DSA-2796-1 torque -- arbitrary code execution

Related Vulnerabilities: CVE-2013-4495  

Matt Ezell from Oak Ridge National Labs reported a vulnerability in torque, a PBS-derived batch processing queueing system. A user could submit executable shell commands on the tail of what is passed with the -M switch for qsub. This was later passed to a pipe, making it possible for these commands to be executed as root on the pbs_server. For the oldstable distribution (squeeze), this problem has been fixed in version 2.4.8+dfsg-9squeeze3. For the stable distribution (wheezy), this problem has been fixed in version 2.4.16+dfsg-1+deb7u2. For the unstable distribution (sid), this problem has been fixed in version 2.4.16+dfsg-1.3. We recommend that you upgrade your torque packages.

Debian Security Advisory

DSA-2796-1 torque -- arbitrary code execution

Date Reported:
13 Nov 2013
Affected Packages:
torque
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 729333.
In Mitre's CVE dictionary: CVE-2013-4495.
More information:

Matt Ezell from Oak Ridge National Labs reported a vulnerability in torque, a PBS-derived batch processing queueing system.

A user could submit executable shell commands on the tail of what is passed with the -M switch for qsub. This was later passed to a pipe, making it possible for these commands to be executed as root on the pbs_server.

For the oldstable distribution (squeeze), this problem has been fixed in version 2.4.8+dfsg-9squeeze3.

For the stable distribution (wheezy), this problem has been fixed in version 2.4.16+dfsg-1+deb7u2.

For the unstable distribution (sid), this problem has been fixed in version 2.4.16+dfsg-1.3.

We recommend that you upgrade your torque packages.