7.2
CVSSv2

CVE-2017-15566

Published: 01/11/2017 Updated: 03/10/2019
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Insecure SPANK environment variable handling exists in SchedMD Slurm prior to 16.05.11, 17.x prior to 17.02.9, and 17.11.x prior to 17.11.0rc2, allowing privilege escalation to root during Prolog or Epilog execution.

Vulnerable Product Search on Vulmon Subscribe to Product

schedmd slurm 17.11.0

schedmd slurm

Vendor Advisories

Debian Bug report logs - #880530 slurm-llnl: CVE-2017-15566 Package: src:slurm-llnl; Maintainer for src:slurm-llnl is Debian HPC Team <debian-hpc@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 1 Nov 2017 20:27:02 UTC Severity: grave Tags: patch, security, upstream Found in versi ...
Ryan Day discovered that the Simple Linux Utility for Resource Management (SLURM), a cluster resource management and job scheduling system, does not properly handle SPANK environment variables, allowing a user permitted to submit jobs to execute code as root during the Prolog or Epilog All systems using a Prolog or Epilog script are vulnerable, re ...