lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 5 Apr 2016 20:09:47 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3543-1] oar security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3543-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
April 05, 2016                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : oar
CVE ID         : CVE-2016-1235

Emmanuel Thome discovered that missing sanitising in the oarsh command
of OAR, a software used to manage jobs and resources of HPC clusters,
could result in privilege escalation.

For the oldstable distribution (wheezy), this problem has been fixed
in version 2.5.2-3+deb7u1.

For the stable distribution (jessie), this problem has been fixed in
version 2.5.4-2+deb8u1.

For the unstable distribution (sid), this problem has been fixed in
version 2.5.7-1.

We recommend that you upgrade your oar packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=8ILD
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