This script is Copyright (C) 2011-2015 Tenable Network Security, Inc.
The remote Fedora host is missing a security update.
This update fixes a buffer overflow that could allow for remote
arbitrary code execution by a torque service. Credit to Bartlomiej
Balcerek - CVE-2011-2193.
Warning: Packages previous to torque-3.0.1-4.fc15 within Fedora 15
contained the empty file /var/lib/torque/server_priv/nodes . This file
is a listing of the nodes within your torque cluster and as such it
should survive intact with upgrades. This file has now been removed
from the package with torque-3.0.1-4.fc15 but it is essential that you
backup and restore this file before and then after installing
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
See also :
Update the affected torque package.
Risk factor :
High / CVSS Base Score : 8.5
CVSS Temporal Score : 7.4
Public Exploit Available : false