Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU62865
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-29500
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote attacker can obtain sensitive information credentials for the SlurmUser account.
MitigationUpdate the affected package slurm to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing: 15-SP2-ESPOS - 15-SP2-LTSS
openSUSE Leap: 15.3 - 15.4
slurm-webdoc: before 20.02.7-150200.3.14.2
slurm-torque-debuginfo: before 20.02.7-150200.3.14.2
slurm-torque: before 20.02.7-150200.3.14.2
slurm-sview-debuginfo: before 20.02.7-150200.3.14.2
slurm-sview: before 20.02.7-150200.3.14.2
slurm-sql-debuginfo: before 20.02.7-150200.3.14.2
slurm-sql: before 20.02.7-150200.3.14.2
slurm-slurmdbd-debuginfo: before 20.02.7-150200.3.14.2
slurm-slurmdbd: before 20.02.7-150200.3.14.2
slurm-plugins-debuginfo: before 20.02.7-150200.3.14.2
slurm-plugins: before 20.02.7-150200.3.14.2
slurm-pam_slurm-debuginfo: before 20.02.7-150200.3.14.2
slurm-pam_slurm: before 20.02.7-150200.3.14.2
slurm-node-debuginfo: before 20.02.7-150200.3.14.2
slurm-node: before 20.02.7-150200.3.14.2
slurm-munge-debuginfo: before 20.02.7-150200.3.14.2
slurm-munge: before 20.02.7-150200.3.14.2
slurm-lua-debuginfo: before 20.02.7-150200.3.14.2
slurm-lua: before 20.02.7-150200.3.14.2
slurm-doc: before 20.02.7-150200.3.14.2
slurm-devel: before 20.02.7-150200.3.14.2
slurm-debugsource: before 20.02.7-150200.3.14.2
slurm-debuginfo: before 20.02.7-150200.3.14.2
slurm-config-man: before 20.02.7-150200.3.14.2
slurm-config: before 20.02.7-150200.3.14.2
slurm-auth-none-debuginfo: before 20.02.7-150200.3.14.2
slurm-auth-none: before 20.02.7-150200.3.14.2
slurm: before 20.02.7-150200.3.14.2
perl-slurm-debuginfo: before 20.02.7-150200.3.14.2
perl-slurm: before 20.02.7-150200.3.14.2
libpmi0-debuginfo: before 20.02.7-150200.3.14.2
libpmi0: before 20.02.7-150200.3.14.2
libnss_slurm2-debuginfo: before 20.02.7-150200.3.14.2
libnss_slurm2: before 20.02.7-150200.3.14.2
libslurm35-debuginfo: before 20.02.7-150200.3.14.2
libslurm35: before 20.02.7-150200.3.14.2
External linkshttp://www.suse.com/support/update/announcement/2022/suse-su-20223490-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU62864
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-29501
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in a network RPC handler in the slurmd daemon used for PMI2 and PMIx support. A remote attacker can bypass implemented security restrictions and gain unauthorized access to the application.
MitigationUpdate the affected package slurm to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing: 15-SP2-ESPOS - 15-SP2-LTSS
openSUSE Leap: 15.3 - 15.4
slurm-webdoc: before 20.02.7-150200.3.14.2
slurm-torque-debuginfo: before 20.02.7-150200.3.14.2
slurm-torque: before 20.02.7-150200.3.14.2
slurm-sview-debuginfo: before 20.02.7-150200.3.14.2
slurm-sview: before 20.02.7-150200.3.14.2
slurm-sql-debuginfo: before 20.02.7-150200.3.14.2
slurm-sql: before 20.02.7-150200.3.14.2
slurm-slurmdbd-debuginfo: before 20.02.7-150200.3.14.2
slurm-slurmdbd: before 20.02.7-150200.3.14.2
slurm-plugins-debuginfo: before 20.02.7-150200.3.14.2
slurm-plugins: before 20.02.7-150200.3.14.2
slurm-pam_slurm-debuginfo: before 20.02.7-150200.3.14.2
slurm-pam_slurm: before 20.02.7-150200.3.14.2
slurm-node-debuginfo: before 20.02.7-150200.3.14.2
slurm-node: before 20.02.7-150200.3.14.2
