First published: Mon Jan 15 2024(Updated: )
pkg_postinst in the Gentoo ebuild for Slurm through 22.05.3 unnecessarily calls chown to assign root's ownership on files in the live root filesystem. This could be exploited by the slurm user to become the owner of root-owned files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gentoo ebuild for Slurm | <=22.05.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-36770 has a medium severity rating due to its ability to allow the slurm user to gain ownership of root-owned files.
To fix CVE-2020-36770, update to the latest version of Gentoo ebuild for Slurm beyond 22.05.3.
Users of Gentoo ebuild for Slurm version 22.05.3 and earlier are affected by CVE-2020-36770.
The attack vector for CVE-2020-36770 involves the slurm user exploiting unnecessary ownership changes in the live root filesystem.
The implications of CVE-2020-36770 include potential privilege escalation for the slurm user.