Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-49935

Опубликовано: 14 дек. 2023
Источник: ubuntu
Приоритет: medium
CVSS3: 8.8

Описание

An issue was discovered in SchedMD Slurm 23.02.x and 23.11.x. There is Incorrect Access Control because of a slurmd Message Integrity Bypass. An attacker can reuse root-level authentication tokens during interaction with the slurmd process. This bypasses the RPC message hashes that protect against undesired MUNGE credential reuse. The fixed versions are 23.02.7 and 23.11.1.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

DNE

esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

needs-triage

focal

ignored

end of standard support, was needs-triage
jammy

DNE

lunar

DNE

mantic

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

not-affected

24.11.3-2
esm-apps/jammy

not-affected

Vulnerable code introduced later
esm-apps/noble

not-affected

23.11.4-1.2ubuntu5
esm-infra/focal

DNE

focal

DNE

jammy

not-affected

Vulnerable code introduced later
lunar

ignored

end of life, was needs-triage
mantic

ignored

end of life, was needs-triage
noble

not-affected

23.11.4-1.2ubuntu5

Показывать по

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
около 2 лет назад

An issue was discovered in SchedMD Slurm 23.02.x and 23.11.x. There is Incorrect Access Control because of a slurmd Message Integrity Bypass. An attacker can reuse root-level authentication tokens during interaction with the slurmd process. This bypasses the RPC message hashes that protect against undesired MUNGE credential reuse. The fixed versions are 23.02.7 and 23.11.1.

CVSS3: 8.8
debian
около 2 лет назад

An issue was discovered in SchedMD Slurm 23.02.x and 23.11.x. There is ...

CVSS3: 8.8
github
около 2 лет назад

An issue was discovered in SchedMD Slurm 23.02.x and 23.11.x. There is Incorrect Access Control because of a slurmd Message Integrity Bypass. An attacker can reuse root-level authentication tokens during interaction with the slurmd process. This bypasses the RPC message hashes that protect against undesired MUNGE credential reuse. The fixed versions are 23.02.7 and 23.11.1.

CVSS3: 8.8
fstec
около 2 лет назад

Уязвимость менеджера управления ресурсами Slurm, связанная с некорректным сроком действия сеанса, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

suse-cvrf
около 2 лет назад

Security update for slurm_23_02

8.8 High

CVSS3