slurm-llnl is vulnerable to authentication bypass. when message aggregation is enabled, An attacker can exploit this vulnerability via an alternate path or channel while race condition allows a user to launch a process as an arbitrary user
CPE | Name | Operator | Version |
---|---|---|---|
slurm-llnl:stretch | eq | 16.05.9-1+deb9u4 | |
slurm-llnl:stretch | eq | 16.05.9-1+deb9u4 |
lists.opensuse.org/opensuse-security-announce/2020-09/msg00035.html
lists.opensuse.org/opensuse-security-announce/2020-09/msg00063.html
lists.debian.org/debian-lts-announce/2022/01/msg00011.html
lists.fedoraproject.org/archives/list/[email protected]/message/KNL5E5SK4WP6M3DKU4IKW2NPQD2XTZ4Y/
lists.fedoraproject.org/archives/list/[email protected]/message/T3RGQB3EWDLOLTSPAJPPWZEPQK3O3AUH/
lists.schedmd.com/pipermail/slurm-announce/2020/000036.html
security-tracker.debian.org/tracker/CVE-2020-12693
www.debian.org/security/2021/dsa-4841
www.schedmd.com/news.php?id=236