DEBIAN-CVE-2023-49935

Source
https://security-tracker.debian.org/tracker/CVE-2023-49935
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-49935.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2023-49935
Upstream
Published
2023-12-14T05:15:10Z
Modified
2025-09-25T22:40:31Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in SchedMD Slurm 23.02.x and 23.11.x. There is Incorrect Access Control because of a slurmd Message Integrity Bypass. An attacker can reuse root-level authentication tokens during interaction with the slurmd process. This bypasses the RPC message hashes that protect against undesired MUNGE credential reuse. The fixed versions are 23.02.7 and 23.11.1.

References

Affected packages

Debian:13 / slurm-wlm

Package

Name
slurm-wlm
Purl
pkg:deb/debian/slurm-wlm?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
23.11.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / slurm-wlm

Package

Name
slurm-wlm
Purl
pkg:deb/debian/slurm-wlm?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
23.11.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}