First published: Thu May 21 2020(Updated: )
Slurm 19.05.x before 19.05.7 and 20.02.x before 20.02.3, in the rare case where Message Aggregation is enabled, allows Authentication Bypass via an Alternate Path or Channel. A race condition allows a user to launch a process as an arbitrary user.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SchedMD Slurm | >=19.05.0<19.05.7 | |
SchedMD Slurm | >=20.02.0<20.02.3 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/slurm-llnl | 18.08.5.2-1+deb10u2 | |
debian/slurm-wlm | 20.11.7+really20.11.4-2+deb11u1 22.05.8-4 22.05.8-4+deb12u1 23.02.3-2 23.02.6-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-12693 is high with a severity value of 8.1.
Slurm versions 19.05.x before 19.05.7 and 20.02.x before 20.02.3 are affected by CVE-2020-12693.
In rare cases where Message Aggregation is enabled, a race condition allows a user to launch a process as an arbitrary user, resulting in an authentication bypass via an alternate path or channel in CVE-2020-12693.
The Slurm packages 'slurm-llnl' and 'slurm-wlm' are affected by CVE-2020-12693.
To fix CVE-2020-12693, update Slurm to versions 19.05.7 or 20.02.3 or apply the necessary updates provided by the respective software vendors.