First published: Thu Dec 14 2023(Updated: )
An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. There is Improper Enforcement of Message Integrity During Transmission in a Communication Channel. This allows attackers to modify RPC traffic in a way that bypasses message hash checks. The fixed versions are 22.05.11, 23.02.7, and 23.11.1.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
>=22.05<22.05.12 | ||
>=23.02<23.02.7 | ||
=23.11 | ||
=23.11-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49933 is categorized with a high severity due to the potential for attackers to modify RPC traffic.
To fix CVE-2023-49933, upgrade to Slurm versions 22.05.11, 23.02.7, or 23.11 onwards.
CVE-2023-49933 affects Slurm versions 22.05.x, 23.02.x, and 23.11.x up until the specified fixed versions.
CVE-2023-49933 is an improper enforcement vulnerability concerning message integrity during transmission.
Yes, CVE-2023-49933 can be exploited remotely, allowing attackers to alter communication channel messages.