On Wed, Dec 28, 2011 at 07:30:10PM +0100, Moritz Mühlenhoff wrote:
> CVE_2011_2193 was fixed in DSA 2329.
> 
> The second issue, CVE-2011-2907, is still unfixed in stable.

My read of the Bugzilla log was that Redhat didn't actually "fix" the
issue, but provided a workaround, by enabling Munge support.

https://bugzilla.redhat.com/show_bug.cgi?id=713090#c6

As far as I can tell, our torque version doesn't support munge, and they
did an upgrade to 2.5.7 to provide munge support.

Even so, Munge appears to require distributing auth tokens, keys or
whatever before a munge-enabled cluster is operational, so this is quite a
change for a DSA, not to mention the version bump if we went that route.

As far as I can tell, there is no real fix, and upstream doesn't seem
interested, as they seem to be promoting munge, or claiming you should
have a firewall.

http://www.clusterresources.com/pipermail/torqueusers/2011-August/013195.html

The idea behind this is that a Torque cluster is assumed to be under
control, including all submitting hosts. If someone gains root access to
one of the hosts in the cluster, not only they can submit hosts to the
torque server, but do other fun things as well, unrelated to torque. Yes,
I think this is way a bit too much of assumption, but it seems this is
what settled the issue upstream.

Sorry, I actually had looked this up two months ago or so, but had dropped
the ball before mailing the Security team.

Jordi
-- 
Jordi Mallach Pérez  --  Debian developer     http://www.debian.org/
jo...@sindominio.net     jo...@debian.org     http://www.sindominio.net/
GnuPG public key information available at http://oskuro.net/



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to