It was discovered that Slurm did not properly handle access control when dealing with RPC traffic through PMI2 and PMIx, which could allow an unprivileged user to send data to an arbitrary unix socket on the host. An attacker could possibly use this issue to execute arbitrary code as the root user.
{
"binaries": [
{
"binary_name": "libpam-slurm",
"binary_version": "2.6.5-1ubuntu0.1~esm7"
},
{
"binary_name": "libpmi0",
"binary_version": "2.6.5-1ubuntu0.1~esm7"
},
{
"binary_name": "libslurm-perl",
"binary_version": "2.6.5-1ubuntu0.1~esm7"
},
{
"binary_name": "libslurm26",
"binary_version": "2.6.5-1ubuntu0.1~esm7"
},
{
"binary_name": "libslurmdb-perl",
"binary_version": "2.6.5-1ubuntu0.1~esm7"
},
{
"binary_name": "libslurmdb26",
"binary_version": "2.6.5-1ubuntu0.1~esm7"
},
{
"binary_name": "slurm-llnl",
"binary_version": "2.6.5-1ubuntu0.1~esm7"
},
{
"binary_name": "slurm-llnl-basic-plugins",
"binary_version": "2.6.5-1ubuntu0.1~esm7"
},
{
"binary_name": "slurm-llnl-slurmdbd",
"binary_version": "2.6.5-1ubuntu0.1~esm7"
},
{
"binary_name": "slurm-llnl-sview",
"binary_version": "2.6.5-1ubuntu0.1~esm7"
},
{
"binary_name": "slurm-llnl-torque",
"binary_version": "2.6.5-1ubuntu0.1~esm7"
}
],
"availability": "Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro"
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8197-1.json"
{
"ecosystem": "Ubuntu:Pro:14.04:LTS",
"cves": [
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "high"
}
],
"id": "CVE-2022-29501"
}
]
}
{
"binaries": [
{
"binary_name": "libpam-slurm",
"binary_version": "15.08.7-1ubuntu0.1~esm6"
},
{
"binary_name": "libpmi0",
"binary_version": "15.08.7-1ubuntu0.1~esm6"
},
{
"binary_name": "libslurm-perl",
"binary_version": "15.08.7-1ubuntu0.1~esm6"
},
{
"binary_name": "libslurm29",
"binary_version": "15.08.7-1ubuntu0.1~esm6"
},
{
"binary_name": "libslurmdb-perl",
"binary_version": "15.08.7-1ubuntu0.1~esm6"
},
{
"binary_name": "libslurmdb29",
"binary_version": "15.08.7-1ubuntu0.1~esm6"
},
{
"binary_name": "slurm-client",
"binary_version": "15.08.7-1ubuntu0.1~esm6"
},
{
"binary_name": "slurm-client-emulator",
"binary_version": "15.08.7-1ubuntu0.1~esm6"
},
{
"binary_name": "slurm-llnl",
"binary_version": "15.08.7-1ubuntu0.1~esm6"
},
{
"binary_name": "slurm-llnl-slurmdbd",
"binary_version": "15.08.7-1ubuntu0.1~esm6"
},
{
"binary_name": "slurm-wlm",
"binary_version": "15.08.7-1ubuntu0.1~esm6"
},
{
"binary_name": "slurm-wlm-basic-plugins",
"binary_version": "15.08.7-1ubuntu0.1~esm6"
},
{
"binary_name": "slurm-wlm-emulator",
"binary_version": "15.08.7-1ubuntu0.1~esm6"
},
{
"binary_name": "slurm-wlm-torque",
"binary_version": "15.08.7-1ubuntu0.1~esm6"
},
{
"binary_name": "slurmctld",
"binary_version": "15.08.7-1ubuntu0.1~esm6"
},
{
"binary_name": "slurmd",
"binary_version": "15.08.7-1ubuntu0.1~esm6"
},
{
"binary_name": "slurmdbd",
"binary_version": "15.08.7-1ubuntu0.1~esm6"
},
{
"binary_name": "sview",
"binary_version": "15.08.7-1ubuntu0.1~esm6"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8197-1.json"
{
"ecosystem": "Ubuntu:Pro:16.04:LTS",
"cves": [
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "high"
}
],
"id": "CVE-2022-29501"
}
]
}
{
"binaries": [
{
"binary_name": "libpam-slurm",
"binary_version": "17.11.2-1ubuntu0.1~esm5"
},
{
"binary_name": "libpmi0",
"binary_version": "17.11.2-1ubuntu0.1~esm5"
},
{
"binary_name": "libpmi2-0",
"binary_version": "17.11.2-1ubuntu0.1~esm5"
},
{
"binary_name": "libslurm-perl",
"binary_version": "17.11.2-1ubuntu0.1~esm5"
},
{
"binary_name": "libslurm32",
"binary_version": "17.11.2-1ubuntu0.1~esm5"
},
{
"binary_name": "libslurmdb-perl",
"binary_version": "17.11.2-1ubuntu0.1~esm5"
},
{
"binary_name": "libslurmdb32",
"binary_version": "17.11.2-1ubuntu0.1~esm5"
},
{
"binary_name": "slurm-client",
"binary_version": "17.11.2-1ubuntu0.1~esm5"
},
{
"binary_name": "slurm-client-emulator",
"binary_version": "17.11.2-1ubuntu0.1~esm5"
},
{
"binary_name": "slurm-wlm",
"binary_version": "17.11.2-1ubuntu0.1~esm5"
},
{
"binary_name": "slurm-wlm-basic-plugins",
"binary_version": "17.11.2-1ubuntu0.1~esm5"
},
{
"binary_name": "slurm-wlm-emulator",
"binary_version": "17.11.2-1ubuntu0.1~esm5"
},
{
"binary_name": "slurm-wlm-torque",
"binary_version": "17.11.2-1ubuntu0.1~esm5"
},
{
"binary_name": "slurmctld",
"binary_version": "17.11.2-1ubuntu0.1~esm5"
},
{
"binary_name": "slurmd",
"binary_version": "17.11.2-1ubuntu0.1~esm5"
},
{
"binary_name": "slurmdbd",
"binary_version": "17.11.2-1ubuntu0.1~esm5"
},
{
"binary_name": "sview",
"binary_version": "17.11.2-1ubuntu0.1~esm5"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8197-1.json"
{
"ecosystem": "Ubuntu:Pro:18.04:LTS",
"cves": [
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "high"
}
],
"id": "CVE-2022-29501"
}
]
}