-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.1970
                          torque security update
                              28 October 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           torque
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Denial of Service -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-3684  

Original Bulletin: 
   http://www.debian.org/security/2014/dsa-3058

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running torque check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3058-1                   security@debian.org
http://www.debian.org/security/                      Salvatore Bonaccorso
October 27, 2014                       http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : torque
CVE ID         : CVE-2014-3684
Debian Bug     : 763922

Chad Vizino reported a vulnerability in torque, a PBS-derived batch
processing queueing system. A non-root user could exploit the flaw in
the tm_adopt() library call to kill any process, including root-owned
ones on any node in a job.

For the stable distribution (wheezy), this problem has been fixed in
version 2.4.16+dfsg-1+deb7u4.

For the unstable distribution (sid), this problem has been fixed in
version 2.4.16+dfsg-1.5.

We recommend that you upgrade your torque packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=ywcC
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=lr+F
-----END PGP SIGNATURE-----