Risk | High |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2022-29500 CVE-2022-29501 CVE-2022-31251 |
CWE-ID | CWE-284 CWE-276 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
SUSE Linux Enterprise High Performance Computing Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system slurm-torque-debuginfo Operating systems & Components / Operating system package or component slurm-torque Operating systems & Components / Operating system package or component slurm-sview-debuginfo Operating systems & Components / Operating system package or component slurm-sview Operating systems & Components / Operating system package or component slurm-sql-debuginfo Operating systems & Components / Operating system package or component slurm-sql Operating systems & Components / Operating system package or component slurm-slurmdbd-debuginfo Operating systems & Components / Operating system package or component slurm-slurmdbd Operating systems & Components / Operating system package or component slurm-plugins-debuginfo Operating systems & Components / Operating system package or component slurm-plugins Operating systems & Components / Operating system package or component slurm-pam_slurm-debuginfo Operating systems & Components / Operating system package or component slurm-pam_slurm Operating systems & Components / Operating system package or component slurm-node-debuginfo Operating systems & Components / Operating system package or component slurm-node Operating systems & Components / Operating system package or component slurm-munge-debuginfo Operating systems & Components / Operating system package or component slurm-munge Operating systems & Components / Operating system package or component slurm-lua-debuginfo Operating systems & Components / Operating system package or component slurm-lua Operating systems & Components / Operating system package or component slurm-doc Operating systems & Components / Operating system package or component slurm-devel Operating systems & Components / Operating system package or component slurm-debugsource Operating systems & Components / Operating system package or component slurm-debuginfo Operating systems & Components / Operating system package or component slurm-config-man Operating systems & Components / Operating system package or component slurm-config Operating systems & Components / Operating system package or component slurm-auth-none-debuginfo Operating systems & Components / Operating system package or component slurm-auth-none Operating systems & Components / Operating system package or component slurm Operating systems & Components / Operating system package or component perl-slurm-debuginfo Operating systems & Components / Operating system package or component perl-slurm Operating systems & Components / Operating system package or component libpmi0-debuginfo Operating systems & Components / Operating system package or component libpmi0 Operating systems & Components / Operating system package or component libslurm33-debuginfo Operating systems & Components / Operating system package or component libslurm33 Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU62865
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-29500
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote attacker can obtain sensitive information credentials for the SlurmUser account.
MitigationUpdate the affected package slurm to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing: 15-SP1-LTSS - 15-SP1-ESPOS
openSUSE Leap: 15.3 - 15.4
slurm-torque-debuginfo: before 18.08.9-150100.3.22.1
slurm-torque: before 18.08.9-150100.3.22.1
slurm-sview-debuginfo: before 18.08.9-150100.3.22.1
slurm-sview: before 18.08.9-150100.3.22.1
slurm-sql-debuginfo: before 18.08.9-150100.3.22.1
slurm-sql: before 18.08.9-150100.3.22.1
slurm-slurmdbd-debuginfo: before 18.08.9-150100.3.22.1
slurm-slurmdbd: before 18.08.9-150100.3.22.1
slurm-plugins-debuginfo: before 18.08.9-150100.3.22.1
slurm-plugins: before 18.08.9-150100.3.22.1
slurm-pam_slurm-debuginfo: before 18.08.9-150100.3.22.1
slurm-pam_slurm: before 18.08.9-150100.3.22.1
slurm-node-debuginfo: before 18.08.9-150100.3.22.1
slurm-node: before 18.08.9-150100.3.22.1
slurm-munge-debuginfo: before 18.08.9-150100.3.22.1
slurm-munge: before 18.08.9-150100.3.22.1
slurm-lua-debuginfo: before 18.08.9-150100.3.22.1
slurm-lua: before 18.08.9-150100.3.22.1
slurm-doc: before 18.08.9-150100.3.22.1
slurm-devel: before 18.08.9-150100.3.22.1
slurm-debugsource: before 18.08.9-150100.3.22.1
slurm-debuginfo: before 18.08.9-150100.3.22.1
slurm-config-man: before 18.08.9-150100.3.22.1
slurm-config: before 18.08.9-150100.3.22.1
slurm-auth-none-debuginfo: before 18.08.9-150100.3.22.1
slurm-auth-none: before 18.08.9-150100.3.22.1
slurm: before 18.08.9-150100.3.22.1
perl-slurm-debuginfo: before 18.08.9-150100.3.22.1
perl-slurm: before 18.08.9-150100.3.22.1
libpmi0-debuginfo: before 18.08.9-150100.3.22.1
libpmi0: before 18.08.9-150100.3.22.1
libslurm33-debuginfo: before 18.08.9-150100.3.22.1
libslurm33: before 18.08.9-150100.3.22.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223468-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU62864
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-29501
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in a network RPC handler in the slurmd daemon used for PMI2 and PMIx support. A remote attacker can bypass implemented security restrictions and gain unauthorized access to the application.
