First published: Tue Aug 14 2012(Updated: )
Florian Weimer of the Red Hat Product Security Team discovered that the ability to abort a job in Condor only required WRITE authorization, instead of a combination of WRITE authorization and job ownership. This could allow an authenticated attacker to bypass intended restrictions and abort any idle job on the system.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/condor | <7.6.10 | 7.6.10 |
redhat/condor | <7.8.4 | 7.8.4 |
wisc HTCondor | =7.6.0 | |
wisc HTCondor | =7.6.1 | |
wisc HTCondor | =7.6.2 | |
wisc HTCondor | =7.6.3 | |
wisc HTCondor | =7.6.4 | |
wisc HTCondor | =7.6.5 | |
wisc HTCondor | =7.6.6 | |
wisc HTCondor | =7.6.7 | |
wisc HTCondor | =7.6.8 | |
wisc HTCondor | =7.6.9 | |
wisc HTCondor | =7.8.0 | |
wisc HTCondor | =7.8.1 | |
wisc HTCondor | =7.8.2 | |
wisc HTCondor | =7.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.