Gentoo Linux Security Advisory 201412-47 - Multiple vulnerabilities have been found in TORQUE Resource Manager, possibly resulting in escalation of privileges or remote code execution. Versions less than 4.1.7 are affected.
51a42e443e73a67f0e0416d7e5cd284c78b89ddef4d31e82cd485c179c0087a4
TORQUE Resource Manager versions 2.5.x through 2.5.13 suffer from a stack buffer overflow vulnerability.
01db40756d23f2ac4bcfe60e33e9ff8f16a701a683f0b663f33585f704651449
Debian Linux Security Advisory 2936-1 - John Fitzpatrick from MWR Labs reported a stack-based buffer overflow vulnerability in torque, a PBS-derived batch processing queueing system. An unauthenticated remote attacker could exploit this flaw to execute arbitrary code with root privileges.
000e95af2d290953506bcada622442d6062842c424e774b0871880778600207b
Torque versions 2.5.13 and below suffer from a buffer overflow vulnerability.
d70ac68760be26990412a9557c8ba8998fd61ae6ed3c065bbd16318b9e99b85a