lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 02 Feb 2015 19:50:06 +0100
From: Sebastien Delafond <seb@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3149-1] condor security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3149-1                   security@...ian.org
http://www.debian.org/security/                        Sebastien Delafond
February 02, 2015                      http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : condor
CVE ID         : CVE-2014-8126
Debian Bug     : 775276

Florian Weimer, of Red Hat Product Security, discovered an issue in
condor, a distributed workload management system. Upon job completion,
it can optionally notify a user by sending an email; the mailx
invocation used in that process allowed for any authenticated user
able to submit jobs, to execute arbitrary code with the privileges of
the condor user.

For the stable distribution (wheezy), this problem has been fixed in
version 7.8.2~dfsg.1-1+deb7u3.

For the upcoming stable distribution (jessie) and unstable
distribution (sid), this problem has been fixed in version
8.2.3~dfsg.1-6.

We recommend that you upgrade your condor packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJUz70nAAoJEBC+iYPz1Z1kCqQH/1xCvdVHtd2cJnt+Y4iYKuvL
l2y1F220MQKr0idmbMfFoGOcLloawHguuKV9aVzpF8ONLA4SKT0glegSOQ/Q4w3U
V2qoi/pXUT2HTSHQkQZfJnOOR8dR7QN7UR2XfAfoCq+rpp5wP/rqth4y/SxwSGQF
B5bnkmfyXiThCCW2rs5V6Y8eBYc/4gPzFA4b9M5tPZ0YhKWF93R7YvYKeKgFaFGB
iTgWu4ldNSlY+5jvGEYe8aar2J9F4SCHAh5W66G2bJLiEjmlNe5hQGy+baZJUA/g
LyVtXG3oodis+qxi3DEBscdRSkkkf0LC8xqvHIiBD7Yz/dLKrHm/ju4IlkzXols=
=RLVq
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists