SUSE update for slurm



Published: 2022-10-04
Risk High
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2022-29500
CVE-2022-29501
CVE-2022-31251
CWE-ID CWE-284
CWE-276
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
SUSE Linux Enterprise Module for HPC
Operating systems & Components / Operating system

slurm-torque-debuginfo
Operating systems & Components / Operating system package or component

slurm-torque
Operating systems & Components / Operating system package or component

slurm-sql-debuginfo
Operating systems & Components / Operating system package or component

slurm-sql
Operating systems & Components / Operating system package or component

slurm-slurmdbd-debuginfo
Operating systems & Components / Operating system package or component

slurm-slurmdbd
Operating systems & Components / Operating system package or component

slurm-slurmdb-direct
Operating systems & Components / Operating system package or component

slurm-sched-wiki
Operating systems & Components / Operating system package or component

slurm-plugins-debuginfo
Operating systems & Components / Operating system package or component

slurm-plugins
Operating systems & Components / Operating system package or component

slurm-pam_slurm-debuginfo
Operating systems & Components / Operating system package or component

slurm-pam_slurm
Operating systems & Components / Operating system package or component

slurm-munge-debuginfo
Operating systems & Components / Operating system package or component

slurm-munge
Operating systems & Components / Operating system package or component

slurm-lua-debuginfo
Operating systems & Components / Operating system package or component

slurm-lua
Operating systems & Components / Operating system package or component

slurm-doc
Operating systems & Components / Operating system package or component

slurm-devel
Operating systems & Components / Operating system package or component

slurm-debugsource
Operating systems & Components / Operating system package or component

slurm-debuginfo
Operating systems & Components / Operating system package or component

slurm-config
Operating systems & Components / Operating system package or component

slurm-auth-none-debuginfo
Operating systems & Components / Operating system package or component

slurm-auth-none
Operating systems & Components / Operating system package or component

slurm
Operating systems & Components / Operating system package or component

perl-slurm-debuginfo
Operating systems & Components / Operating system package or component

perl-slurm
Operating systems & Components / Operating system package or component

libslurm31-debuginfo
Operating systems & Components / Operating system package or component

libslurm31
Operating systems & Components / Operating system package or component

libpmi0-debuginfo
Operating systems & Components / Operating system package or component

libpmi0
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Improper access control

EUVDB-ID: #VU62865

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-29500

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote attacker can obtain sensitive information credentials for the SlurmUser account.

Mitigation

Update the affected package slurm to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Module for HPC: 12

slurm-torque-debuginfo: before 17.02.11-6.53.1

slurm-torque: before 17.02.11-6.53.1

slurm-sql-debuginfo: before 17.02.11-6.53.1

slurm-sql: before 17.02.11-6.53.1

slurm-slurmdbd-debuginfo: before 17.02.11-6.53.1

slurm-slurmdbd: before 17.02.11-6.53.1

slurm-slurmdb-direct: before 17.02.11-6.53.1

slurm-sched-wiki: before 17.02.11-6.53.1

slurm-plugins-debuginfo: before 17.02.11-6.53.1

slurm-plugins: before 17.02.11-6.53.1

slurm-pam_slurm-debuginfo: before 17.02.11-6.53.1

slurm-pam_slurm: before 17.02.11-6.53.1

slurm-munge-debuginfo: before 17.02.11-6.53.1

slurm-munge: before 17.02.11-6.53.1

slurm-lua-debuginfo: before 17.02.11-6.53.1

slurm-lua: before 17.02.11-6.53.1

slurm-doc: before 17.02.11-6.53.1

slurm-devel: before 17.02.11-6.53.1

slurm-debugsource: before 17.02.11-6.53.1

slurm-debuginfo: before 17.02.11-6.53.1

slurm-config: before 17.02.11-6.53.1

slurm-auth-none-debuginfo: before 17.02.11-6.53.1

slurm-auth-none: before 17.02.11-6.53.1

slurm: before 17.02.11-6.53.1

perl-slurm-debuginfo: before 17.02.11-6.53.1

perl-slurm: before 17.02.11-6.53.1

libslurm31-debuginfo: before 17.02.11-6.53.1

libslurm31: before 17.02.11-6.53.1

libpmi0-debuginfo: before 17.02.11-6.53.1

libpmi0: before 17.02.11-6.53.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20223497-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper access control

EUVDB-ID: #VU62864

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-29501

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in a network RPC handler in the slurmd daemon used for PMI2 and PMIx support. A remote attacker can bypass implemented security restrictions and gain unauthorized access to the application.

