Slurm 17.11.x, 18.08.0 through 18.08.7, and 19.05.0 allows SQL Injection
Bug #1845158 reported by
Paride Legovini
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
slurm-llnl (Debian) |
Fix Released
|
Unknown
|
|||
slurm-llnl (Ubuntu) |
Fix Released
|
High
|
Unassigned | ||
Bionic |
New
|
Undecided
|
Unassigned | ||
Disco |
Won't Fix
|
Undecided
|
Unassigned | ||
Focal |
Fix Released
|
High
|
Unassigned |
Bug Description
An unescaped string makes an SQL injection possible in slurm 17.11.x, 18.08.0 through 18.08.7, and 19.05.0. See the links in the CVE page for more details.
The Debian bug is severity: grave and caused the package removal from Debian testing and Ubuntu Eoan.
Upstream fix: https:/
CVE References
description: | updated |
Changed in slurm-llnl (Debian): | |
status: | Unknown → Confirmed |
Changed in slurm-llnl (Debian): | |
status: | Confirmed → Fix Released |
Changed in slurm-llnl (Ubuntu Disco): | |
status: | New → Won't Fix |
To post a comment you must log in.
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https:/ /wiki.ubuntu. com/SecurityTea m/UpdateProcedu res