log in to unmask]>
Date:
Mon, 7 Jan 2008 16:54:12 -0600
Content-Type:
text/plain
Parts/Attachments:
text/plain (42 lines)
Synopsis:	Critical: tog-pegasus security update
Issue date:	2008-01-07
CVE Names:	CVE-2008-0003

During a security audit, a stack buffer overflow flaw was found in the PAM
authentication code in the OpenPegasus CIM management server. An
unauthenticated remote user could trigger this flaw and potentially execute
arbitrary code with root privileges. (CVE-2008-0003)

Users of tog-pegasus should upgrade to these updated packages, which
contain a backported patch to resolve this issue. After installing the
updated packages the tog-pegasus service should be restarted.

SL 4.x

    SRPMS:
tog-pegasus-2.5.1-5.el4_6.1.src.rpm
    i386:
tog-pegasus-2.5.1-5.el4_6.1.i386.rpm
tog-pegasus-devel-2.5.1-5.el4_6.1.i386.rpm
tog-pegasus-test-2.5.1-5.el4_6.1.i386.rpm
    x86_64:
tog-pegasus-2.5.1-5.el4.1.x86_64.rpm
tog-pegasus-devel-2.5.1-5.el4.1.x86_64.rpm
tog-pegasus-test-2.5.1-5.el4.1.x86_64.rpm

SL 5.x

    SRPMS:
tog-pegasus-2.6.1-2.el5_1.1.src.rpm
    i386:
tog-pegasus-2.6.1-2.el5_1.1.i386.rpm
tog-pegasus-devel-2.6.1-2.el5_1.1.i386.rpm
    x86_64:
tog-pegasus-2.6.1-2.el5_1.1.i386.rpm
tog-pegasus-2.6.1-2.el5_1.1.x86_64.rpm
tog-pegasus-devel-2.6.1-2.el5_1.1.i386.rpm
tog-pegasus-devel-2.6.1-2.el5_1.1.x86_64.rpm

-Connie Sieh
-Troy Dawson

ATOM RSS1 RSS2