vulnerability
SUSE: CVE-2023-49933: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:N/I:C/A:N) | Dec 14, 2023 | Feb 1, 2024 | Jan 28, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:C/A:N)
Published
Dec 14, 2023
Added
Feb 1, 2024
Modified
Jan 28, 2025
Description
An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. There is Improper Enforcement of Message Integrity During Transmission in a Communication Channel. This allows attackers to modify RPC traffic in a way that bypasses message hash checks. The fixed versions are 22.05.11, 23.02.7, and 23.11.1.
Solution(s)
suse-upgrade-libnss_slurm2suse-upgrade-libnss_slurm2_20_02suse-upgrade-libnss_slurm2_20_11suse-upgrade-libnss_slurm2_22_05suse-upgrade-libnss_slurm2_23_02suse-upgrade-libpmi0suse-upgrade-libpmi0_18_08suse-upgrade-libpmi0_20_02suse-upgrade-libpmi0_20_11suse-upgrade-libpmi0_22_05suse-upgrade-libpmi0_23_02suse-upgrade-libslurm31suse-upgrade-libslurm33suse-upgrade-libslurm35suse-upgrade-libslurm36suse-upgrade-libslurm38suse-upgrade-libslurm39suse-upgrade-perl-slurmsuse-upgrade-perl-slurm_18_08suse-upgrade-perl-slurm_20_02suse-upgrade-perl-slurm_20_11suse-upgrade-perl-slurm_22_05suse-upgrade-perl-slurm_23_02suse-upgrade-slurmsuse-upgrade-slurm-auth-nonesuse-upgrade-slurm-configsuse-upgrade-slurm-config-mansuse-upgrade-slurm-craysuse-upgrade-slurm-develsuse-upgrade-slurm-docsuse-upgrade-slurm-hdf5suse-upgrade-slurm-luasuse-upgrade-slurm-mungesuse-upgrade-slurm-nodesuse-upgrade-slurm-openlavasuse-upgrade-slurm-pam_slurmsuse-upgrade-slurm-plugin-ext-sensors-rrdsuse-upgrade-slurm-pluginssuse-upgrade-slurm-restsuse-upgrade-slurm-sched-wikisuse-upgrade-slurm-seffsuse-upgrade-slurm-sjstatsuse-upgrade-slurm-slurmdb-directsuse-upgrade-slurm-slurmdbdsuse-upgrade-slurm-sqlsuse-upgrade-slurm-sviewsuse-upgrade-slurm-testsuitesuse-upgrade-slurm-torquesuse-upgrade-slurm-webdocsuse-upgrade-slurm_18_08suse-upgrade-slurm_18_08-auth-nonesuse-upgrade-slurm_18_08-configsuse-upgrade-slurm_18_08-develsuse-upgrade-slurm_18_08-docsuse-upgrade-slurm_18_08-luasuse-upgrade-slurm_18_08-mungesuse-upgrade-slurm_18_08-nodesuse-upgrade-slurm_18_08-pam_slurmsuse-upgrade-slurm_18_08-pluginssuse-upgrade-slurm_18_08-slurmdbdsuse-upgrade-slurm_18_08-sqlsuse-upgrade-slurm_18_08-torquesuse-upgrade-slurm_20_02suse-upgrade-slurm_20_02-auth-nonesuse-upgrade-slurm_20_02-configsuse-upgrade-slurm_20_02-config-mansuse-upgrade-slurm_20_02-craysuse-upgrade-slurm_20_02-develsuse-upgrade-slurm_20_02-docsuse-upgrade-slurm_20_02-hdf5suse-upgrade-slurm_20_02-luasuse-upgrade-slurm_20_02-mungesuse-upgrade-slurm_20_02-nodesuse-upgrade-slurm_20_02-openlavasuse-upgrade-slurm_20_02-pam_slurmsuse-upgrade-slurm_20_02-pluginssuse-upgrade-slurm_20_02-restsuse-upgrade-slurm_20_02-seffsuse-upgrade-slurm_20_02-sjstatsuse-upgrade-slurm_20_02-slurmdbdsuse-upgrade-slurm_20_02-sqlsuse-upgrade-slurm_20_02-sviewsuse-upgrade-slurm_20_02-testsuitesuse-upgrade-slurm_20_02-torquesuse-upgrade-slurm_20_02-webdocsuse-upgrade-slurm_20_11suse-upgrade-slurm_20_11-auth-nonesuse-upgrade-slurm_20_11-configsuse-upgrade-slurm_20_11-config-mansuse-upgrade-slurm_20_11-craysuse-upgrade-slurm_20_11-develsuse-upgrade-slurm_20_11-docsuse-upgrade-slurm_20_11-hdf5suse-upgrade-slurm_20_11-luasuse-upgrade-slurm_20_11-mungesuse-upgrade-slurm_20_11-nodesuse-upgrade-slurm_20_11-openlavasuse-upgrade-slurm_20_11-pam_slurmsuse-upgrade-slurm_20_11-pluginssuse-upgrade-slurm_20_11-restsuse-upgrade-slurm_20_11-seffsuse-upgrade-slurm_20_11-sjstatsuse-upgrade-slurm_20_11-slurmdbdsuse-upgrade-slurm_20_11-sqlsuse-upgrade-slurm_20_11-sviewsuse-upgrade-slurm_20_11-torquesuse-upgrade-slurm_20_11-webdocsuse-upgrade-slurm_22_05suse-upgrade-slurm_22_05-auth-nonesuse-upgrade-slurm_22_05-configsuse-upgrade-slurm_22_05-config-mansuse-upgrade-slurm_22_05-craysuse-upgrade-slurm_22_05-develsuse-upgrade-slurm_22_05-docsuse-upgrade-slurm_22_05-hdf5suse-upgrade-slurm_22_05-luasuse-upgrade-slurm_22_05-mungesuse-upgrade-slurm_22_05-nodesuse-upgrade-slurm_22_05-openlavasuse-upgrade-slurm_22_05-pam_slurmsuse-upgrade-slurm_22_05-pluginssuse-upgrade-slurm_22_05-restsuse-upgrade-slurm_22_05-seffsuse-upgrade-slurm_22_05-sjstatsuse-upgrade-slurm_22_05-slurmdbdsuse-upgrade-slurm_22_05-sqlsuse-upgrade-slurm_22_05-sviewsuse-upgrade-slurm_22_05-testsuitesuse-upgrade-slurm_22_05-torquesuse-upgrade-slurm_22_05-webdocsuse-upgrade-slurm_23_02suse-upgrade-slurm_23_02-auth-nonesuse-upgrade-slurm_23_02-configsuse-upgrade-slurm_23_02-config-mansuse-upgrade-slurm_23_02-craysuse-upgrade-slurm_23_02-develsuse-upgrade-slurm_23_02-docsuse-upgrade-slurm_23_02-luasuse-upgrade-slurm_23_02-mungesuse-upgrade-slurm_23_02-nodesuse-upgrade-slurm_23_02-pam_slurmsuse-upgrade-slurm_23_02-plugin-ext-sensors-rrdsuse-upgrade-slurm_23_02-pluginssuse-upgrade-slurm_23_02-slurmdbdsuse-upgrade-slurm_23_02-sqlsuse-upgrade-slurm_23_02-sviewsuse-upgrade-slurm_23_02-torquesuse-upgrade-slurm_23_02-webdoc

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.