SUSE-SU-2024:0315-1

Source
https://www.suse.com/support/update/announcement/2024/suse-su-20240315-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2024:0315-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2024:0315-1
Related
Published
2024-02-02T08:55:34Z
Modified
2024-02-02T08:55:34Z
Summary
Security update for slurm
Details

This update for slurm fixes the following issues:

  • CVE-2023-49933: Fixed a message extension attack that could bypass the message hash (bsc#1218046).
  • CVE-2023-49936: Fixed a NULL pointer dereference (bsc#1218050).
  • CVE-2023-49937: Fixed a double free that could lead to denial of service or code execution (bsc#1218051).
  • CVE-2023-49938: Fixed an incorrect access control issue that could allow an attacker to modify their extended group list (bsc#1218053).
References

Affected packages

SUSE:Linux Enterprise Module for HPC 12 / slurm

Package

Name
slurm
Purl
pkg:rpm/suse/slurm&distro=SUSE%20Linux%20Enterprise%20Module%20for%20HPC%2012

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
17.02.11-6.59.1

Ecosystem specific

{
    "binaries": [
        {
            "slurm-config": "17.02.11-6.59.1",
            "slurm-plugins": "17.02.11-6.59.1",
            "slurm-auth-none": "17.02.11-6.59.1",
            "slurm-slurmdbd": "17.02.11-6.59.1",
            "slurm-devel": "17.02.11-6.59.1",
            "slurm-pam_slurm": "17.02.11-6.59.1",
            "slurm-doc": "17.02.11-6.59.1",
            "slurm-munge": "17.02.11-6.59.1",
            "perl-slurm": "17.02.11-6.59.1",
            "libslurm31": "17.02.11-6.59.1",
            "slurm-slurmdb-direct": "17.02.11-6.59.1",
            "slurm-sql": "17.02.11-6.59.1",
            "libpmi0": "17.02.11-6.59.1",
            "slurm-lua": "17.02.11-6.59.1",
            "slurm": "17.02.11-6.59.1",
            "slurm-sched-wiki": "17.02.11-6.59.1",
            "slurm-torque": "17.02.11-6.59.1"
        }
    ]
}