Описание
Slurm before 19.05.8 and 20.x before 20.02.6 exposes Sensitive Information to an Unauthorized Actor because xauth for X11 magic cookies is affected by a race condition in a read operation on the /proc filesystem.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| slurm-wlm | not-affected | package | ||
| slurm-llnl | removed | package | ||
| slurm-llnl | not-affected | stretch | package |
Примечания
https://www.schedmd.com/news.php?id=240
https://lists.schedmd.com/pipermail/slurm-announce/2020/000045.html
https://github.com/SchedMD/slurm/commit/07309deb45c33e735e191faf9dd31cca1054a15c
slurm-wlm/20.02.6-1 changed the source package name and included the fix
Introduced by: https://github.com/SchedMD/slurm/commit/e3140b7f8d96ced9dc85089caa65dd7c6be396fd (slurm-17-11-0-0rc1)
EPSS
Связанные уязвимости
Slurm before 19.05.8 and 20.x before 20.02.6 exposes Sensitive Information to an Unauthorized Actor because xauth for X11 magic cookies is affected by a race condition in a read operation on the /proc filesystem.
Slurm before 19.05.8 and 20.x before 20.02.6 exposes Sensitive Information to an Unauthorized Actor because xauth for X11 magic cookies is affected by a race condition in a read operation on the /proc filesystem.
Slurm before 19.05.8 and 20.x before 20.02.6 exposes Sensitive Information to an Unauthorized Actor because xauth for X11 magic cookies is affected by a race condition in a read operation on the /proc filesystem.
Уязвимость менеджера управления ресурсами SLURM, связанная с незащищенным хранением конфиденциальной информации, позволяющая нарушителю получить доступ к конфиденциальным данным
EPSS