8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
5.1 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
slurm-llnl is vulnerable to authentication bypass. when message aggregation is enabled, An attacker can exploit this vulnerability via an alternate path or channel while race condition allows a user to launch a process as an arbitrary user
CPE | Name | Operator | Version |
---|---|---|---|
slurm-llnl:stretch | eq | 16.05.9-1+deb9u4 | |
slurm-llnl:stretch | eq | 16.05.9-1+deb9u4 |
lists.opensuse.org/opensuse-security-announce/2020-09/msg00035.html
lists.opensuse.org/opensuse-security-announce/2020-09/msg00063.html
lists.debian.org/debian-lts-announce/2022/01/msg00011.html
lists.fedoraproject.org/archives/list/[email protected]/message/KNL5E5SK4WP6M3DKU4IKW2NPQD2XTZ4Y/
lists.fedoraproject.org/archives/list/[email protected]/message/T3RGQB3EWDLOLTSPAJPPWZEPQK3O3AUH/
lists.schedmd.com/pipermail/slurm-announce/2020/000036.html
security-tracker.debian.org/tracker/CVE-2020-12693
www.debian.org/security/2021/dsa-4841
www.schedmd.com/news.php?id=236
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
5.1 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P