summaryrefslogtreecommitdiff
blob: 4c48d8de82be9e908dffbcbd188c1c783b03a770 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200611-14">
  <title>TORQUE: Insecure temporary file creation</title>
  <synopsis>
    TORQUE creates temporary files in an insecure manner which could lead to
    the execution of arbitrary code with elevated privileges.
  </synopsis>
  <product type="ebuild">torque</product>
  <announced>2006-11-20</announced>
  <revised>2006-11-24: 03</revised>
  <bug>152104</bug>
  <access>local</access>
  <affected>
    <package name="sys-cluster/torque" auto="yes" arch="*">
      <unaffected range="ge">2.1.6</unaffected>
      <vulnerable range="lt">2.1.6</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    TORQUE is a resource manager providing control over batch jobs and
    distributed compute nodes.
    </p>
  </background>
  <description>
    <p>
    TORQUE creates temporary files with predictable names. Please note that
    the TORQUE package shipped in Gentoo Portage is not vulnerable in the
    default configuration. Only systems with more permissive access rights
    to the spool directory are vulnerable.
    </p>
  </description>
  <impact type="high">
    <p>
    A local attacker could create links in the temporary file directory,
    pointing to a valid file somewhere on the filesystem. This could lead
    to the execution of arbitrary code with elevated privileges.
    </p>
  </impact>
  <workaround>
    <p>
    Ensure that untrusted users don't have write access to the spool
    directory.
    </p>
  </workaround>
  <resolution>
    <p>
    All TORQUE users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=sys-cluster/torque-2.1.6"</code>
  </resolution>
  <references>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5677">CVE-2006-5677</uri>
  </references>
  <metadata tag="requester" timestamp="2006-11-15T20:45:04Z">
    vorlon
  </metadata>
  <metadata tag="bugReady" timestamp="2006-11-16T11:48:29Z">
    vorlon
  </metadata>
  <metadata tag="submitter" timestamp="2006-11-20T08:31:55Z">
    jaervosz
  </metadata>
</glsa>