CVE-2023-49935

An issue was discovered in SchedMD Slurm 23.02.x and 23.11.x. There is Incorrect Access Control because of a slurmd Message Integrity Bypass. An attacker can reuse root-level authentication tokens during interaction with the slurmd process. This bypasses the RPC message hashes that protect against undesired MUNGE credential reuse. The fixed versions are 23.02.7 and 23.11.1.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.8 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 9%
VendorProductVersion
schedmdslurm
23.02 ≤
𝑥
< 23.02.7
schedmdslurm
23.11
schedmdslurm
23.11:rc1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
slurm-wlm
bullseye (security)
20.11.7+really20.11.4-2+deb11u1
fixed
bullseye
20.11.7+really20.11.4-2+deb11u1
not-affected
bookworm
22.05.8-4+deb12u2
not-affected
bookworm (security)
22.05.8-4+deb12u2
fixed
trixie
24.11.0-1.1
fixed
sid
24.11.0-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
slurm-llnl
oracular
dne
noble
dne
mantic
dne
lunar
dne
jammy
dne
focal
needs-triage
bionic
needs-triage
xenial
needs-triage
trusty
ignored
slurm-wlm
oracular
needs-triage
noble
needs-triage
mantic
ignored
lunar
ignored
jammy
needs-triage
focal
dne
bionic
ignored
xenial
ignored
trusty
ignored