First published: Tue Jun 16 2009(Updated: )
Simple Linux Utility for Resource Management (SLURM) 1.2 and 1.3 before 1.3.14 does not properly set supplementary groups before invoking (1) sbcast from the slurmd daemon or (2) strigger from the slurmctld daemon, which might allow local SLURM users to modify files and gain privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SchedMD Slurm | <=1.3.13 | |
SchedMD Slurm | =1.2 | |
SchedMD Slurm | =1.3 | |
SchedMD Slurm | =1.3.1 | |
SchedMD Slurm | =1.3.2 | |
SchedMD Slurm | =1.3.3 | |
SchedMD Slurm | =1.3.4 | |
SchedMD Slurm | =1.3.5 | |
SchedMD Slurm | =1.3.6 | |
SchedMD Slurm | =1.3.7 | |
SchedMD Slurm | =1.3.8 | |
SchedMD Slurm | =1.3.9 | |
SchedMD Slurm | =1.3.10 | |
SchedMD Slurm | =1.3.11 | |
SchedMD Slurm | =1.3.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2084 is considered to have a medium severity due to the potential for privilege escalation.
To fix CVE-2009-2084, upgrade SLURM to version 1.3.14 or later.
CVE-2009-2084 affects SLURM versions 1.2, 1.3, and all versions up to 1.3.13.
CVE-2009-2084 exploits improper setting of supplementary groups in the sbcast and strigger operations.
Local SLURM users could exploit CVE-2009-2084 to modify files and gain additional privileges.