[ubuntu/trusty-security] torque 2.4.16+dfsg-1.3ubuntu1.1 (Accepted)

Eduardo dos Santos Barretto eduardo.barretto at canonical.com
Mon Feb 4 18:57:13 UTC 2019


torque (2.4.16+dfsg-1.3ubuntu1.1) trusty-security; urgency=medium

  * SECURITY UPDATE: Buffer overflow vulnerability allows remote attackers
    to execute arbitrary code via a large count value.
    - debian/patches/CVE-2014-0749.patch: Fix stack-based buffer overflow in
      disrsi_.c
    - CVE-2014-0749
  * SECURITY UPDATE: Lack of validation on process owner allows remote
    authenticated users to kill arbitrary processes via a crafted executable.
    - debian/patches/CVE-2014-3684.patch: Limit tm_adopt to only adopt a session
      id that is owned by the calling user.
    - CVE-2014-3684

Date: 2019-02-04 18:14:17.229663+00:00
Changed-By: Eduardo dos Santos Barretto <eduardo.barretto at canonical.com>
https://launchpad.net/ubuntu/+source/torque/2.4.16+dfsg-1.3ubuntu1.1
-------------- next part --------------
Sorry, changesfile not available.


More information about the Trusty-changes mailing list