CVSS 3.1 Score 9.8 of 10 (high)


Published Jan 15, 2024
Updated: Jan 22, 2024


The vulnerability with the CVE ID name CVE-2020-36770 affects the Gentoo ebuild for Slurm through version 22.05.3. It allows the slurm user to become the owner of root-owned files by exploiting the pkg_postinst function, which unnecessarily assigns root's ownership to files in the live root filesystem using chown. This vulnerability has a base severity rating of CRITICAL with a base score of 9.8 according to The exploitability score is 3.9, and it requires no privileges or user interaction. The attack vector is through the network, and it has a high impact on both integrity and confidentiality. The vulnerability poses a significant danger to organizations that use Slurm, as it can lead to unauthorized access and manipulation of critical system files by non-privileged users.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2020-36770 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options