4.3
CVSSv2

CVE-2020-27746

Published: 27/11/2020 Updated: 03/05/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 3.7 | Impact Score: 1.4 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Slurm prior to 19.05.8 and 20.x prior to 20.02.6 exposes Sensitive Information to an Unauthorized Actor because xauth for X11 magic cookies is affected by a race condition in a read operation on the /proc filesystem.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

schedmd slurm

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #974722 slurm-llnl: CVE-2020-27746: X11 forwarding - fix potential leak of the magic cookie when sent as an argument to the xauth command Package: src:slurm-llnl; Maintainer for src:slurm-llnl is Debian HPC Team <debian-hpc@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> ...
Multiple security issues were discovered in the Simple Linux Utility for Resource Management (SLURM), a cluster resource management and job scheduling system, which could result in denial of service, information disclosure or privilege escalation For the stable distribution (buster), these problems have been fixed in version 180852-1+deb10u2 W ...