torque (2.4.16+dfsg-1.3ubuntu1.1) trusty-security; urgency=medium

  * SECURITY UPDATE: Buffer overflow vulnerability allows remote attackers
    to execute arbitrary code via a large count value.
    - debian/patches/CVE-2014-0749.patch: Fix stack-based buffer overflow in
      disrsi_.c
    - CVE-2014-0749
  * SECURITY UPDATE: Lack of validation on process owner allows remote
    authenticated users to kill arbitrary processes via a crafted executable.
    - debian/patches/CVE-2014-3684.patch: Limit tm_adopt to only adopt a session
      id that is owned by the calling user.
    - CVE-2014-3684

Date: 2019-02-04 18:14:17.229663+00:00
Changed-By: Eduardo dos Santos Barretto <eduardo.barre...@canonical.com>
Signed-By: Ubuntu Archive Robot 
<cjwatson+ubuntu-archive-ro...@chiark.greenend.org.uk>
https://launchpad.net/ubuntu/+source/torque/2.4.16+dfsg-1.3ubuntu1.1
Sorry, changesfile not available.
-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes

Reply via email to