Access Restriction Bypass The advisory has been revoked - it doesn't affect any version of package torque  (opens in a new tab)


Threat Intelligence

EPSS
0.44% (75th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU1610-TORQUE-631183
  • published30 Oct 2014
  • disclosed30 Oct 2014

Introduced: 30 Oct 2014

CVE-2014-3684  (opens in a new tab)
CWE-264  (opens in a new tab)

Amendment

The Ubuntu security team deemed this advisory irrelevant for Ubuntu:16.10.

NVD Description

Note: Versions mentioned in the description apply only to the upstream torque package and not the torque package as distributed by Ubuntu.

The tm_adopt function in lib/Libifl/tm.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 5.0.x, 4.5.x, 4.2.x, and earlier does not validate that the owner of the process also owns the adopted session id, which allows remote authenticated users to kill arbitrary processes via a crafted executable.