It was discovered that Slurm did not correctly handle certain file system operations. An attacker could possibly use this issue to modify files or leak sensitive information. This issue only affected Ubuntu 22.04 LTS. (CVE-2023-41914)
Ryan Hall discovered that Slurm did not correctly enforce certain message integrity checks. An attacker could possibly use this issue to bypass integrity checks. This issue only affected Ubuntu 22.04 LTS. (CVE-2023-49933)
Ryan Hall discovered that Slurm did not correctly handle certain memory operations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2023-49937)
Ryan Hall discovered that Slurm did not correctly handle certain access control mechanisms. An attacker could possibly use this issue to modify files or leak sensitive information. This issue only affected Ubuntu 22.04 LTS. (CVE-2023-49938)
It was discovered that Slurm did not correctly handle user promotion. An attacker could possibly use this issue to promote themselves to an administrator. (CVE-2025-43904)
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "21.08.5-2ubuntu1+esm2",
"binary_name": "libpam-slurm"
},
{
"binary_version": "21.08.5-2ubuntu1+esm2",
"binary_name": "libpam-slurm-adopt"
},
{
"binary_version": "21.08.5-2ubuntu1+esm2",
"binary_name": "libpmi0"
},
{
"binary_version": "21.08.5-2ubuntu1+esm2",
"binary_name": "libpmi2-0"
},
{
"binary_version": "21.08.5-2ubuntu1+esm2",
"binary_name": "libslurm-perl"
},
{
"binary_version": "21.08.5-2ubuntu1+esm2",
"binary_name": "libslurm37"
},
{
"binary_version": "21.08.5-2ubuntu1+esm2",
"binary_name": "libslurmdb-perl"
},
{
"binary_version": "21.08.5-2ubuntu1+esm2",
"binary_name": "slurm-client"
},
{
"binary_version": "21.08.5-2ubuntu1+esm2",
"binary_name": "slurm-client-emulator"
},
{
"binary_version": "21.08.5-2ubuntu1+esm2",
"binary_name": "slurm-wlm"
},
{
"binary_version": "21.08.5-2ubuntu1+esm2",
"binary_name": "slurm-wlm-basic-plugins"
},
{
"binary_version": "21.08.5-2ubuntu1+esm2",
"binary_name": "slurm-wlm-emulator"
},
{
"binary_version": "21.08.5-2ubuntu1+esm2",
"binary_name": "slurm-wlm-torque"
},
{
"binary_version": "21.08.5-2ubuntu1+esm2",
"binary_name": "slurmctld"
},
{
"binary_version": "21.08.5-2ubuntu1+esm2",
"binary_name": "slurmd"
},
{
"binary_version": "21.08.5-2ubuntu1+esm2",
"binary_name": "slurmdbd"
},
{
"binary_version": "21.08.5-2ubuntu1+esm2",
"binary_name": "slurmrestd"
},
{
"binary_version": "21.08.5-2ubuntu1+esm2",
"binary_name": "sview"
}
]
}
{
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2023-41914"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2023-49933"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2023-49937"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2023-49938"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2025-43904"
}
],
"ecosystem": "Ubuntu:Pro:22.04:LTS"
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8236-1.json"
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "libpam-slurm"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "libpam-slurm-adopt"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "libpmi0t64"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "libpmi2-0t64"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "libslurm-perl"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "libslurm40t64"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "libslurmdb-perl"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "sackd"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "slurm-client"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "slurm-client-emulator"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "slurm-wlm"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "slurm-wlm-basic-plugins"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "slurm-wlm-elasticsearch-plugin"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "slurm-wlm-emulator"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "slurm-wlm-hdf5-plugin"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "slurm-wlm-influxdb-plugin"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "slurm-wlm-ipmi-plugins"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "slurm-wlm-jwt-plugin"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "slurm-wlm-kafka-plugin"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "slurm-wlm-mysql-plugin"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "slurm-wlm-plugins"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "slurm-wlm-rrd-plugin"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "slurm-wlm-rsmi-plugin"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "slurm-wlm-torque"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "slurmctld"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "slurmd"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "slurmdbd"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "slurmrestd"
},
{
"binary_version": "23.11.4-1.2ubuntu5+esm1",
"binary_name": "sview"
}
]
}
{
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2025-43904"
}
],
"ecosystem": "Ubuntu:Pro:24.04:LTS"
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8236-1.json"