CVE-2021-31215 Affecting slurm_20_11-munge package, versions <20.11.7-3.11.1
Threat Intelligence
EPSS
0.42% (75th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-SLES151-SLURM2011MUNGE-2679097
- published 14 Apr 2022
- disclosed 27 May 2021
Introduced: 27 May 2021
CVE-2021-31215 Open this link in a new tabHow to fix?
Upgrade SLES:15.1 slurm_20_11-munge to version 20.11.7-3.11.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream slurm_20_11-munge package and not the slurm_20_11-munge package as distributed by SLES.
See How to fix? for SLES:15.1 relevant fixed versions and status.
SchedMD Slurm before 20.02.7 and 20.03.x through 20.11.x before 20.11.7 allows remote code execution as SlurmUser because use of a PrologSlurmctld or EpilogSlurmctld script leads to environment mishandling.
References
- https://www.suse.com/security/cve/CVE-2021-31215.html
- https://bugzilla.suse.com/1186024
- https://lists.schedmd.com/pipermail/slurm-announce/2021/000055.html
- https://www.schedmd.com/news.php?id=248#OPT_248
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRHTASFAU5FNB2MJOG67YID2ONQS5MCQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ODMJQNY4FAV7G3DSKVIO5KY7Q7DKBPU/
- https://lists.debian.org/debian-lts-announce/2022/01/msg00011.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ODMJQNY4FAV7G3DSKVIO5KY7Q7DKBPU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRHTASFAU5FNB2MJOG67YID2ONQS5MCQ/
CVSS Scores
version 3.1