MitigationUpdate the affected package slurm to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing: 15-SP1-LTSS - 15-SP1-ESPOS
openSUSE Leap: 15.3 - 15.4
slurm-torque-debuginfo: before 18.08.9-150100.3.22.1
slurm-torque: before 18.08.9-150100.3.22.1
slurm-sview-debuginfo: before 18.08.9-150100.3.22.1
slurm-sview: before 18.08.9-150100.3.22.1
slurm-sql-debuginfo: before 18.08.9-150100.3.22.1
slurm-sql: before 18.08.9-150100.3.22.1
slurm-slurmdbd-debuginfo: before 18.08.9-150100.3.22.1
slurm-slurmdbd: before 18.08.9-150100.3.22.1
slurm-plugins-debuginfo: before 18.08.9-150100.3.22.1
slurm-plugins: before 18.08.9-150100.3.22.1
slurm-pam_slurm-debuginfo: before 18.08.9-150100.3.22.1
slurm-pam_slurm: before 18.08.9-150100.3.22.1
slurm-node-debuginfo: before 18.08.9-150100.3.22.1
slurm-node: before 18.08.9-150100.3.22.1
slurm-munge-debuginfo: before 18.08.9-150100.3.22.1
slurm-munge: before 18.08.9-150100.3.22.1
slurm-lua-debuginfo: before 18.08.9-150100.3.22.1
slurm-lua: before 18.08.9-150100.3.22.1
slurm-doc: before 18.08.9-150100.3.22.1
slurm-devel: before 18.08.9-150100.3.22.1
slurm-debugsource: before 18.08.9-150100.3.22.1
slurm-debuginfo: before 18.08.9-150100.3.22.1
slurm-config-man: before 18.08.9-150100.3.22.1
slurm-config: before 18.08.9-150100.3.22.1
slurm-auth-none-debuginfo: before 18.08.9-150100.3.22.1
slurm-auth-none: before 18.08.9-150100.3.22.1
slurm: before 18.08.9-150100.3.22.1
perl-slurm-debuginfo: before 18.08.9-150100.3.22.1
perl-slurm: before 18.08.9-150100.3.22.1
libpmi0-debuginfo: before 18.08.9-150100.3.22.1
libpmi0: before 18.08.9-150100.3.22.1
libslurm33-debuginfo: before 18.08.9-150100.3.22.1
libslurm33: before 18.08.9-150100.3.22.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223468-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU67719
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-31251
CWE-ID:
CWE-276 - Incorrect Default Permissions
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to incorrect default permissions in slurm testsuite. A local user with access to the system can execute arbitrary code with root privileges.
MitigationUpdate the affected package slurm to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing: 15-SP1-LTSS - 15-SP1-ESPOS
openSUSE Leap: 15.3 - 15.4
slurm-torque-debuginfo: before 18.08.9-150100.3.22.1
slurm-torque: before 18.08.9-150100.3.22.1
slurm-sview-debuginfo: before 18.08.9-150100.3.22.1
slurm-sview: before 18.08.9-150100.3.22.1
slurm-sql-debuginfo: before 18.08.9-150100.3.22.1
slurm-sql: before 18.08.9-150100.3.22.1
slurm-slurmdbd-debuginfo: before 18.08.9-150100.3.22.1
slurm-slurmdbd: before 18.08.9-150100.3.22.1
slurm-plugins-debuginfo: before 18.08.9-150100.3.22.1
slurm-plugins: before 18.08.9-150100.3.22.1
slurm-pam_slurm-debuginfo: before 18.08.9-150100.3.22.1
slurm-pam_slurm: before 18.08.9-150100.3.22.1
slurm-node-debuginfo: before 18.08.9-150100.3.22.1
slurm-node: before 18.08.9-150100.3.22.1
slurm-munge-debuginfo: before 18.08.9-150100.3.22.1
slurm-munge: before 18.08.9-150100.3.22.1
slurm-lua-debuginfo: before 18.08.9-150100.3.22.1
slurm-lua: before 18.08.9-150100.3.22.1
slurm-doc: before 18.08.9-150100.3.22.1
slurm-devel: before 18.08.9-150100.3.22.1
slurm-debugsource: before 18.08.9-150100.3.22.1
slurm-debuginfo: before 18.08.9-150100.3.22.1
slurm-config-man: before 18.08.9-150100.3.22.1
slurm-config: before 18.08.9-150100.3.22.1
slurm-auth-none-debuginfo: before 18.08.9-150100.3.22.1
slurm-auth-none: before 18.08.9-150100.3.22.1
slurm: before 18.08.9-150100.3.22.1
perl-slurm-debuginfo: before 18.08.9-150100.3.22.1
perl-slurm: before 18.08.9-150100.3.22.1
libpmi0-debuginfo: before 18.08.9-150100.3.22.1
libpmi0: before 18.08.9-150100.3.22.1
libslurm33-debuginfo: before 18.08.9-150100.3.22.1
libslurm33: before 18.08.9-150100.3.22.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223468-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.