CVE-2017-15566
Summary
| CVE | CVE-2017-15566 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-11-01 17:29:00 UTC |
| Updated | 2019-10-03 00:03:00 UTC |
| Description | Insecure SPANK environment variable handling exists in SchedMD Slurm before 16.05.11, 17.x before 17.02.9, and 17.11.x before 17.11.0rc2, allowing privilege escalation to root during Prolog or Epilog execution. |
Risk And Classification
Problem Types: CWE-426
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Debian -- Security Information -- DSA-4023-1 slurm-llnl | DEBIAN | www.debian.org | Third Party Advisory |
| News | SchedMD | CONFIRM | www.schedmd.com | Vendor Advisory |
| SchedMD Slurm CVE-2017-15566 Privilege Escalation Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 174796 SUSE Enterprise Linux Security update for slurm_20_11 and pdsh (SUSE-SU-2021:0773-1)