drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in OpenPBS
Name: |
Mehrere Probleme in OpenPBS |
|
ID: |
200704-04 |
|
Distribution: |
Gentoo |
|
Plattformen: |
Keine Angabe |
|
Datum: |
Mi, 4. April 2007, 00:54 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5616 |
|
Applikationen: |
OpenPBS |
|
Originalnachricht |
--kvUQC+jR9YzypDnK Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200704-04 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High Title: OpenPBS: Multiple vulnerabilities Date: April 03, 2007 Bugs: #153495 ID: 200704-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis ========
OpenPBS contains unspecified vulnerabilities which may allow for the remote execution of arbitrary code or a Denial of Service.
Background ==========
OpenPBS is the original version of the Portable Batch System. It is a flexible batch queueing system developed for NASA in the early to mid-1990s.
Affected packages =================
------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 sys-cluster/openpbs <=3D 2.3.16-r4 Vulnerable! ------------------------------------------------------------------- NOTE: Certain packages are still vulnerable. Users should migrate to another package if one is available or wait for the existing packages to be marked stable by their architecture maintainers.
Description ===========
SUSE reported vulnerabilities due to unspecified errors in OpenPBS.
Impact ======
By unspecified attack vectors an attacker might be able execute arbitrary code with the privileges of the user running openpbs, which might be the root user.
Workaround ==========
There is no known workaround at this time.
Resolution ==========
OpenPBS has been masked in the Portage tree for replacement by Torque. All OpenPBS users should unmerge OpenPBS and switch to Torque.
# emerge --ask --unmerge sys-cluster/openpbs # emerge --sync # emerge --ask --verbose sys-cluster/torque
References ==========
[ 1 ] CVE-2006-5616 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2006-5616
Availability ============
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200704-04.xml
Concerns? =========
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.
License =======
Copyright 2007 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
--kvUQC+jR9YzypDnK Content-Type: application/pgp-signature Content-Disposition: inline
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux)
iQEVAwUBRhLZRjvRww8BFPxFAQK/HQgAgjEwpBgUk0LTsgG3Gm70NA/JUQFqB2C/ UAINesnv5glTgWyFmFo1Dr1wVt1K3Wr3Fw+J6jdzs2DECJmsqbC+6XXNvZKvEELg w8GzqXOWyB53hIBbUnHaTuuA2Br7Cuq7xkJmFbpSMzfsRFckGEV9ro4c+0tY5SNP rV1bwuafLCoOw9+UOr0mXiKWRigMaAjQH7oAS1GbrROfLY1Hvm9Xd6L4w+/8NUrg /Ppokroa/v0kw4wZ6D1pQ1ZtX5AM1f1RfvP7ZLpvmFxX4BNoxGiewTJqIVkDz8g9 AkAOCqsFWNnUlwhKj0iqQN4MIP6/EgzuqHfRkZz14vs/mrH8pmF8Uw== =Girx -----END PGP SIGNATURE-----
--kvUQC+jR9YzypDnK-- -- gentoo-announce@gentoo.org mailing list
|
|
|
|