vulnerability

SUSE: CVE-2023-49935: SUSE Linux Security Advisory

Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Published
Dec 14, 2023
Added
Feb 1, 2024
Modified
Jan 28, 2025

Description

An issue was discovered in SchedMD Slurm 23.02.x and 23.11.x. There is Incorrect Access Control because of a slurmd Message Integrity Bypass. An attacker can reuse root-level authentication tokens during interaction with the slurmd process. This bypasses the RPC message hashes that protect against undesired MUNGE credential reuse. The fixed versions are 23.02.7 and 23.11.1.

Solutions

suse-upgrade-libnss_slurm2suse-upgrade-libnss_slurm2_23_02suse-upgrade-libpmi0suse-upgrade-libpmi0_23_02suse-upgrade-libslurm39suse-upgrade-perl-slurmsuse-upgrade-perl-slurm_23_02suse-upgrade-slurmsuse-upgrade-slurm-auth-nonesuse-upgrade-slurm-configsuse-upgrade-slurm-config-mansuse-upgrade-slurm-craysuse-upgrade-slurm-develsuse-upgrade-slurm-docsuse-upgrade-slurm-hdf5suse-upgrade-slurm-luasuse-upgrade-slurm-mungesuse-upgrade-slurm-nodesuse-upgrade-slurm-openlavasuse-upgrade-slurm-pam_slurmsuse-upgrade-slurm-plugin-ext-sensors-rrdsuse-upgrade-slurm-pluginssuse-upgrade-slurm-restsuse-upgrade-slurm-seffsuse-upgrade-slurm-sjstatsuse-upgrade-slurm-slurmdbdsuse-upgrade-slurm-sqlsuse-upgrade-slurm-sviewsuse-upgrade-slurm-testsuitesuse-upgrade-slurm-torquesuse-upgrade-slurm-webdocsuse-upgrade-slurm_23_02suse-upgrade-slurm_23_02-auth-nonesuse-upgrade-slurm_23_02-configsuse-upgrade-slurm_23_02-config-mansuse-upgrade-slurm_23_02-craysuse-upgrade-slurm_23_02-develsuse-upgrade-slurm_23_02-docsuse-upgrade-slurm_23_02-luasuse-upgrade-slurm_23_02-mungesuse-upgrade-slurm_23_02-nodesuse-upgrade-slurm_23_02-pam_slurmsuse-upgrade-slurm_23_02-plugin-ext-sensors-rrdsuse-upgrade-slurm_23_02-pluginssuse-upgrade-slurm_23_02-slurmdbdsuse-upgrade-slurm_23_02-sqlsuse-upgrade-slurm_23_02-sviewsuse-upgrade-slurm_23_02-torquesuse-upgrade-slurm_23_02-webdoc
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.