Risk | High |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2022-29500 CVE-2022-29501 |
CWE-ID | CWE-284 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
SUSE Linux Enterprise Module for HPC Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system slurm-webdoc Operating systems & Components / Operating system package or component slurm-torque-debuginfo Operating systems & Components / Operating system package or component slurm-torque Operating systems & Components / Operating system package or component slurm-sview-debuginfo Operating systems & Components / Operating system package or component slurm-sview Operating systems & Components / Operating system package or component slurm-sql-debuginfo Operating systems & Components / Operating system package or component slurm-sql Operating systems & Components / Operating system package or component slurm-slurmdbd-debuginfo Operating systems & Components / Operating system package or component slurm-slurmdbd Operating systems & Components / Operating system package or component slurm-sjstat Operating systems & Components / Operating system package or component slurm-seff Operating systems & Components / Operating system package or component slurm-rest-debuginfo Operating systems & Components / Operating system package or component slurm-rest Operating systems & Components / Operating system package or component slurm-plugins-debuginfo Operating systems & Components / Operating system package or component slurm-plugins Operating systems & Components / Operating system package or component slurm-pam_slurm-debuginfo Operating systems & Components / Operating system package or component slurm-pam_slurm Operating systems & Components / Operating system package or component slurm-openlava Operating systems & Components / Operating system package or component slurm-node-debuginfo Operating systems & Components / Operating system package or component slurm-node Operating systems & Components / Operating system package or component slurm-munge-debuginfo Operating systems & Components / Operating system package or component slurm-munge Operating systems & Components / Operating system package or component slurm-lua-debuginfo Operating systems & Components / Operating system package or component slurm-lua Operating systems & Components / Operating system package or component slurm-hdf5-debuginfo Operating systems & Components / Operating system package or component slurm-hdf5 Operating systems & Components / Operating system package or component slurm-doc Operating systems & Components / Operating system package or component slurm-devel Operating systems & Components / Operating system package or component slurm-debugsource Operating systems & Components / Operating system package or component slurm-debuginfo Operating systems & Components / Operating system package or component slurm-cray-debuginfo Operating systems & Components / Operating system package or component slurm-cray Operating systems & Components / Operating system package or component slurm-config-man Operating systems & Components / Operating system package or component slurm-config Operating systems & Components / Operating system package or component slurm-auth-none-debuginfo Operating systems & Components / Operating system package or component slurm-auth-none Operating systems & Components / Operating system package or component slurm Operating systems & Components / Operating system package or component perl-slurm-debuginfo Operating systems & Components / Operating system package or component perl-slurm Operating systems & Components / Operating system package or component libslurm36-debuginfo Operating systems & Components / Operating system package or component libslurm36 Operating systems & Components / Operating system package or component libpmi0-debuginfo Operating systems & Components / Operating system package or component libpmi0 Operating systems & Components / Operating system package or component libnss_slurm2-debuginfo Operating systems & Components / Operating system package or component libnss_slurm2 Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU62865
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-29500
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote attacker can obtain sensitive information credentials for the SlurmUser account.
MitigationUpdate the affected package slurm to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for HPC: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
slurm-webdoc: before 20.11.9-150300.4.6.1
slurm-torque-debuginfo: before 20.11.9-150300.4.6.1
