vulnerability
SUSE: CVE-2023-49938: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:L/Au:N/C:C/I:P/A:N) | Dec 14, 2023 | Feb 1, 2024 | Jan 28, 2025 |
Severity
9
CVSS
(AV:N/AC:L/Au:N/C:C/I:P/A:N)
Published
Dec 14, 2023
Added
Feb 1, 2024
Modified
Jan 28, 2025
Description
An issue was discovered in SchedMD Slurm 22.05.x and 23.02.x. There is Incorrect Access Control: an attacker can modified their extended group list that is used with the sbcast subsystem, and open files with an unauthorized set of extended groups. The fixed versions are 22.05.11 and 23.02.7.
Solutions
suse-upgrade-libnss_slurm2suse-upgrade-libnss_slurm2_20_02suse-upgrade-libnss_slurm2_20_11suse-upgrade-libnss_slurm2_22_05suse-upgrade-libnss_slurm2_23_02suse-upgrade-libpmi0suse-upgrade-libpmi0_18_08suse-upgrade-libpmi0_20_02suse-upgrade-libpmi0_20_11suse-upgrade-libpmi0_22_05suse-upgrade-libpmi0_23_02suse-upgrade-libslurm31suse-upgrade-libslurm33suse-upgrade-libslurm35suse-upgrade-libslurm36suse-upgrade-libslurm38suse-upgrade-libslurm39suse-upgrade-perl-slurmsuse-upgrade-perl-slurm_18_08suse-upgrade-perl-slurm_20_02suse-upgrade-perl-slurm_20_11suse-upgrade-perl-slurm_22_05suse-upgrade-perl-slurm_23_02suse-upgrade-slurmsuse-upgrade-slurm-auth-nonesuse-upgrade-slurm-configsuse-upgrade-slurm-config-mansuse-upgrade-slurm-craysuse-upgrade-slurm-develsuse-upgrade-slurm-docsuse-upgrade-slurm-hdf5suse-upgrade-slurm-luasuse-upgrade-slurm-mungesuse-upgrade-slurm-nodesuse-upgrade-slurm-openlavasuse-upgrade-slurm-pam_slurmsuse-upgrade-slurm-plugin-ext-sensors-rrdsuse-upgrade-slurm-pluginssuse-upgrade-slurm-restsuse-upgrade-slurm-sched-wikisuse-upgrade-slurm-seffsuse-upgrade-slurm-sjstatsuse-upgrade-slurm-slurmdb-directsuse-upgrade-slurm-slurmdbdsuse-upgrade-slurm-sqlsuse-upgrade-slurm-sviewsuse-upgrade-slurm-testsuitesuse-upgrade-slurm-torquesuse-upgrade-slurm-webdocsuse-upgrade-slurm_18_08suse-upgrade-slurm_18_08-auth-nonesuse-upgrade-slurm_18_08-configsuse-upgrade-slurm_18_08-develsuse-upgrade-slurm_18_08-docsuse-upgrade-slurm_18_08-luasuse-upgrade-slurm_18_08-mungesuse-upgrade-slurm_18_08-nodesuse-upgrade-slurm_18_08-pam_slurmsuse-upgrade-slurm_18_08-pluginssuse-upgrade-slurm_18_08-slurmdbdsuse-upgrade-slurm_18_08-sqlsuse-upgrade-slurm_18_08-torquesuse-upgrade-slurm_20_02suse-upgrade-slurm_20_02-auth-nonesuse-upgrade-slurm_20_02-configsuse-upgrade-slurm_20_02-config-mansuse-upgrade-slurm_20_02-craysuse-upgrade-slurm_20_02-develsuse-upgrade-slurm_20_02-docsuse-upgrade-slurm_20_02-hdf5suse-upgrade-slurm_20_02-luasuse-upgrade-slurm_20_02-mungesuse-upgrade-slurm_20_02-nodesuse-upgrade-slurm_20_02-openlavasuse-upgrade-slurm_20_02-pam_slurmsuse-upgrade-slurm_20_02-pluginssuse-upgrade-slurm_20_02-restsuse-upgrade-slurm_20_02-seffsuse-upgrade-slurm_20_02-sjstatsuse-upgrade-slurm_20_02-slurmdbdsuse-upgrade-slurm_20_02-sqlsuse-upgrade-slurm_20_02-sviewsuse-upgrade-slurm_20_02-testsuitesuse-upgrade-slurm_20_02-torquesuse-upgrade-slurm_20_02-webdocsuse-upgrade-slurm_20_11suse-upgrade-slurm_20_11-auth-nonesuse-upgrade-slurm_20_11-configsuse-upgrade-slurm_20_11-config-mansuse-upgrade-slurm_20_11-craysuse-upgrade-slurm_20_11-develsuse-upgrade-slurm_20_11-docsuse-upgrade-slurm_20_11-hdf5suse-upgrade-slurm_20_11-luasuse-upgrade-slurm_20_11-mungesuse-upgrade-slurm_20_11-nodesuse-upgrade-slurm_20_11-openlavasuse-upgrade-slurm_20_11-pam_slurmsuse-upgrade-slurm_20_11-pluginssuse-upgrade-slurm_20_11-restsuse-upgrade-slurm_20_11-seffsuse-upgrade-slurm_20_11-sjstatsuse-upgrade-slurm_20_11-slurmdbdsuse-upgrade-slurm_20_11-sqlsuse-upgrade-slurm_20_11-sviewsuse-upgrade-slurm_20_11-torquesuse-upgrade-slurm_20_11-webdocsuse-upgrade-slurm_22_05suse-upgrade-slurm_22_05-auth-nonesuse-upgrade-slurm_22_05-configsuse-upgrade-slurm_22_05-config-mansuse-upgrade-slurm_22_05-craysuse-upgrade-slurm_22_05-develsuse-upgrade-slurm_22_05-docsuse-upgrade-slurm_22_05-hdf5suse-upgrade-slurm_22_05-luasuse-upgrade-slurm_22_05-mungesuse-upgrade-slurm_22_05-nodesuse-upgrade-slurm_22_05-openlavasuse-upgrade-slurm_22_05-pam_slurmsuse-upgrade-slurm_22_05-pluginssuse-upgrade-slurm_22_05-restsuse-upgrade-slurm_22_05-seffsuse-upgrade-slurm_22_05-sjstatsuse-upgrade-slurm_22_05-slurmdbdsuse-upgrade-slurm_22_05-sqlsuse-upgrade-slurm_22_05-sviewsuse-upgrade-slurm_22_05-testsuitesuse-upgrade-slurm_22_05-torquesuse-upgrade-slurm_22_05-webdocsuse-upgrade-slurm_23_02suse-upgrade-slurm_23_02-auth-nonesuse-upgrade-slurm_23_02-configsuse-upgrade-slurm_23_02-config-mansuse-upgrade-slurm_23_02-craysuse-upgrade-slurm_23_02-develsuse-upgrade-slurm_23_02-docsuse-upgrade-slurm_23_02-luasuse-upgrade-slurm_23_02-mungesuse-upgrade-slurm_23_02-nodesuse-upgrade-slurm_23_02-pam_slurmsuse-upgrade-slurm_23_02-plugin-ext-sensors-rrdsuse-upgrade-slurm_23_02-pluginssuse-upgrade-slurm_23_02-slurmdbdsuse-upgrade-slurm_23_02-sqlsuse-upgrade-slurm_23_02-sviewsuse-upgrade-slurm_23_02-torquesuse-upgrade-slurm_23_02-webdoc
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.