Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-12693

Опубликовано: 21 мая 2020
Источник: debian
EPSS Низкий

Описание

Slurm 19.05.x before 19.05.7 and 20.02.x before 20.02.3, in the rare case where Message Aggregation is enabled, allows Authentication Bypass via an Alternate Path or Channel. A race condition allows a user to launch a process as an arbitrary user.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
slurm-wlmnot-affectedpackage
slurm-llnlremovedpackage
slurm-llnlnot-affectedjessiepackage

Примечания

  • https://www.schedmd.com/news.php?id=236

  • https://lists.schedmd.com/pipermail/slurm-announce/2020/000036.html

  • Issue affects systems with Message Aggregation enabled

  • slurm-wlm/20.02.6-1 changed the source package name and included the fix

EPSS

Процентиль: 70%
0.00632
Низкий

Связанные уязвимости

CVSS3: 8.1
ubuntu
больше 5 лет назад

Slurm 19.05.x before 19.05.7 and 20.02.x before 20.02.3, in the rare case where Message Aggregation is enabled, allows Authentication Bypass via an Alternate Path or Channel. A race condition allows a user to launch a process as an arbitrary user.

CVSS3: 8.1
nvd
больше 5 лет назад

Slurm 19.05.x before 19.05.7 and 20.02.x before 20.02.3, in the rare case where Message Aggregation is enabled, allows Authentication Bypass via an Alternate Path or Channel. A race condition allows a user to launch a process as an arbitrary user.

suse-cvrf
около 5 лет назад

Security update for slurm_18_08

suse-cvrf
больше 5 лет назад

Security update for slurm_18_08

suse-cvrf
больше 5 лет назад

Security update for slurm

EPSS

Процентиль: 70%
0.00632
Низкий