SciLinux: CVE-2008-0003 tog-pegasus SL5.x, SL4.x i386/x86_64
Summary
Date: Mon, 7 Jan 2008 16:54:12 -0600Reply-To: Troy DawsonSender: Security Errata for Scientific Linux From: Troy Dawson Subject: Security ERRATA for tog-pegasus on SL5.x, SL4.x i386/x86_64Comments: To: "scientific-linux-errata@fnal.gov" Synopsis: Critical: tog-pegasus security updateIssue date: 2008-01-07CVE Names: CVE-2008-0003During a security audit, a stack buffer overflow flaw was found in the PAMauthentication code in the OpenPegasus CIM management server. Anunauthenticated remote user could trigger this flaw and potentially executearbitrary code with root privileges. (CVE-2008-0003)Users of tog-pegasus should upgrade to these updated packages, whichcontain a backported patch to resolve this issue. After installing theupdated packages the tog-pegasus service should be restarted.SL 4.x SRPMS:tog-pegasus-2.5.1-5.el4_6.1.src.rpm i386:tog-pegasus-2.5.1-5.el4_6.1.i386.rpmtog-pegasus-devel-2.5.1-5.el4_6.1.i386.rpmtog-pegasus-test-2.5.1-5.el4_6.1.i386.rpm x86_64:tog-pegasus-2.5.1-5.el4.1.x86_64.rpmtog-pegasus-devel-2.5.1-5.el4.1.x86_64.rpmtog-pegasus-test-2.5.1-5.el4.1.x86_64.rpmSL 5.x SRPMS:tog-pegasus-2.6.1-2.el5_1.1.src.rpm i386:tog-pegasus-2.6.1-2.el5_1.1.i386.rpmtog-pegasus-devel-2.6.1-2.el5_1.1.i386.rpm x86_64:tog-pegasus-2.6.1-2.el5_1.1.i386.rpmtog-pegasus-2.6.1-2.el5_1.1.x86_64.rpmtog-pegasus-devel-2.6.1-2.el5_1.1.i386.rpmtog-pegasus-devel-2.6.1-2.el5_1.1.x86_64.rpm-Connie Sieh-Troy Dawson