An issue was discovered in SchedMD Slurm 23.02.x and 23.11.x. There is Incorrect Access Control because of a slurmd Message Integrity Bypass. An attacker can reuse root-level authentication tokens during interaction with the slurmd process. This bypasses the RPC message hashes that protect against undesired MUNGE credential reuse. The fixed versions are 23.02.7 and 23.11.1.
2023-12-14T05:15:10.490
2024-11-21T08:34:02.460
Modified
CVSSv3.1: 8.8 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | schedmd | slurm | < 23.02.7 | Yes |
Application | schedmd | slurm | 23.11 | Yes |
Application | schedmd | slurm | 23.11 | Yes |