CVE-2022-29500
Published: 5 May 2022
SchedMD Slurm 21.08.x through 20.11.x has Incorrect Access Control that leads to Information Disclosure.
Notes
Author | Note |
---|---|
ebarretto | According to upstream: "This issue impacts all Slurm releases since at least Slurm 1.0.0. Due to the severity of the CVE-2022-29500 issue, SchedMD has removed all prior Slurm releases from our download site. SchedMD only issues security fixes for the supported releases (currently 21.08 and 20.11). Due to the complexity of these fixes, we do not recommend attempting to backport the fixes to older releases, and strongly encourage sites to upgrade to fixed versions immediately." Therefore we won't be patching slurm-llnl |
Priority
Status
Package | Release | Status |
---|---|---|
slurm-llnl Launchpad, Ubuntu, Debian |
bionic |
Ignored
|
focal |
Released
(19.05.5-1ubuntu0.1~esm2)
Available with Ubuntu Pro |
|
jammy |
Does not exist
|
|
kinetic |
Does not exist
|
|
lunar |
Does not exist
|
|
mantic |
Does not exist
|
|
trusty |
Ignored
|
|
upstream |
Released
(21.08.8, 20.11.9)
|
|
xenial |
Ignored
|
|
Patches: upstream: https://github.com/SchedMD/slurm/commit/5b78f713f4b2e390ce80ad754b1240ad36e355ee upstream: https://github.com/SchedMD/slurm/commit/500787548cf3da22cc69ca2111ce51f77543849b |
||
slurm-wlm Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
focal |
Does not exist
|
|
impish |
Ignored
(end of life)
|
|
jammy |
Released
(21.08.5-2ubuntu1+esm1)
Available with Ubuntu Pro |
|
kinetic |
Ignored
(end of life, was needed)
|
|
lunar |
Not vulnerable
(22.05.8-3)
|
|
mantic |
Not vulnerable
(23.02.3-2ubuntu1)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(21.08.8.2-1, 21.08.8, 20.11.9)
|
|
Patches: upstream: https://github.com/SchedMD/slurm/commit/5b78f713f4b2e390ce80ad754b1240ad36e355ee upstream: https://github.com/SchedMD/slurm/commit/500787548cf3da22cc69ca2111ce51f77543849b |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
References
- https://lists.schedmd.com/pipermail/slurm-announce/2022/000072.html
- https://github.com/SchedMD/slurm/commit/500787548cf3da22cc69ca2111ce51f77543849b (slurm-21-08-8-1)
- https://github.com/SchedMD/slurm/commit/5b78f713f4b2e390ce80ad754b1240ad36e355ee (slurm-20-11-9-1)
- https://lists.schedmd.com/pipermail/slurm-announce/
- https://www.schedmd.com/news.php
- https://www.schedmd.com/news.php?id=260
- https://ubuntu.com/security/notices/USN-6458-1
- https://www.cve.org/CVERecord?id=CVE-2022-29500
- NVD
- Launchpad
- Debian