{"id":"USN-4781-1","summary":"slurm-llnl vulnerabilities","details":"It was discovered that Slurm incorrectly handled certain messages\nbetween the daemon and the user. An attacker could possibly use this\nissue to assume control of an arbitrary file on the system. This\nissue only affected Ubuntu 16.04 ESM.\n(CVE-2016-10030)\n\nIt was discovered that Slurm mishandled SPANK environment variables.\nAn attacker could possibly use this issue to gain elevated privileges.\nThis issue only affected Ubuntu 16.04 ESM. (CVE-2017-15566)\n\nIt was discovered that Slurm mishandled certain SQL queries. A local\nattacker could use this issue to gain elevated privileges. This\nissue only affected Ubuntu 14.04 ESM, Ubuntu 16.04 ESM and\nUbuntu 18.04 ESM. (CVE-2018-7033)\n\nIt was discovered that Slurm mishandled user names and group ids. A local\nattacker could use this issue to gain administrative privileges.\nThis issue only affected Ubuntu 14.04 ESM and Ubuntu 18.04 ESM.\n(CVE-2018-10995)\n\nIt was discovered that Slurm mishandled 23-bit systems. A local attacker\ncould use this to gain administrative privileges. This issue only affected\nUbuntu 14.04 ESM, Ubuntu 16.04 ESM and Ubuntu 18.04 ESM. (CVE-2019-6438)\n\nIt was discovered that Slurm incorrectly handled certain inputs\nwhen Message Aggregation is enabled. An attacker could possibly\nuse this issue to launch a process as an arbitrary user.\nThis issue only affected Ubuntu 16.04 ESM, Ubuntu 18.04 ESM\nand Ubuntu 20.04 ESM. (CVE-2020-12693)\n\nIt was discovered that Slurm incorrectly handled certain RPC inputs.\nAn attacker could possibly use this issue to execute arbitrary code.\nThis issue only affected Ubuntu 18.04 ESM and Ubuntu 20.04 ESM.\n(CVE-2020-27745)\n\nJonas Stare discovered that Slurm exposes sensitive information related\nto the X protocol. An attacker could possibly use this issue to obtain\na graphical session from an arbitrary user. This issue only affected\nUbuntu 18.04 ESM and Ubuntu 20.04 ESM. (CVE-2020-27746)\n\nIt was discovered that Slurm incorrectly handled environment parameters.\nAn attacker could possibly use this issue to execute arbitrary code.\n(CVE-2021-31215)\n","modified":"2026-05-20T16:02:59.037780235Z","published":"2022-05-25T10:41:59Z","related":["UBUNTU-CVE-2016-10030","UBUNTU-CVE-2017-15566","UBUNTU-CVE-2018-10995","UBUNTU-CVE-2018-7033","UBUNTU-CVE-2019-6438","UBUNTU-CVE-2020-12693","UBUNTU-CVE-2020-27745","UBUNTU-CVE-2020-27746","UBUNTU-CVE-2021-31215"],"upstream":["CVE-2016-10030","CVE-2017-15566","CVE-2018-10995","CVE-2018-7033","CVE-2019-6438","CVE-2020-12693","CVE-2020-27745","CVE-2020-27746","CVE-2021-31215","UBUNTU-CVE-2016-10030","UBUNTU-CVE-2017-15566","UBUNTU-CVE-2018-10995","UBUNTU-CVE-2018-7033","UBUNTU-CVE-2019-6438","UBUNTU-CVE-2020-12693","UBUNTU-CVE-2020-27745","UBUNTU-CVE-2020-27746","UBUNTU-CVE-2021-31215"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4781-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-10030"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-15566"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-7033"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-10995"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-6438"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-12693"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-27745"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-27746"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-31215"}],"affected":[{"package":{"name":"slurm-llnl","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