[ubuntu/trusty-security] torque 2.4.16+dfsg-1.3ubuntu1.1 (Accepted)
Eduardo dos Santos Barretto
eduardo.barretto at canonical.com
Mon Feb 4 18:57:13 UTC 2019
torque (2.4.16+dfsg-1.3ubuntu1.1) trusty-security; urgency=medium
* SECURITY UPDATE: Buffer overflow vulnerability allows remote attackers
to execute arbitrary code via a large count value.
- debian/patches/CVE-2014-0749.patch: Fix stack-based buffer overflow in
disrsi_.c
- CVE-2014-0749
* SECURITY UPDATE: Lack of validation on process owner allows remote
authenticated users to kill arbitrary processes via a crafted executable.
- debian/patches/CVE-2014-3684.patch: Limit tm_adopt to only adopt a session
id that is owned by the calling user.
- CVE-2014-3684
Date: 2019-02-04 18:14:17.229663+00:00
Changed-By: Eduardo dos Santos Barretto <eduardo.barretto at canonical.com>
https://launchpad.net/ubuntu/+source/torque/2.4.16+dfsg-1.3ubuntu1.1
-------------- next part --------------
Sorry, changesfile not available.
More information about the Trusty-changes
mailing list