First published: Thu Dec 14 2023(Updated: )
An issue was discovered in SchedMD Slurm 23.02.x and 23.11.x. There is Incorrect Access Control because of a slurmd Message Integrity Bypass. An attacker can reuse root-level authentication tokens during interaction with the slurmd process. This bypasses the RPC message hashes that protect against undesired MUNGE credential reuse. The fixed versions are 23.02.7 and 23.11.1.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | >=23.02<23.02.7 | |
Ubuntu | =23.11 | |
Ubuntu | =23.11-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49935 has a high severity due to incorrect access control that allows attackers to reuse root-level authentication tokens.
To mitigate CVE-2023-49935, upgrade to a patched version of SchedMD Slurm that addresses the message integrity bypass issue.
CVE-2023-49935 affects SchedMD Slurm versions 23.02.x and 23.11.x.
Yes, CVE-2023-49935 can be exploited by remote attackers who can interact with the slurmd process.
Exploiting CVE-2023-49935 can lead to unauthorized access to system privileges and control over the Slurm workload manager.