Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2022-29500

Published: 5 May 2022

SchedMD Slurm 21.08.x through 20.11.x has Incorrect Access Control that leads to Information Disclosure.

Notes

AuthorNote
ebarretto
According to upstream:
"This issue impacts all Slurm releases since at least Slurm 1.0.0.
Due to the severity of the CVE-2022-29500 issue, SchedMD has
removed all prior Slurm releases from our download site.
SchedMD only issues security fixes for the supported releases
(currently 21.08 and 20.11). Due to the complexity of these fixes,
we do not recommend attempting to backport the fixes to older
releases, and strongly encourage sites to upgrade to fixed versions
immediately."
Therefore we won't be patching slurm-llnl

Priority

High

Cvss 3 Severity Score

8.8

Score breakdown

Status

Package Release Status
slurm-llnl
Launchpad, Ubuntu, Debian
bionic Ignored

focal
Released (19.05.5-1ubuntu0.1~esm2)
Available with Ubuntu Pro
jammy Does not exist

kinetic Does not exist

lunar Does not exist

mantic Does not exist

trusty Ignored

upstream
Released (21.08.8, 20.11.9)
xenial Ignored

Patches:
upstream: https://github.com/SchedMD/slurm/commit/5b78f713f4b2e390ce80ad754b1240ad36e355ee
upstream: https://github.com/SchedMD/slurm/commit/500787548cf3da22cc69ca2111ce51f77543849b


slurm-wlm
Launchpad, Ubuntu, Debian
bionic Does not exist

focal Does not exist

impish Ignored
(end of life)
jammy
Released (21.08.5-2ubuntu1+esm1)
Available with Ubuntu Pro
kinetic Ignored
(end of life, was needed)
lunar Not vulnerable
(22.05.8-3)
mantic Not vulnerable
(23.02.3-2ubuntu1)
trusty Does not exist

upstream
Released (21.08.8.2-1, 21.08.8, 20.11.9)
Patches:


upstream: https://github.com/SchedMD/slurm/commit/5b78f713f4b2e390ce80ad754b1240ad36e355ee
upstream: https://github.com/SchedMD/slurm/commit/500787548cf3da22cc69ca2111ce51f77543849b

Severity score breakdown

Parameter Value
Base score 8.8
Attack vector Network
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H