/slurm-llnl?arch=source&distro=trusty%2Fesm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.6.5-1ubuntu0.1~esm5"}]}],"versions":["2.5.7-1","2.5.7-1build1","2.6.4-1ubuntu1","2.6.5-1","2.6.5-1ubuntu0.1~esm4"],"ecosystem_specific":{"binaries":[{"binary_name":"libpam-slurm","binary_version":"2.6.5-1ubuntu0.1~esm5"},{"binary_name":"libpmi0","binary_version":"2.6.5-1ubuntu0.1~esm5"},{"binary_name":"libslurm-perl","binary_version":"2.6.5-1ubuntu0.1~esm5"},{"binary_name":"libslurm26","binary_version":"2.6.5-1ubuntu0.1~esm5"},{"binary_name":"libslurmdb-perl","binary_version":"2.6.5-1ubuntu0.1~esm5"},{"binary_name":"libslurmdb26","binary_version":"2.6.5-1ubuntu0.1~esm5"},{"binary_name":"slurm-llnl","binary_version":"2.6.5-1ubuntu0.1~esm5"},{"binary_name":"slurm-llnl-basic-plugins","binary_version":"2.6.5-1ubuntu0.1~esm5"},{"binary_name":"slurm-llnl-slurmdbd","binary_version":"2.6.5-1ubuntu0.1~esm5"},{"binary_name":"slurm-llnl-sview","binary_version":"2.6.5-1ubuntu0.1~esm5"},{"binary_name":"slurm-llnl-torque","binary_version":"2.6.5-1ubuntu0.1~esm5"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4781-1.json","cves_map":{"cves":[{"id":"CVE-2021-31215","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:Pro:14.04:LTS"}}},{"package":{"name":"slurm-llnl","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/slurm-llnl?arch=source&distro=esm-infra-legacy%2Fxenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"15.08.7-1ubuntu0.1~esm4"}]}],"versions":["14.11.8-4","15.08.4-1build1","15.08.4-1build2","15.08.7-1","15.08.7-1build1","15.08.7-1ubuntu0.1~esm3"],"ecosystem_specific":{"binaries":[{"binary_name":"slurmctld","binary_version":"15.08.7-1ubuntu0.1~esm4"},{"binary_name":"libslurmdb-perl","binary_version":"15.08.7-1ubuntu0.1~esm4"},{"binary_name":"libpam-slurm","binary_version":"15.08.7-1ubuntu0.1~esm4"},{"binary_name":"libpmi0","binary_version":"15.08.7-1ubuntu0.1~esm4"},{"binary_name":"slurm-wlm","binary_version":"15.08.7-1ubuntu0.1~esm4"},{"binary_name":"slurm-client","binary_version":"15.08.7-1ubuntu0.1~esm4"},{"binary_name":"libslurm29","binary_version":"15.08.7-1ubuntu0.1~esm4"},{"binary_name":"slurmd","binary_version":"15.08.7-1ubuntu0.1~esm4"},{"binary_name":"slurm-wlm-torque","binary_version":"15.08.7-1ubuntu0.1~esm4"},{"binary_name":"slurm-client-emulator","binary_version":"15.08.7-1ubuntu0.1~esm4"},{"binary_name":"slurm-wlm-emulator","binary_version":"15.08.7-1ubuntu0.1~esm4"},{"binary_name":"libslurmdb29","binary_version":"15.08.7-1ubuntu0.1~esm4"},{"binary_name":"slurm-llnl","binary_version":"15.08.7-1ubuntu0.1~esm4"},{"binary_name":"slurm-llnl-slurmdbd","binary_version":"15.08.7-1ubuntu0.1~esm4"},{"binary_name":"libslurm-perl","binary_version":"15.08.7-1ubuntu0.1~esm4"},{"binary_name":"sview","binary_version":"15.08.7-1ubuntu0.1~esm4"},{"binary_name":"slurm-wlm-basic-plugins","binary_version":"15.08.7-1ubuntu0.1~esm4"},{"binary_name":"slurmdbd","binary_version":"15.08.7-1ubuntu0.1~esm4"}],"availability":"Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4781-1.json","cves_map":{"cves":[],"ecosystem":"Ubuntu:Pro:16.04:LTS"}}},{"package":{"name":"slurm-llnl","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/slurm-llnl?arch=source&distro=esm-apps%2Fbionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"17.11.2-1ubuntu0.1~esm4"}]}],"versions":["17.02.6-1build1","17.02.9-1","17.11.2-1build1","17.11.2-1ubuntu0.1~esm3"],"ecosystem_specific":{"binaries":[{"binary_name":"libpam-slurm","binary_version":"17.11.2-1ubuntu0.