vulnerability

SUSE: CVE-2023-49938: SUSE Linux Security Advisory

Severity
9
CVSS
(AV:N/AC:L/Au:N/C:C/I:P/A:N)
Published
Dec 14, 2023
Added
Feb 1, 2024
Modified
Jan 28, 2025

Description

An issue was discovered in SchedMD Slurm 22.05.x and 23.02.x. There is Incorrect Access Control: an attacker can modified their extended group list that is used with the sbcast subsystem, and open files with an unauthorized set of extended groups. The fixed versions are 22.05.11 and 23.02.7.

Solutions

suse-upgrade-libnss_slurm2suse-upgrade-libnss_slurm2_20_02suse-upgrade-libnss_slurm2_20_11suse-upgrade-libnss_slurm2_22_05suse-upgrade-libnss_slurm2_23_02suse-upgrade-libpmi0suse-upgrade-libpmi0_18_08suse-upgrade-libpmi0_20_02suse-upgrade-libpmi0_20_11suse-upgrade-libpmi0_22_05suse-upgrade-libpmi0_23_02suse-upgrade-libslurm31suse-upgrade-libslurm33suse-upgrade-libslurm35suse-upgrade-libslurm36suse-upgrade-libslurm38suse-upgrade-libslurm39suse-upgrade-perl-slurmsuse-upgrade-perl-slurm_18_08suse-upgrade-perl-slurm_20_02suse-upgrade-perl-slurm_20_11suse-upgrade-perl-slurm_22_05suse-upgrade-perl-slurm_23_02suse-upgrade-slurmsuse-upgrade-slurm-auth-nonesuse-upgrade-slurm-configsuse-upgrade-slurm-config-mansuse-upgrade-slurm-craysuse-upgrade-slurm-develsuse-upgrade-slurm-docsuse-upgrade-slurm-hdf5suse-upgrade-slurm-luasuse-upgrade-slurm-mungesuse-upgrade-slurm-nodesuse-upgrade-slurm-openlavasuse-upgrade-slurm-pam_slurmsuse-upgrade-slurm-plugin-ext-sensors-rrdsuse-upgrade-slurm-pluginssuse-upgrade-slurm-restsuse-upgrade-slurm-sched-wikisuse-upgrade-slurm-seffsuse-upgrade-slurm-sjstatsuse-upgrade-slurm-slurmdb-directsuse-upgrade-slurm-slurmdbdsuse-upgrade-slurm-sqlsuse-upgrade-slurm-sviewsuse-upgrade-slurm-testsuitesuse-upgrade-slurm-torquesuse-upgrade-slurm-webdocsuse-upgrade-slurm_18_08suse-upgrade-slurm_18_08-auth-nonesuse-upgrade-slurm_18_08-configsuse-upgrade-slurm_18_08-develsuse-upgrade-slurm_18_08-docsuse-upgrade-slurm_18_08-luasuse-upgrade-slurm_18_08-mungesuse-upgrade-slurm_18_08-nodesuse-upgrade-slurm_18_08-pam_slurmsuse-upgrade-slurm_18_08-pluginssuse-upgrade-slurm_18_08-slurmdbdsuse-upgrade-slurm_18_08-sqlsuse-upgrade-slurm_18_08-torquesuse-upgrade-slurm_20_02suse-upgrade-slurm_20_02-auth-nonesuse-upgrade-slurm_20_02-configsuse-upgrade-slurm_20_02-config-mansuse-upgrade-slurm_20_02-craysuse-upgrade-slurm_20_02-develsuse-upgrade-slurm_20_02-docsuse-upgrade-slurm_20_02-hdf5suse-upgrade-slurm_20_02-luasuse-upgrade-slurm_20_02-mungesuse-upgrade-slurm_20_02-nodesuse-upgrade-slurm_20_02-openlavasuse-upgrade-slurm_20_02-pam_slurmsuse-upgrade-slurm_20_02-pluginssuse-upgrade-slurm_20_02-restsuse-upgrade-slurm_20_02-seffsuse-upgrade-slurm_20_02-sjstatsuse-upgrade-slurm_20_02-slurmdbdsuse-upgrade-slurm_20_02-sqlsuse-upgrade-slurm_20_02-sviewsuse-upgrade-slurm_20_02-testsuitesuse-upgrade-slurm_20_02-torquesuse-upgrade-slurm_20_02-webdocsuse-upgrade-slurm_20_11suse-upgrade-slurm_20_11-auth-nonesuse-upgrade-slurm_20_11-configsuse-upgrade-slurm_20_11-config-mansuse-upgrade-slurm_20_11-craysuse-upgrade-slurm_20_11-develsuse-upgrade-slurm_20_11-docsuse-upgrade-slurm_20_11-hdf5suse-upgrade-slurm_20_11-luasuse-upgrade-slurm_20_11-mungesuse-upgrade-slurm_20_11-nodesuse-upgrade-slurm_20_11-openlavasuse-upgrade-slurm_20_11-pam_slurmsuse-upgrade-slurm_20_11-pluginssuse-upgrade-slurm_20_11-restsuse-upgrade-slurm_20_11-seffsuse-upgrade-slurm_20_11-sjstatsuse-upgrade-slurm_20_11-slurmdbdsuse-upgrade-slurm_20_11-sqlsuse-upgrade-slurm_20_11-sviewsuse-upgrade-slurm_20_11-torquesuse-upgrade-slurm_20_11-webdocsuse-upgrade-slurm_22_05suse-upgrade-slurm_22_05-auth-nonesuse-upgrade-slurm_22_05-configsuse-upgrade-slurm_22_05-config-mansuse-upgrade-slurm_22_05-craysuse-upgrade-slurm_22_05-develsuse-upgrade-slurm_22_05-docsuse-upgrade-slurm_22_05-hdf5suse-upgrade-slurm_22_05-luasuse-upgrade-slurm_22_05-mungesuse-upgrade-slurm_22_05-nodesuse-upgrade-slurm_22_05-openlavasuse-upgrade-slurm_22_05-pam_slurmsuse-upgrade-slurm_22_05-pluginssuse-upgrade-slurm_22_05-restsuse-upgrade-slurm_22_05-seffsuse-upgrade-slurm_22_05-sjstatsuse-upgrade-slurm_22_05-slurmdbdsuse-upgrade-slurm_22_05-sqlsuse-upgrade-slurm_22_05-sviewsuse-upgrade-slurm_22_05-testsuitesuse-upgrade-slurm_22_05-torquesuse-upgrade-slurm_22_05-webdocsuse-upgrade-slurm_23_02suse-upgrade-slurm_23_02-auth-nonesuse-upgrade-slurm_23_02-configsuse-upgrade-slurm_23_02-config-mansuse-upgrade-slurm_23_02-craysuse-upgrade-slurm_23_02-develsuse-upgrade-slurm_23_02-docsuse-upgrade-slurm_23_02-luasuse-upgrade-slurm_23_02-mungesuse-upgrade-slurm_23_02-nodesuse-upgrade-slurm_23_02-pam_slurmsuse-upgrade-slurm_23_02-plugin-ext-sensors-rrdsuse-upgrade-slurm_23_02-pluginssuse-upgrade-slurm_23_02-slurmdbdsuse-upgrade-slurm_23_02-sqlsuse-upgrade-slurm_23_02-sviewsuse-upgrade-slurm_23_02-torquesuse-upgrade-slurm_23_02-webdoc
Title
Rapid7 Labs

2026 Global Threat Landscape Report

The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.