USN-6458-1: Slurm vulnerabilities

Publication date

30 October 2023

Overview

Several security issues were fixed in Slurm.


Packages

  • slurm-llnl - Simple Linux Utility for Resource Management
  • slurm-wlm - Simple Linux Utility for Resource Management

Details

It was discovered that Slurm did not properly handle credential
management, which could allow an unprivileged user to impersonate the
SlurmUser account. An attacker could possibly use this issue to execute
arbitrary code as the root user. (CVE-2022-29500)

It was discovered that Slurm did not properly handle access control when
dealing with RPC traffic through PMI2 and PMIx, which could allow an
unprivileged user to send data to an arbitrary unix socket in the host.
An attacker could possibly use this issue to execute arbitrary code as
the root user. (CVE-2022-29501)

It was discovered that Slurm did not properly handle validation logic when
processing input and output data with the srun client, which could lead to
the interception of process I/O. An attacker could possibly use this issue
to expose sensitive information or execute arbitrary code. This...

It was discovered that Slurm did not properly handle credential
management, which could allow an unprivileged user to impersonate the
SlurmUser account. An attacker could possibly use this issue to execute
arbitrary code as the root user. (CVE-2022-29500)

It was discovered that Slurm did not properly handle access control when
dealing with RPC traffic through PMI2 and PMIx, which could allow an
unprivileged user to send data to an arbitrary unix socket in the host.
An attacker could possibly use this issue to execute arbitrary code as
the root user. (CVE-2022-29501)

It was discovered that Slurm did not properly handle validation logic when
processing input and output data with the srun client, which could lead to
the interception of process I/O. An attacker could possibly use this issue
to expose sensitive information or execute arbitrary code. This issue only
affected Ubuntu 22.04 LTS. (CVE-2022-29502)


Update instructions

After a standard system update you need to restart Slurm to make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
22.04 jammy libpam-slurm –  21.08.5-2ubuntu1+esm1  
libpmi0 –  21.08.5-2ubuntu1+esm1  
libpmi2-0 –  21.08.5-2ubuntu1+esm1  
libslurm-perl –  21.08.5-2ubuntu1+esm1  
libslurm37 –  21.08.5-2ubuntu1+esm1  
libslurmdb-perl –  21.08.5-2ubuntu1+esm1  
slurm-client –  21.08.5-2ubuntu1+esm1  
slurm-wlm –  21.08.5-2ubuntu1+esm1  
slurm-wlm-basic-plugins –  21.08.5-2ubuntu1+esm1  
slurmctld –  21.08.5-2ubuntu1+esm1  
slurmd –  21.08.5-2ubuntu1+esm1  
slurmdbd –  21.08.5-2ubuntu1+esm1  
slurmrestd –  21.08.5-2ubuntu1+esm1  
20.04 focal libpam-slurm –  19.05.5-1ubuntu0.1~esm2  
libpmi0 –  19.05.5-1ubuntu0.1~esm2  
libpmi2-0 –  19.05.5-1ubuntu0.1~esm2  
libslurm-perl –  19.05.5-1ubuntu0.1~esm2  
libslurm34 –  19.05.5-1ubuntu0.1~esm2  
libslurmdb-perl –  19.05.5-1ubuntu0.1~esm2  
slurm-client –  19.05.5-1ubuntu0.1~esm2  
slurm-wlm –  19.05.5-1ubuntu0.1~esm2  
slurm-wlm-basic-plugins –  19.05.5-1ubuntu0.1~esm2  
slurmctld –  19.05.5-1ubuntu0.1~esm2  
slurmd –  19.05.5-1ubuntu0.1~esm2  
slurmdbd –  19.05.5-1ubuntu0.1~esm2  

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›