8.1
CVSSv3

CVE-2020-12693

Published: 21/05/2020 Updated: 07/11/2023
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 454
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Slurm 19.05.x prior to 19.05.7 and 20.02.x prior to 20.02.3, in the rare case where Message Aggregation is enabled, allows Authentication Bypass via an Alternate Path or Channel. A race condition allows a user to launch a process as an arbitrary user.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

schedmd slurm

fedoraproject fedora 31

fedoraproject fedora 32

opensuse leap 15.1

opensuse leap 15.2

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #961406 slurm-llnl: CVE-2020-12693 Package: src:slurm-llnl; Maintainer for src:slurm-llnl is Debian HPC Team <debian-hpc@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 24 May 2020 09:30:01 UTC Severity: important Tags: security, upstream Found in version ...
Multiple security issues were discovered in the Simple Linux Utility for Resource Management (SLURM), a cluster resource management and job scheduling system, which could result in denial of service, information disclosure or privilege escalation For the stable distribution (buster), these problems have been fixed in version 180852-1+deb10u2 W ...