SUSE update for slurm



Published: 2021-05-31
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2021-31215
CWE-ID CWE-264
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
SUSE Linux Enterprise High Performance Computing
Operating systems & Components / Operating system

slurm-torque-debuginfo
Operating systems & Components / Operating system package or component

slurm-torque
Operating systems & Components / Operating system package or component

slurm-sview-debuginfo
Operating systems & Components / Operating system package or component

slurm-sview
Operating systems & Components / Operating system package or component

slurm-sql-debuginfo
Operating systems & Components / Operating system package or component

slurm-sql
Operating systems & Components / Operating system package or component

slurm-slurmdbd-debuginfo
Operating systems & Components / Operating system package or component

slurm-slurmdbd
Operating systems & Components / Operating system package or component

slurm-plugins-debuginfo
Operating systems & Components / Operating system package or component

slurm-plugins
Operating systems & Components / Operating system package or component

slurm-pam_slurm-debuginfo
Operating systems & Components / Operating system package or component

slurm-pam_slurm
Operating systems & Components / Operating system package or component

slurm-node-debuginfo
Operating systems & Components / Operating system package or component

slurm-node
Operating systems & Components / Operating system package or component

slurm-munge-debuginfo
Operating systems & Components / Operating system package or component

slurm-munge
Operating systems & Components / Operating system package or component

slurm-lua-debuginfo
Operating systems & Components / Operating system package or component

slurm-lua
Operating systems & Components / Operating system package or component

slurm-doc
Operating systems & Components / Operating system package or component

slurm-devel
Operating systems & Components / Operating system package or component

slurm-debugsource
Operating systems & Components / Operating system package or component

slurm-debuginfo
Operating systems & Components / Operating system package or component

slurm-config-man
Operating systems & Components / Operating system package or component

slurm-config
Operating systems & Components / Operating system package or component

slurm-auth-none-debuginfo
Operating systems & Components / Operating system package or component

slurm-auth-none
Operating systems & Components / Operating system package or component

slurm
Operating systems & Components / Operating system package or component

perl-slurm-debuginfo
Operating systems & Components / Operating system package or component

perl-slurm
Operating systems & Components / Operating system package or component

libslurm33-debuginfo
Operating systems & Components / Operating system package or component

libslurm33
Operating systems & Components / Operating system package or component

libpmi0-debuginfo
Operating systems & Components / Operating system package or component

libpmi0
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Security restrictions bypass

EUVDB-ID: #VU53685

Risk: Medium

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-31215

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to improper environment handling in Slurm. A remote user can run arbitrary commands as SlurmUser if the installation uses a PrologSlurmctld and/or EpilogSlurmctld script.

Mitigation

Update the affected package slurm to the latest version.

Vulnerable software versions

SUSE Linux Enterprise High Performance Computing: 15-SP1-ESPOS - 15-SP1-LTSS

slurm-torque-debuginfo: before 18.08.9-3.19.1

slurm-torque: before 18.08.9-3.19.1

slurm-sview-debuginfo: before 18.08.9-3.19.1

slurm-sview: before 18.08.9-3.19.1

slurm-sql-debuginfo: before 18.08.9-3.19.1

slurm-sql: before 18.08.9-3.19.1

slurm-slurmdbd-debuginfo: before 18.08.9-3.19.1

slurm-slurmdbd: before 18.08.9-3.19.1

slurm-plugins-debuginfo: before 18.08.9-3.19.1

slurm-plugins: before 18.08.9-3.19.1

slurm-pam_slurm-debuginfo: before 18.08.9-3.19.1

slurm-pam_slurm: before 18.08.9-3.19.1

slurm-node-debuginfo: before 18.08.9-3.19.1

slurm-node: before 18.08.9-3.19.1

slurm-munge-debuginfo: before 18.08.9-3.19.1

slurm-munge: before 18.08.9-3.19.1

slurm-lua-debuginfo: before 18.08.9-3.19.1

slurm-lua: before 18.08.9-3.19.1

slurm-doc: before 18.08.9-3.19.1

slurm-devel: before 18.08.9-3.19.1

slurm-debugsource: before 18.08.9-3.19.1

slurm-debuginfo: before 18.08.9-3.19.1

slurm-config-man: before 18.08.9-3.19.1

slurm-config: before 18.08.9-3.19.1

slurm-auth-none-debuginfo: before 18.08.9-3.19.1

slurm-auth-none: before 18.08.9-3.19.1

slurm: before 18.08.9-3.19.1

perl-slurm-debuginfo: before 18.08.9-3.19.1

perl-slurm: before 18.08.9-3.19.1

libslurm33-debuginfo: before 18.08.9-3.19.1

libslurm33: before 18.08.9-3.19.1

libpmi0-debuginfo: before 18.08.9-3.19.1

libpmi0: before 18.08.9-3.19.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2021/suse-su-20211811-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###