- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200704-04 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: OpenPBS: Multiple vulnerabilities Date: April 03, 2007 Bugs: #153495 ID: 200704-04 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== OpenPBS contains unspecified vulnerabilities which may allow for the remote execution of arbitrary code or a Denial of Service. Background ========== OpenPBS is the original version of the Portable Batch System. It is a flexible batch queueing system developed for NASA in the early to mid-1990s. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 sys-cluster/openpbs <= 2.3.16-r4 Vulnerable! ------------------------------------------------------------------- NOTE: Certain packages are still vulnerable. Users should migrate to another package if one is available or wait for the existing packages to be marked stable by their architecture maintainers. Description =========== SUSE reported vulnerabilities due to unspecified errors in OpenPBS. Impact ====== By unspecified attack vectors an attacker might be able execute arbitrary code with the privileges of the user running openpbs, which might be the root user. Workaround ========== There is no known workaround at this time. Resolution ========== OpenPBS has been masked in the Portage tree for replacement by Torque. All OpenPBS users should unmerge OpenPBS and switch to Torque. # emerge --ask --unmerge sys-cluster/openpbs # emerge --sync # emerge --ask --verbose sys-cluster/torque References ========== [ 1 ] CVE-2006-5616 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5616 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200704-04.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@xxxxxxxxxx or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2007 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5
Attachment:
pgp6uvZ6pg9GE.pgp
Description: PGP signature
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/