2 vulnerabilities have been found concerning HTCondor, affecting a limited number of versions.

One may allow any authenticated user to impersonate any other user on the Condor system, and potentially reconfigure the HTCondor daemons. The other may allow any authenticated user to overwrite any file.

See SVG HTCondor Advisory for more details.