December 9th, 2023
Slurm vulnerabilities
Package(s) : qlustar-module-slurm-focal-amd64-12.0.3,
qlustar-module-slurm-jammy-amd64-13.1,
qlustar-module-slurm-centos8-amd64-13.1
Qlustar releases : 12.0, 13
Affected versions: All versions prior to this update
Vulnerability : Privilege escalation
Problem type : local
Qlustar-specific : no
CVE Id(s) : CVE-2023-41914
A number of race conditions have been identified within the slurmd/slurmstepd processes that can lead to the user taking ownership of an arbitrary file on the system. A related issue can lead to the user overwriting an arbitrary file on the compute node (although with data that is not directly under their control). A related issue can also lead to the user deleting all files and sub-directories of an arbitrary target directory on the compute node.
François Diakhate (CEA) reported the original issue and subsequently, a number of related issues were found during an extensive audit of Slurm’s filesystem handling code in reaction to that report. They are included here in this same disclosure.
The problem can be corrected by updating your system to the following or more recent package versions:
qlustar-module-slurm-jammy-amd64-13.1 13.1.2-b569f1521
qlustar-module-slurm-centos8-amd64-13.1 13.1.2-b569f1521
qlustar-module-core-focal-amd64-12.0.3 12.0.3.1-b566f1520