slurm-munge-debuginfo: before 20.02.7-150200.3.14.2
slurm-munge: before 20.02.7-150200.3.14.2
slurm-lua-debuginfo: before 20.02.7-150200.3.14.2
slurm-lua: before 20.02.7-150200.3.14.2
slurm-doc: before 20.02.7-150200.3.14.2
slurm-devel: before 20.02.7-150200.3.14.2
slurm-debugsource: before 20.02.7-150200.3.14.2
slurm-debuginfo: before 20.02.7-150200.3.14.2
slurm-config-man: before 20.02.7-150200.3.14.2
slurm-config: before 20.02.7-150200.3.14.2
slurm-auth-none-debuginfo: before 20.02.7-150200.3.14.2
slurm-auth-none: before 20.02.7-150200.3.14.2
slurm: before 20.02.7-150200.3.14.2
perl-slurm-debuginfo: before 20.02.7-150200.3.14.2
perl-slurm: before 20.02.7-150200.3.14.2
libpmi0-debuginfo: before 20.02.7-150200.3.14.2
libpmi0: before 20.02.7-150200.3.14.2
libnss_slurm2-debuginfo: before 20.02.7-150200.3.14.2
libnss_slurm2: before 20.02.7-150200.3.14.2
libslurm35-debuginfo: before 20.02.7-150200.3.14.2
libslurm35: before 20.02.7-150200.3.14.2
External linkshttp://www.suse.com/support/update/announcement/2022/suse-su-20223490-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU67719
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-31251
CWE-ID:
CWE-276 - Incorrect Default Permissions
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to incorrect default permissions in slurm testsuite. A local user with access to the system can execute arbitrary code with root privileges.
MitigationUpdate the affected package slurm to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing: 15-SP2-ESPOS - 15-SP2-LTSS
openSUSE Leap: 15.3 - 15.4
slurm-webdoc: before 20.02.7-150200.3.14.2
slurm-torque-debuginfo: before 20.02.7-150200.3.14.2
slurm-torque: before 20.02.7-150200.3.14.2
slurm-sview-debuginfo: before 20.02.7-150200.3.14.2
slurm-sview: before 20.02.7-150200.3.14.2
slurm-sql-debuginfo: before 20.02.7-150200.3.14.2
slurm-sql: before 20.02.7-150200.3.14.2
slurm-slurmdbd-debuginfo: before 20.02.7-150200.3.14.2
slurm-slurmdbd: before 20.02.7-150200.3.14.2
slurm-plugins-debuginfo: before 20.02.7-150200.3.14.2
slurm-plugins: before 20.02.7-150200.3.14.2
slurm-pam_slurm-debuginfo: before 20.02.7-150200.3.14.2
slurm-pam_slurm: before 20.02.7-150200.3.14.2
slurm-node-debuginfo: before 20.02.7-150200.3.14.2
slurm-node: before 20.02.7-150200.3.14.2
slurm-munge-debuginfo: before 20.02.7-150200.3.14.2
slurm-munge: before 20.02.7-150200.3.14.2
slurm-lua-debuginfo: before 20.02.7-150200.3.14.2
slurm-lua: before 20.02.7-150200.3.14.2
slurm-doc: before 20.02.7-150200.3.14.2
slurm-devel: before 20.02.7-150200.3.14.2
slurm-debugsource: before 20.02.7-150200.3.14.2
slurm-debuginfo: before 20.02.7-150200.3.14.2
slurm-config-man: before 20.02.7-150200.3.14.2
slurm-config: before 20.02.7-150200.3.14.2
slurm-auth-none-debuginfo: before 20.02.7-150200.3.14.2
slurm-auth-none: before 20.02.7-150200.3.14.2
slurm: before 20.02.7-150200.3.14.2
perl-slurm-debuginfo: before 20.02.7-150200.3.14.2
perl-slurm: before 20.02.7-150200.3.14.2
libpmi0-debuginfo: before 20.02.7-150200.3.14.2
libpmi0: before 20.02.7-150200.3.14.2
libnss_slurm2-debuginfo: before 20.02.7-150200.3.14.2
libnss_slurm2: before 20.02.7-150200.3.14.2
libslurm35-debuginfo: before 20.02.7-150200.3.14.2
libslurm35: before 20.02.7-150200.3.14.2
External linkshttp://www.suse.com/support/update/announcement/2022/suse-su-20223490-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.