Pitzer

AutoDock

AutoDock is a a suite of automated docking tools. It is designed to predict how small molecules, such as substrates or drug candidates, bind to a receptor of known 3D structure. AutoDock has applications in X-ray crystallography, structure-based drug design, lead optimization, etc.

Rolling reboot of Pitzer, Owens and Ascend, starting at 9am 06/06

A vulnerability, CVE-2024-27322, in the R programming language that affects the serialization and deserialization process in the R programming language prior to version 4.4.0 is discovered. This vulnerability can be exploited through R Data Serialization files or R packages, which are often shared between developers and data scientists. An attacker can create malicious RDS files or R packages containing embedded arbitrary R code that executes on the victim's target device upon interaction. R addresses the vulnerability starting from version 4.4.0.

Vulnerability in R Programming language

A vulnerability, CVE-2024-27322, in the R programming language that affects the serialization and deserialization process in the R programming language prior to version 4.4.0 is discovered. This vulnerability can be exploited through R Data Serialization (RDS) files or R packages, which are often shared between developers and data scientists. R addresses the vulnerability starting from version 4.4.0. We have installed R 4.4.0 on all clusters and recommend using R/4.4.0. Please limit package use to trusted sources.

System Downtime May 7 2024

A downtime for OSC HPC systems is scheduled from 7 a.m. to 9 p.m., Tuesday, May 7 2024. The downtime will affect the Pitzer, Owens and Ascend Clusters, web portals, and HPC file servers. The state-wide licenses and MyOSC (the client portal) will be available during the downtime. In preparation for the downtime, the batch scheduler will not start jobs that cannot be completed before 7 a.m., May 7. Jobs that are not started on clusters will be held until after the downtime and then started once the system is returned to production status.

Phishing Alert

OSC has been made aware that our website(www.osc.edu) has been scraped and replicated. As a friendly reminder please pay attention to URL addresses you access and OSC will never reach out asking you directly for username/passwords or to log in on websites outside of my.osc.edu or ondemand.osc.edu. Please reach out to oschelp@osc.edu or security@osc.edu if you have any questions or concerns.

Pages