Synopsis: Critical: tog-pegasus security update Issue date: 2008-01-07 CVE Names: CVE-2008-0003 During a security audit, a stack buffer overflow flaw was found in the PAM authentication code in the OpenPegasus CIM management server. An unauthenticated remote user could trigger this flaw and potentially execute arbitrary code with root privileges. (CVE-2008-0003) Users of tog-pegasus should upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing the updated packages the tog-pegasus service should be restarted. SL 4.x SRPMS: tog-pegasus-2.5.1-5.el4_6.1.src.rpm i386: tog-pegasus-2.5.1-5.el4_6.1.i386.rpm tog-pegasus-devel-2.5.1-5.el4_6.1.i386.rpm tog-pegasus-test-2.5.1-5.el4_6.1.i386.rpm x86_64: tog-pegasus-2.5.1-5.el4.1.x86_64.rpm tog-pegasus-devel-2.5.1-5.el4.1.x86_64.rpm tog-pegasus-test-2.5.1-5.el4.1.x86_64.rpm SL 5.x SRPMS: tog-pegasus-2.6.1-2.el5_1.1.src.rpm i386: tog-pegasus-2.6.1-2.el5_1.1.i386.rpm tog-pegasus-devel-2.6.1-2.el5_1.1.i386.rpm x86_64: tog-pegasus-2.6.1-2.el5_1.1.i386.rpm tog-pegasus-2.6.1-2.el5_1.1.x86_64.rpm tog-pegasus-devel-2.6.1-2.el5_1.1.i386.rpm tog-pegasus-devel-2.6.1-2.el5_1.1.x86_64.rpm -Connie Sieh -Troy Dawson