Summary: | <sys-cluster/torque-2.5.9 : Authentication Bypass Vulnerability (CVE-2011-2907) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | cluster, jsbronder |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.clusterresources.com/pipermail/torqueusers/2011-August/013194.html | ||
Whiteboard: | B1 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2011-08-11 16:45:56 UTC
CVE-2011-2907 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2907): Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 3.0.1 and earlier allows remote attackers to bypass host-based authentication and submit arbitrary jobs via a modified PBS_O_HOST variable to the qsub program. Upstream says that is fixed in 2.5.9 Related: Bug 390167 Added to existing GLSA Request All vulnerable versions gone, GLSA issued? This issue was resolved and addressed in GLSA 201412-47 at http://security.gentoo.org/glsa/glsa-201412-47.xml by GLSA coordinator Yury German (BlueKnight). |