vulnerability
FreeBSD: VID-76C2110B-9E97-11EE-AE23-A0F3C100AE18 (CVE-2023-49935): slurm-wlm -- Several security issues
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
9 | (AV:N/AC:L/Au:S/C:C/I:C/A:C) | Nov 29, 2023 | Dec 20, 2023 | Jan 28, 2025 |
Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Published
Nov 29, 2023
Added
Dec 20, 2023
Modified
Jan 28, 2025
Description
An issue was discovered in SchedMD Slurm 23.02.x and 23.11.x. There is Incorrect Access Control because of a slurmd Message Integrity Bypass. An attacker can reuse root-level authentication tokens during interaction with the slurmd process. This bypasses the RPC message hashes that protect against undesired MUNGE credential reuse. The fixed versions are 23.02.7 and 23.11.1.
Solution
freebsd-upgrade-package-slurm-wlm
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.