
Cloud Vulnerability DB
A community-led vulnerabilities database
SchedMD Slurm versions 21.08.x through 20.11.x contain an incorrect access control vulnerability (CVE-2022-29502) that leads to escalation of privileges. The vulnerability was discovered in April 2022 and affects the validation logic when processing input and output data with the srun client (Ubuntu Security).
The vulnerability stems from improper validation logic when processing input and output data with the srun client, which could lead to the interception of process I/O. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (Critical), indicating high severity across confidentiality, integrity, and availability impacts (Ubuntu CVE).
An attacker exploiting this vulnerability could potentially intercept process I/O communications, leading to exposure of sensitive information or execution of arbitrary code. This vulnerability specifically affected systems running Slurm versions 21.08.x through 20.11.x (Ubuntu Security).
The vulnerability has been fixed in version 21.08.8-2 of Slurm. System administrators are advised to update their Slurm installations to this version or later. For Ubuntu 22.04 LTS users, the fix is available in version 21.08.5-2ubuntu1+esm1 through Ubuntu Pro (Fedora Update, Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."