Documentation Index
Fetch the complete documentation index at: https://docs.coreweave.com/llms.txt
Use this file to discover all available pages before exploring further.
July 2024
CVE-2024-6387 - Qualys Security Advisory - Update Advisory
| Item | Description |
|---|---|
| Description | OpenSSH Remote Code Execution due to Race Condition in Signal Handling (CVE-2024-6387) |
| Severity | 8.1 |
| Impact to CoreWeave Platform | The CoreWeave platform and supporting infrastructure have been upgraded to prevent exploitation of this issue. |
| Potentially Affected Clients | Clients running vulnerable versions of OpenSSH server are vulnerable to this CVE. Clients running an OpenSSH server version equal to or greater than “8.5p1” and less than “9.8p1” are vulnerable to this issue and should take steps to remediate. In particular, clients using VirtualServers and Slurm may need to take action to upgrade their SSH servers to a patched version or use workarounds which prevent exploitation. |
| Actions Taken | Patching and Updates: Updates have been deployed inside of the CoreWeave platform and its supporting infrastructure. System Status: As of July 2nd, 2024 CoreWeave systems are operational and no outages to support upgrade operations are planned. Recommended Client Actions: Clients which run a VirtualServer, container, or Slurm login Pod that uses a version of OpenSSH server should upgrade their VirtualServer, container image, or Slurm login/compute Pod images in order to obtain a patched version. Alternatively, clients may apply workarounds to their SSH server configuration to limit or prevent exploitability. Clients running an OpenSSH server version equal to or greater than “8.5p1” and less than “9.8p1” are vulnerable to this issue and should take steps to remediate. |
Additional information
- For clients running an Ubuntu Linux distribution, see the Ubuntu Security Notice for this issue.
- For clients running a Rocky Linux distribution, see the Rocky Linux news page discussing this issue.
- For clients running a CentOS Linux distribution, see the CentOS documentation for this issue.
- Windows is not known to be affected by this issue at time of publishing.
SUNK/Slurm User Guidance
Clients who are not on a CoreWeave-managed instance of SUNK and who meet the criteria below should take action to ensure that SUNK is patched againstCVE-2024-6387:
- Are using SUNK versions
3.20.0through4.3.0 - Are using Ubuntu images in SUNK of
22.04or higher
- Add the following items to the
s6configuration for both login and compute Nodes in the chartvalues.yamlbeing used to deploy CoreWeave’s Slurm chart:
- Deploy these changes (if using ArgoCD, sync the changes with the cluster).
If using custom build images for SUNK, these commands can be integrated into the image build instead.
November 2023
CVE-2023-23583 - INTEL-SA-00950 Update Advisory
| Item | Description |
|---|---|
| Description | In response to Intel’s Platform Update advisory INTEL-SA-00950 (CVE-2023-23583), CoreWeave Engineering has proactively updated our systems to address the identified vulnerabilities within the named Intel products. |
| Severity | 8.8 |
| Impact to CoreWeave Platform | No impact has been observed as of this posting. CoreWeave systems have been upgraded and operational prior to public disclosure. |
| Potentially Affected Clients | No client impact as remediation has occurred prior to public disclosure. (Note: Intel components are used within our services, however, our proactive updates have ensured no client impact.) |
| Actions Taken | Patching and Updates: Updates have been implemented for INTEL-SA-00950 (CVE-2023-23583), ensuring compatibility and system integrity. System Status: As of November 14th, 2023, CoreWeave in-scope systems have been upgraded and are operational. Recommended Client Actions: No action is required. This advisory is informational only, to assure you of CoreWeave’s commitment to infrastructure security. |
December 2022
CVE-2022-42475
| Item | Description |
|---|---|
| Description | A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests. |
| Severity | 9.3 |
| Impact to CoreWeave Platform | Currently no known impact to CoreWeave Platform |
| Potentially Affected Clients | Clients using FortiOS |
| Recommended Actions | Vendor-recommended mitigations |