slurm-torque: before 20.11.9-150300.4.6.1
slurm-sview-debuginfo: before 20.11.9-150300.4.6.1
slurm-sview: before 20.11.9-150300.4.6.1
slurm-sql-debuginfo: before 20.11.9-150300.4.6.1
slurm-sql: before 20.11.9-150300.4.6.1
slurm-slurmdbd-debuginfo: before 20.11.9-150300.4.6.1
slurm-slurmdbd: before 20.11.9-150300.4.6.1
slurm-sjstat: before 20.11.9-150300.4.6.1
slurm-seff: before 20.11.9-150300.4.6.1
slurm-rest-debuginfo: before 20.11.9-150300.4.6.1
slurm-rest: before 20.11.9-150300.4.6.1
slurm-plugins-debuginfo: before 20.11.9-150300.4.6.1
slurm-plugins: before 20.11.9-150300.4.6.1
slurm-pam_slurm-debuginfo: before 20.11.9-150300.4.6.1
slurm-pam_slurm: before 20.11.9-150300.4.6.1
slurm-openlava: before 20.11.9-150300.4.6.1
slurm-node-debuginfo: before 20.11.9-150300.4.6.1
slurm-node: before 20.11.9-150300.4.6.1
slurm-munge-debuginfo: before 20.11.9-150300.4.6.1
slurm-munge: before 20.11.9-150300.4.6.1
slurm-lua-debuginfo: before 20.11.9-150300.4.6.1
slurm-lua: before 20.11.9-150300.4.6.1
slurm-hdf5-debuginfo: before 20.11.9-150300.4.6.1
slurm-hdf5: before 20.11.9-150300.4.6.1
slurm-doc: before 20.11.9-150300.4.6.1
slurm-devel: before 20.11.9-150300.4.6.1
slurm-debugsource: before 20.11.9-150300.4.6.1
slurm-debuginfo: before 20.11.9-150300.4.6.1
slurm-cray-debuginfo: before 20.11.9-150300.4.6.1
slurm-cray: before 20.11.9-150300.4.6.1
slurm-config-man: before 20.11.9-150300.4.6.1
slurm-config: before 20.11.9-150300.4.6.1
slurm-auth-none-debuginfo: before 20.11.9-150300.4.6.1
slurm-auth-none: before 20.11.9-150300.4.6.1
slurm: before 20.11.9-150300.4.6.1
perl-slurm-debuginfo: before 20.11.9-150300.4.6.1
perl-slurm: before 20.11.9-150300.4.6.1
libslurm36-debuginfo: before 20.11.9-150300.4.6.1
libslurm36: before 20.11.9-150300.4.6.1
libpmi0-debuginfo: before 20.11.9-150300.4.6.1
libpmi0: before 20.11.9-150300.4.6.1
libnss_slurm2-debuginfo: before 20.11.9-150300.4.6.1
libnss_slurm2: before 20.11.9-150300.4.6.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20221666-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU62864
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-29501
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in a network RPC handler in the slurmd daemon used for PMI2 and PMIx support. A remote attacker can bypass implemented security restrictions and gain unauthorized access to the application.
MitigationUpdate the affected package slurm to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for HPC: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
slurm-webdoc: before 20.11.9-150300.4.6.1
slurm-torque-debuginfo: before 20.11.9-150300.4.6.1
slurm-torque: before 20.11.9-150300.4.6.1
slurm-sview-debuginfo: before 20.11.9-150300.4.6.1
slurm-sview: before 20.11.9-150300.4.6.1
slurm-sql-debuginfo: before 20.11.9-150300.4.6.1
slurm-sql: before 20.11.9-150300.4.6.1
slurm-slurmdbd-debuginfo: before 20.11.9-150300.4.6.1
slurm-slurmdbd: before 20.11.9-150300.4.6.1
slurm-sjstat: before 20.11.9-150300.4.6.1
slurm-seff: before 20.11.9-150300.4.6.1
slurm-rest-debuginfo: before 20.11.9-150300.4.6.1
slurm-rest: before 20.11.9-150300.4.6.1
slurm-plugins-debuginfo: before 20.11.9-150300.4.6.1
slurm-plugins: before 20.11.9-150300.4.6.1
slurm-pam_slurm-debuginfo: before 20.11.9-150300.4.6.1
slurm-pam_slurm: before 20.11.9-150300.4.6.1
slurm-openlava: before 20.11.9-150300.4.6.1
slurm-node-debuginfo: before 20.11.9-150300.4.6.1
slurm-node: before 20.11.9-150300.4.6.1
slurm-munge-debuginfo: before 20.11.9-150300.4.6.1
slurm-munge: before 20.11.9-150300.4.6.1
slurm-lua-debuginfo: before 20.11.9-150300.4.6.1
slurm-lua: before 20.11.9-150300.4.6.1
slurm-hdf5-debuginfo: before 20.11.9-150300.4.6.1
slurm-hdf5: before 20.11.9-150300.4.6.1
slurm-doc: before 20.11.9-150300.4.6.1
slurm-devel: before 20.11.9-150300.4.6.1
slurm-debugsource: before 20.11.9-150300.4.6.1
slurm-debuginfo: before 20.11.9-150300.4.6.1
slurm-cray-debuginfo: before 20.11.9-150300.4.6.1
slurm-cray: before 20.11.9-150300.4.6.1
slurm-config-man: before 20.11.9-150300.4.6.1
slurm-config: before 20.11.9-150300.4.6.1
slurm-auth-none-debuginfo: before 20.11.9-150300.4.6.1
slurm-auth-none: before 20.11.9-150300.4.6.1
slurm: before 20.11.9-150300.4.6.1
perl-slurm-debuginfo: before 20.11.9-150300.4.6.1
perl-slurm: before 20.11.9-150300.4.6.1
libslurm36-debuginfo: before 20.11.9-150300.4.6.1
libslurm36: before 20.11.9-150300.4.6.1
libpmi0-debuginfo: before 20.11.9-150300.4.6.1
libpmi0: before 20.11.9-150300.4.6.1
libnss_slurm2-debuginfo: before 20.11.9-150300.4.6.1
libnss_slurm2: before 20.11.9-150300.4.6.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20221666-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.