SchedMD Slurm 21.08.x through 20.11.x has Incorrect Access Control that leads to Escalation of Privileges and code execution.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 06:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HXLOI3ERTKMZR2KWNRN7OR5S55VPWENH/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y6B7OWVNVCJUDE6VDWGCBUWMRCRETAO3/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YBI4NFDGGMBKWG4EMSZL5UHATDCLPCQW/ - | |
References | () https://lists.schedmd.com/pipermail/slurm-announce/ - Mailing List, Vendor Advisory | |
References | () https://www.debian.org/security/2022/dsa-5166 - Third Party Advisory | |
References | () https://www.schedmd.com/news.php - Mitigation, Vendor Advisory | |
References | () https://www.schedmd.com/news.php?id=260 - Mitigation, Patch, Vendor Advisory |
09 Sep 2022, 14:03
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* |
|
CWE | NVD-CWE-Other | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y6B7OWVNVCJUDE6VDWGCBUWMRCRETAO3/ - Mailing List, Patch, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HXLOI3ERTKMZR2KWNRN7OR5S55VPWENH/ - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YBI4NFDGGMBKWG4EMSZL5UHATDCLPCQW/ - Mailing List, Patch, Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2022/dsa-5166 - Third Party Advisory |
20 Jun 2022, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
18 May 2022, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 May 2022, 04:20
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 9.0
v3 : 8.8 |
CWE | NVD-CWE-noinfo | |
References | (MISC) https://lists.schedmd.com/pipermail/slurm-announce/ - Mailing List, Vendor Advisory | |
References | (MISC) https://www.schedmd.com/news.php?id=260 - Mitigation, Patch, Vendor Advisory | |
References | (MISC) https://www.schedmd.com/news.php - Mitigation, Vendor Advisory | |
CPE | cpe:2.3:a:schedmd:slurm:*:*:*:*:*:*:*:* |
05 May 2022, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-05-05 17:15
Updated : 2024-11-21 06:59
NVD link : CVE-2022-29501
Mitre link : CVE-2022-29501
CVE.ORG link : CVE-2022-29501
JSON object : View
Products Affected
debian
- debian_linux
schedmd
- slurm
fedoraproject
- fedora
CWE