-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3058-1 security@debian.org http://www.debian.org/security/ Salvatore Bonaccorso October 27, 2014 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : torque CVE ID : CVE-2014-3684 Debian Bug : 763922 Chad Vizino reported a vulnerability in torque, a PBS-derived batch processing queueing system. A non-root user could exploit the flaw in the tm_adopt() library call to kill any process, including root-owned ones on any node in a job. For the stable distribution (wheezy), this problem has been fixed in version 2.4.16+dfsg-1+deb7u4. For the unstable distribution (sid), this problem has been fixed in version 2.4.16+dfsg-1.5. We recommend that you upgrade your torque packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJUTmYyAAoJEAVMuPMTQ89EkzcP/i/FJrW6JgU2oZG78EEJ63Mo 38cxSb2Yg8J6dvkx54c/2sXA3zNqYv4Qys5GL1A7+3llGP3Vne/F/twTXNJkC7n6 pbUaADaXivel4h9sOVCCeKS2Rc7ML+wZEvKEcNRRXA6KqU+3WCskspjJWQB7zN2e J8oUJIpfUPLQtBI8qqIY0vTuEEsMNS+eYFlJ44bQMVKLy5k5YNBVjfG/cVpDP1wZ qJjL75BLHav7dZ+K0wTpGujXGdleYg4PZq2w+whzMALF3Ir91KUfO5aRs3R98uTk WgZn7i0Hi5af1Yg7d3hzL3y4gVAjmlWkAiYvI3PnrTGz8AHhsStDWugHor+5DXX6 /qYZUWxVfNlZavJ2c3mCVJTgGtxuX/1ByHMLshspuGohEH6wvU8LYT5axoIax8Xm NDI84gueg/WMDsFbAphT3zSi+HsobafBVdHWQkq04qChd55n8oJrOX1SSu/U+GDa If92u/5iCjAiXPwzxV1mpEHSm9LFiBN++s9yFDk/U5xQGUuGxLoAVdg4wGL0a53S 02fOj6zF6XDSd3R8CStB7eNVMMFwtrpWPml/qgZLkPwfrnaLR6oWC7n4LeHcfeWd UmtCWyl3eOHRYL6euh4lUWXVA8PC8wyORefX5PNsn8tcErqt52D1/IgnkDHJcuGA jwLpoIcmF5bcTOpGPR/G =ywcC -----END PGP SIGNATURE-----