-
torque (2.4.16+dfsg-1.3ubuntu1.1) trusty-security; urgency=medium
* SECURITY UPDATE: Buffer overflow vulnerability allows remote attackers
to execute arbitrary code via a large count value.
- debian/patches/CVE-2014-0749.patch: Fix stack-based buffer overflow in
disrsi_.c
- CVE-2014-0749
* SECURITY UPDATE: Lack of validation on process owner allows remote
authenticated users to kill arbitrary processes via a crafted executable.
- debian/patches/CVE-2014-3684.patch: Limit tm_adopt to only adopt a session
id that is owned by the calling user.
- CVE-2014-3684
-- Eduardo Barretto <email address hidden> Mon, 04 Feb 2019 12:00:09 -0200
-
torque (2.4.16+dfsg-1.3ubuntu1) trusty; urgency=medium
* Merge from debian. Remaining changes:
- Build using dh-autoreconf.
- Specified multiarch Tcl and Tk locations during configure,
fixing FTBFS.
torque (2.4.16+dfsg-1.3) unstable; urgency=high
* Non-maintainer upload by the Security Team.
* Add CVE-2013-4495.patch patch.
CVE-2013-4495: the pbs_server daemon would pass some user-input data to
popen() in order to send an email allowing remote privilege escalation.
(Closes: #729333)
torque (2.4.16+dfsg-1.2) unstable; urgency=low
* Non-maintainer upload.
* Add fix-FTBFS-on-kfreebsd.patch patch.
Fix FTBFS on kfreebsd-{amd64,i386} due to use of deprecated header
<nlist.h>. Switch to use <bsd/nlist.h>. (Closes: #725870)
torque (2.4.16+dfsg-1.1) unstable; urgency=low
* Non-maintainer upload.
* Add CVE-2013-4319.patch.
CVE-2013-4319: remote arbitrary command execution as root on cluster
by a non-priviledged user who is able to run jobs or login to a node
which runs pbs_server or pbs_mon. (Closes: #722306)
-- Jackson Doak <email address hidden> Tue, 17 Dec 2013 07:39:52 +1100
-
torque (2.4.16+dfsg-1ubuntu2) trusty; urgency=medium
* Build using dh-autoreocnf.
-- Matthias Klose <email address hidden> Sun, 15 Dec 2013 17:13:46 +0100
-
torque (2.4.16+dfsg-1ubuntu1) raring; urgency=low
* Specified multiarch Tcl and Tk locations during configure,
fixing FTBFS.
-- Daniel T Chen <email address hidden> Wed, 10 Apr 2013 17:36:58 -0400