We are pleased to announce the availability of Slurm version 25.11.3.
25.11.3 fixes a number of stability issues, regressions, and a variety
of other bugs, including the following:
* Fix multiple issues with dynamic topology when power saving is enabled
* Fix a backfill performance regression when using bf_licenses
* Fix race conditions when shutting down slurmctld or slurmdbd that
cause crashes or hangs
* Fix slurmctld crashing when using enable_async_reply and TLS
* Fix regression from 25.05 which caused usercpu and systemcpu to be
missing for job steps
* Fix regression that caused thread limits in slurmd to not be respected
for incoming RPCs
* Prevent the double-removal of accounting usage for jobs being requeued
that are in the COMPLETED or COMPLETING state
The full list of changes is available in the CHANGELOG file:
https://github.com/SchedMD/slurm/blob/slurm-25.11/CHANGELOG/slurm-25.11.md
Slurm can be downloaded from:
https://github.com/SchedMD/slurm/releases
One note on some updates to our release process - we've started
publishing the releases directly on GitHub, in parallel to their usual
location on the SchedMD web server. If you 'star' the Slurm repository
you can automatically receive notices when new releases are published
there. You can also subscribe to the RSS/Atom feed through:
https://github.com/SchedMD/slurm/releases.atom
- Tim
--
Tim Wickberg
Director, System Software, Slurm and Slinky, NVIDIA
MUNGE just announced a serious security issue as CVE-2026-25506:
https://github.com/dun/munge/security/advisories/GHSA-r9cr-jf4v-75gh
The issue is entirely within MUNGE - specifically in the munged daemon.
However, as most Slurm installations explicitly trust MUNGE as the
source of authentication, Slurm's security is immediately undermined if
an attacker were to exploit that issue and gain access to the MUNGE key.
On Slurm clusters you should treat that security issue as if it were
local-root exploit.
If you have switched to Slurm's built-in authentication ("auth/slurm"),
you are not impacted by this issue. (However, we do not recommend
switching over as a mitigation - you cannot safely change authentication
types in Slurm while jobs are currently running.)
I strongly encourage sites to get install the fixed packages from the
upstream distros and restart the munged daemon on all nodes. If you
install and restart munged promptly then Slurm should be unaffected.
You do not need to rebuild Slurm for this issue. The MUNGE ABI/API
remain unchanged, so there is no need to recompile Slurm, and there are
no patches to apply to Slurm related to this issue.
If you are concerned that an attacker could have compromised the MUNGE
key itself, you may want to rotate that key. Unfortunately there's no
mechanism to safely handle this key rotation with the cluster
operational, and I do not recommend key rotation as long as you're
installing and restarting MUNGE ASAP.
- Tim
--
Tim Wickberg
Director, System Software, Slurm and Slinky, NVIDIA