Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 3 Oct 2014 01:38:54 +0400
From: Solar Designer <solar@...nwall.com>
To: Chad Vizino <cvizino@...ptivecomputing.com>
Cc: oss-security@...ts.openwall.com
Subject: Re: tm_adopt() vulnerability in TORQUE Resource Manager

On Thu, Oct 02, 2014 at 03:26:21PM -0600, Chad Vizino wrote:
> Within a TORQUE Resource Manager job, the tm_adopt() TORQUE library call
> enables a user-built executable calling tm_adopt() to adopt any session id
> (and its child processes) regardless of the session id owner on any node
> within a job. When a job that includes the executable calling tm_adopt()
> exits, the adopted processes are killed along with the job processes during
> normal job cleanup. This can enable a non-root user to kill processes
> he/she doesn't own including root-owned ones on any node in a job.

Chad - thank you for posting this!

All - Chad had brought this issue to the distros list yesterday (not
realizing that public issues like it should go to oss-security right
away, which we've explained), and it was assigned CVE-2014-3684.

> The issue has been fixed in the following commit numbers for the listed
> TORQUE Resource Manager versions:
> 
> 4.2-dev
> 967cdc80150690459a47a35a658abeee0ca6e5cb
> f2f4c950f3d461a249111c8826da3beaafccace9
> 
> 4.5-dev
> 6c4a57b2d7a56b5bda1c57e2af425ff517ffe331
> 
> 5.0-dev
> e2b6253b62fe7e59c5852e2b914b71a095328558
> 
> develop
> dd7f729eedead89c9253707f85572706077ff1d3

These commits can be seen at:

https://github.com/adaptivecomputing/torque

Alexander

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.