CVE-2014-0749
Published: 16 May 2014
Stack-based buffer overflow in lib/Libdis/disrsi_.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 2.5.x through 2.5.13 allows remote attackers to execute arbitrary code via a large count value.
From the Ubuntu Security Team
It was discovered that TORQUE Resource Manager has a stack-based buffer overflow. A remote attacker could possibly use this to execute arbitrary code.
Priority
Status
Package | Release | Status |
---|---|---|
torque Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
bionic |
Does not exist
|
|
cosmic |
Does not exist
|
|
lucid |
Ignored
(end of life)
|
|
precise |
Released
(2.4.16+dfsg-1+deb7u4build0.12.04.1)
|
|
saucy |
Ignored
(end of life)
|
|
trusty |
Released
(2.4.16+dfsg-1.3ubuntu1.1)
|
|
upstream |
Needed
|
|
utopic |
Not vulnerable
(2.4.16+dfsg-1.4ubuntu1)
|
|
vivid |
Not vulnerable
(2.4.16+dfsg-1.4ubuntu1)
|
|
wily |
Not vulnerable
(2.4.16+dfsg-1.4ubuntu1)
|
|
xenial |
Not vulnerable
(2.4.16+dfsg-1.4ubuntu1)
|
|
yakkety |
Not vulnerable
(2.4.16+dfsg-1.4ubuntu1)
|
|
zesty |
Does not exist
|
|
Patches: upstream: https://github.com/adaptivecomputing/torque/commit/3ed749263abe3d69fa3626d142a5789dcb5a5684 |
References
- https://github.com/adaptivecomputing/torque/commit/3ed749263abe3d69fa3626d142a5789dcb5a5684
- https://labs.mwrinfosecurity.com/system/assets/662/original/torque-buffer-overflow_2014-05-14.pdf
- https://github.com/adaptivecomputing/torque/pull/171
- https://www.cve.org/CVERecord?id=CVE-2014-0749
- NVD
- Launchpad
- Debian