torque (2.4.16+dfsg-1.3ubuntu1.1) trusty-security; urgency=medium
* SECURITY UPDATE: Buffer overflow vulnerability allows remote attackers
to execute arbitrary code via a large count value.
- debian/patches/CVE-2014-0749.patch: Fix stack-based buffer overflow in
disrsi_.c
- CVE-2014-0749
* SECURITY UPDATE: Lack of validation on process owner allows remote
authenticated users to kill arbitrary processes via a crafted executable.
- debian/patches/CVE-2014-3684.patch: Limit tm_adopt to only adopt a session
id that is owned by the calling user.
- CVE-2014-3684
Date: 2019-02-04 18:14:17.229663+00:00
Changed-By: Eduardo dos Santos Barretto <eduardo.barre...@canonical.com>
Signed-By: Ubuntu Archive Robot
<cjwatson+ubuntu-archive-ro...@chiark.greenend.org.uk>
https://launchpad.net/ubuntu/+source/torque/2.4.16+dfsg-1.3ubuntu1.1
Sorry, changesfile not available.
--
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/trusty-changes