First published: Wed Nov 01 2017(Updated: )
Insecure SPANK environment variable handling exists in SchedMD Slurm before 16.05.11, 17.x before 17.02.9, and 17.11.x before 17.11.0rc2, allowing privilege escalation to root during Prolog or Epilog execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/slurm-llnl | <=17.02.7-1<=16.05.9-1 | 17.02.9-1 16.05.9-1+deb9u1 |
debian/slurm-llnl | 18.08.5.2-1+deb10u2 | |
Ubuntu | <16.05.11 | |
Ubuntu | >=17.02.0<17.2.09 | |
Ubuntu | =17.11.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15566 is considered to have a high severity due to its potential for privilege escalation to root.
To fix CVE-2017-15566, upgrade to Slurm versions 16.05.11, 17.02.9, or 17.11.0rc2 or later.
Slurm versions prior to 16.05.11, 17.x before 17.02.9, and 17.11.x before 17.11.0rc2 are affected by CVE-2017-15566.
CVE-2017-15566 is an insecure environment variable handling vulnerability that can lead to privilege escalation.
CVE-2017-15566 primarily affects the Slurm workload manager across various Linux distributions, notably Debain.