An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. There is Improper Enforcement of Message Integrity During Transmission in a Communication Channel. This allows attackers to modify RPC traffic in a way that bypasses message hash checks. The fixed versions are 22.05.11, 23.02.7, and 23.11.1.
References
Configurations
Configuration 1 (hide)
|
History
03 Jan 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Dec 2023, 18:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.schedmd.com/pipermail/slurm-announce/2023/000103.html - Mailing List, Vendor Advisory | |
References | () https://www.schedmd.com/security-archive.php - Vendor Advisory | |
CPE | cpe:2.3:a:schedmd:slurm:23.11:rc1:*:*:*:*:*:* cpe:2.3:a:schedmd:slurm:23.11:-:*:*:*:*:*:* cpe:2.3:a:schedmd:slurm:*:*:*:*:*:*:*:* |
|
First Time |
Schedmd
Schedmd slurm |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | CWE-924 |
14 Dec 2023, 13:52
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-14 05:15
Updated : 2024-02-28 20:54
NVD link : CVE-2023-49933
Mitre link : CVE-2023-49933
CVE.ORG link : CVE-2023-49933
JSON object : View
Products Affected
schedmd
- slurm
CWE
CWE-924
Improper Enforcement of Message Integrity During Transmission in a Communication Channel