1~esm4"},{"binary_name":"libpmi0","binary_version":"17.11.2-1ubuntu0.1~esm4"},{"binary_name":"libpmi2-0","binary_version":"17.11.2-1ubuntu0.1~esm4"},{"binary_name":"libslurm-perl","binary_version":"17.11.2-1ubuntu0.1~esm4"},{"binary_name":"libslurm32","binary_version":"17.11.2-1ubuntu0.1~esm4"},{"binary_name":"libslurmdb-perl","binary_version":"17.11.2-1ubuntu0.1~esm4"},{"binary_name":"libslurmdb32","binary_version":"17.11.2-1ubuntu0.1~esm4"},{"binary_name":"slurm-client","binary_version":"17.11.2-1ubuntu0.1~esm4"},{"binary_name":"slurm-client-emulator","binary_version":"17.11.2-1ubuntu0.1~esm4"},{"binary_name":"slurm-wlm","binary_version":"17.11.2-1ubuntu0.1~esm4"},{"binary_name":"slurm-wlm-basic-plugins","binary_version":"17.11.2-1ubuntu0.1~esm4"},{"binary_name":"slurm-wlm-emulator","binary_version":"17.11.2-1ubuntu0.1~esm4"},{"binary_name":"slurm-wlm-torque","binary_version":"17.11.2-1ubuntu0.1~esm4"},{"binary_name":"slurmctld","binary_version":"17.11.2-1ubuntu0.1~esm4"},{"binary_name":"slurmd","binary_version":"17.11.2-1ubuntu0.1~esm4"},{"binary_name":"slurmdbd","binary_version":"17.11.2-1ubuntu0.1~esm4"},{"binary_name":"sview","binary_version":"17.11.2-1ubuntu0.1~esm4"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4781-1.json","cves_map":{"cves":[{"id":"CVE-2020-12693","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-27745","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-27746","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-31215","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:Pro:18.04:LTS"}}},{"package":{"name":"slurm-llnl","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/slurm-llnl?arch=source&distro=esm-apps%2Ffocal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"19.05.5-1ubuntu0.1~esm1"}]}],"versions":["19.05.3.2-2","19.05.3.2-2build1","19.05.5-1"],"ecosystem_specific":{"binaries":[{"binary_name":"libpam-slurm","binary_version":"19.05.5-1ubuntu0.1~esm1"},{"binary_name":"libpam-slurm-adopt","binary_version":"19.05.5-1ubuntu0.1~esm1"},{"binary_name":"libpmi0","binary_version":"19.05.5-1ubuntu0.1~esm1"},{"binary_name":"libpmi2-0","binary_version":"19.05.5-1ubuntu0.1~esm1"},{"binary_name":"libslurm-perl","binary_version":"19.05.5-1ubuntu0.1~esm1"},{"binary_name":"libslurm34","binary_version":"19.05.5-1ubuntu0.1~esm1"},{"binary_name":"libslurmdb-perl","binary_version":"19.05.5-1ubuntu0.1~esm1"},{"binary_name":"slurm-client","binary_version":"19.05.5-1ubuntu0.1~esm1"},{"binary_name":"slurm-client-emulator","binary_version":"19.05.5-1ubuntu0.1~esm1"},{"binary_name":"slurm-wlm","binary_version":"19.05.5-1ubuntu0.1~esm1"},{"binary_name":"slurm-wlm-basic-plugins","binary_version":"19.05.5-1ubuntu0.1~esm1"},{"binary_name":"slurm-wlm-emulator","binary_version":"19.05.5-1ubuntu0.1~esm1"},{"binary_name":"slurm-wlm-torque","binary_version":"19.05.5-1ubuntu0.1~esm1"},{"binary_name":"slurmctld","binary_version":"19.05.5-1ubuntu0.1~esm1"},{"binary_name":"slurmd","binary_version":"19.05.5-1ubuntu0.1~esm1"},{"binary_name":"slurmdbd","binary_version":"19.05.5-1ubuntu0.1~esm1"},{"binary_name":"sview","binary_version":"19.05.5-1ubuntu0.1~esm1"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4781-1.json","cves_map":{"cves":[{"id":"CVE-2020-12693","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-27745","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-27746","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-31215","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:Pro:20.04:LTS"}}}],"schema_version":"1.7.5"}