mailing list archives
CVE request: Torque privilege escalation
From: Agostino Sarubbo <ago () gentoo org>
Date: Mon, 09 Sep 2013 12:14:51 +0200
From the torque advisory
*Vulnerability:* A non-privileged user who can run jobs or login to a
pbs_server or pbs_mom can submit an arbitrary job to the cluster; that job
can run as root. The user can submit a command directly to a pbs_mom daemon
to queue and run a job. A malicious user could use this vulnerability to
remotely execute code as root on the cluster.
*Versions Affected:* All versions of TORQUE
- The user must be logged in on a node that is already legitimately able to
contact pbs_mom daemons or submit jobs.
- If a user submits a job via this defect and pbs_server is running,
pbs_server will kill the job unless job syncing is disabled. It may take up
to 45 seconds for pbs_server to kill the job.
- There are no known instances of this vulnerability being exploited.
Gentoo Linux Developer
- CVE request: Torque privilege escalation Agostino Sarubbo (Sep 09)