CVE-2020-12693Race Condition in Slurm

11 documents7 sources
Severity
8.1HIGHNVD
EPSS
0.6%
top 29.62%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 21
Latest updateFeb 1

Description

Slurm 19.05.x before 19.05.7 and 20.02.x before 20.02.3, in the rare case where Message Aggregation is enabled, allows Authentication Bypass via an Alternate Path or Channel. A race condition allows a user to launch a process as an arbitrary user.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages2 packages

NVDschedmd/slurm19.05.019.05.7+1
NVDopensuse/leap15.1, 15.2+1

Also affects: Debian Linux 10.0, 9.0, Fedora 31, 32

🔴Vulnerability Details

5
OSV
slurm-llnl vulnerabilities2023-02-01
OSV
slurm-llnl vulnerabilities2022-05-25
GHSA
GHSA-9rpg-w3f6-9mpm: Slurm 192022-05-24
OSV
CVE-2020-12693: Slurm 192020-05-21
CVEList
CVE-2020-12693: Slurm 192020-05-21

📋Vendor Advisories

3
Ubuntu
Slurm vulnerabilities2023-02-01
Ubuntu
Slurm vulnerabilities2022-05-25
Debian
CVE-2020-12693: slurm-wlm - Slurm 19.05.x before 19.05.7 and 20.02.x before 20.02.3, in the rare case where ...2020

💬Community

2
Bugzilla
CVE-2020-12693 slurm: race condition allows a user to launch a process as an arbitrary user [fedora-all]2020-06-18
Bugzilla
CVE-2020-12693 slurm: race condition allows a user to launch a process as an arbitrary user2020-06-18
CVE-2020-12693 — Race Condition in Schedmd Slurm | cvebase