Mitigation

Update the affected package slurm to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Module for HPC: 12

slurm-torque-debuginfo: before 17.02.11-6.53.1

slurm-torque: before 17.02.11-6.53.1

slurm-sql-debuginfo: before 17.02.11-6.53.1

slurm-sql: before 17.02.11-6.53.1

slurm-slurmdbd-debuginfo: before 17.02.11-6.53.1

slurm-slurmdbd: before 17.02.11-6.53.1

slurm-slurmdb-direct: before 17.02.11-6.53.1

slurm-sched-wiki: before 17.02.11-6.53.1

slurm-plugins-debuginfo: before 17.02.11-6.53.1

slurm-plugins: before 17.02.11-6.53.1

slurm-pam_slurm-debuginfo: before 17.02.11-6.53.1

slurm-pam_slurm: before 17.02.11-6.53.1

slurm-munge-debuginfo: before 17.02.11-6.53.1

slurm-munge: before 17.02.11-6.53.1

slurm-lua-debuginfo: before 17.02.11-6.53.1

slurm-lua: before 17.02.11-6.53.1

slurm-doc: before 17.02.11-6.53.1

slurm-devel: before 17.02.11-6.53.1

slurm-debugsource: before 17.02.11-6.53.1

slurm-debuginfo: before 17.02.11-6.53.1

slurm-config: before 17.02.11-6.53.1

slurm-auth-none-debuginfo: before 17.02.11-6.53.1

slurm-auth-none: before 17.02.11-6.53.1

slurm: before 17.02.11-6.53.1

perl-slurm-debuginfo: before 17.02.11-6.53.1

perl-slurm: before 17.02.11-6.53.1

libslurm31-debuginfo: before 17.02.11-6.53.1

libslurm31: before 17.02.11-6.53.1

libpmi0-debuginfo: before 17.02.11-6.53.1

libpmi0: before 17.02.11-6.53.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20223497-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Incorrect default permissions

EUVDB-ID: #VU67719

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-31251

CWE-ID: CWE-276 - Incorrect Default Permissions

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to incorrect default permissions in slurm testsuite. A local user with access to the system can execute arbitrary code with root privileges.

Mitigation

Update the affected package slurm to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Module for HPC: 12

slurm-torque-debuginfo: before 17.02.11-6.53.1

slurm-torque: before 17.02.11-6.53.1

slurm-sql-debuginfo: before 17.02.11-6.53.1

slurm-sql: before 17.02.11-6.53.1

slurm-slurmdbd-debuginfo: before 17.02.11-6.53.1

slurm-slurmdbd: before 17.02.11-6.53.1

slurm-slurmdb-direct: before 17.02.11-6.53.1

slurm-sched-wiki: before 17.02.11-6.53.1

slurm-plugins-debuginfo: before 17.02.11-6.53.1

slurm-plugins: before 17.02.11-6.53.1

slurm-pam_slurm-debuginfo: before 17.02.11-6.53.1

slurm-pam_slurm: before 17.02.11-6.53.1

slurm-munge-debuginfo: before 17.02.11-6.53.1

slurm-munge: before 17.02.11-6.53.1

slurm-lua-debuginfo: before 17.02.11-6.53.1

slurm-lua: before 17.02.11-6.53.1

slurm-doc: before 17.02.11-6.53.1

slurm-devel: before 17.02.11-6.53.1

slurm-debugsource: before 17.02.11-6.53.1

slurm-debuginfo: before 17.02.11-6.53.1

slurm-config: before 17.02.11-6.53.1

slurm-auth-none-debuginfo: before 17.02.11-6.53.1

slurm-auth-none: before 17.02.11-6.53.1

slurm: before 17.02.11-6.53.1

perl-slurm-debuginfo: before 17.02.11-6.53.1

perl-slurm: before 17.02.11-6.53.1

libslurm31-debuginfo: before 17.02.11-6.53.1

libslurm31: before 17.02.11-6.53.1

libpmi0-debuginfo: before 17.02.11-6.53.1

libpmi0: before 17.02.11-6.53.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20223497-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###