Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2019-19728
Analyzed
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-13 Jan, 2020 | 19:15
Updated At-28 Jan, 2021 | 16:47

SchedMD Slurm before 18.08.9 and 19.x before 19.05.5 executes srun --uid with incorrect privileges.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Primary2.06.0MEDIUM
AV:N/AC:M/Au:S/C:P/I:P/A:P
CPE Matches

schedmd
schedmd
>>slurm>>Versions before 18.08.9(exclusive)
cpe:2.3:a:schedmd:slurm:*:*:*:*:*:*:*:*
schedmd
schedmd
>>slurm>>Versions from 19.05.0(inclusive) to 19.05.5(exclusive)
cpe:2.3:a:schedmd:slurm:*:*:*:*:*:*:*:*
openSUSE
opensuse
>>leap>>15.1
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>10.0
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-269Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00038.htmlcve@mitre.org
Mailing List
Third Party Advisory
https://bugzilla.suse.com/show_bug.cgi?id=1159692cve@mitre.org
Issue Tracking
Third Party Advisory
https://lists.schedmd.com/pipermail/slurm-announce/cve@mitre.org
Mailing List
Vendor Advisory
https://www.debian.org/security/2021/dsa-4841cve@mitre.org
Third Party Advisory
https://www.schedmd.com/news.phpcve@mitre.org
Vendor Advisory
Change History
0Changes found

Details not found