[ubuntu/trusty-updates] torque 2.4.16+dfsg-1.3ubuntu1.1 (Accepted)
Ubuntu Archive Robot
cjwatson+ubuntu-archive-robot at chiark.greenend.org.uk
Mon Feb 4 19:28:05 UTC 2019
torque (2.4.16+dfsg-1.3ubuntu1.1) trusty-security; urgency=medium
* SECURITY UPDATE: Buffer overflow vulnerability allows remote attackers
to execute arbitrary code via a large count value.
- debian/patches/CVE-2014-0749.patch: Fix stack-based buffer overflow in
disrsi_.c
- CVE-2014-0749
* SECURITY UPDATE: Lack of validation on process owner allows remote
authenticated users to kill arbitrary processes via a crafted executable.
- debian/patches/CVE-2014-3684.patch: Limit tm_adopt to only adopt a session
id that is owned by the calling user.
- CVE-2014-3684
Date: 2019-02-04 18:14:17.229663+00:00
Changed-By: Eduardo dos Santos Barretto <eduardo.barretto at canonical.com>
Signed-By: Ubuntu Archive Robot <cjwatson+ubuntu-archive-robot at chiark.greenend.org.uk>
https://launchpad.net/ubuntu/+source/torque/2.4.16+dfsg-1.3ubuntu1.1
-------------- next part --------------
Sorry, changesfile not available.
More information about the Trusty-changes
mailing list