CVE-2014-0749

Publication date 16 May 2014

Last updated 24 July 2024


Ubuntu priority

Stack-based buffer overflow in lib/Libdis/disrsi_.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 2.5.x through 2.5.13 allows remote attackers to execute arbitrary code via a large count value.

From the Ubuntu Security Team

It was discovered that TORQUE Resource Manager has a stack-based buffer overflow. A remote attacker could possibly use this to execute arbitrary code.

Status

Package Ubuntu Release Status
torque 18.10 cosmic Not in release
18.04 LTS bionic Not in release
17.10 artful Not in release
17.04 zesty Not in release
16.10 yakkety
Not affected
16.04 LTS xenial
Not affected
15.10 wily
Not affected
15.04 vivid
Not affected
14.10 utopic
Not affected
14.04 LTS trusty
Fixed 2.4.16+dfsg-1.3ubuntu1.1
13.10 saucy Ignored end of life
12.04 LTS precise
Fixed 2.4.16+dfsg-1+deb7u4build0.12.04.1
10.04 LTS lucid Ignored end of life

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
torque