23 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. There is Improper Enforcement of Message Integrity During Transmission in a Communication Channel. This allows attackers to modify RPC traffic in a way that bypasses message hash checks. The fixed versions are 22.05.11, 23.02.7, and 23.11.1. Se descubrió un problema en SchedMD Slurm 22.05.x, 23.02.x y 23.11.x. • https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63FEDDYEE2WK7FHWBHKON3OZVQI56WSQ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYQS3LFGC4HE4WCW4L3NAA2I6FRIWMNO https://lists.schedmd.com/pipermail/slurm-announce/2023/000103.html https://www.schedmd.com/security-archive.php • CWE-924: Improper Enforcement of Message Integrity During Transmission in a Communication Channel •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

An issue was discovered in SchedMD Slurm 23.11.x. There is SQL Injection against the SlurmDBD database. The fixed version is 23.11.1. Se descubrió un problema en SchedMD Slurm 23.11.x. Hay inyección SQL contra la base de datos SlurmDBD. • https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63FEDDYEE2WK7FHWBHKON3OZVQI56WSQ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYQS3LFGC4HE4WCW4L3NAA2I6FRIWMNO https://lists.schedmd.com/pipermail/slurm-announce/2023/000103.html https://www.schedmd.com/security-archive.php • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 0

An issue was discovered in SchedMD Slurm 23.02.x and 23.11.x. There is Incorrect Access Control because of a slurmd Message Integrity Bypass. An attacker can reuse root-level authentication tokens during interaction with the slurmd process. This bypasses the RPC message hashes that protect against undesired MUNGE credential reuse. The fixed versions are 23.02.7 and 23.11.1. • https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63FEDDYEE2WK7FHWBHKON3OZVQI56WSQ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYQS3LFGC4HE4WCW4L3NAA2I6FRIWMNO https://lists.schedmd.com/pipermail/slurm-announce/2023/000103.html https://www.schedmd.com/security-archive.php • CWE-613: Insufficient Session Expiration •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. A NULL pointer dereference leads to denial of service. The fixed versions are 22.05.11, 23.02.7, and 23.11.1. Se descubrió un problema en SchedMD Slurm 22.05.x, 23.02.x y 23.11.x. Una desreferencia de puntero NULL conduce a una denegación de servicio. • https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63FEDDYEE2WK7FHWBHKON3OZVQI56WSQ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYQS3LFGC4HE4WCW4L3NAA2I6FRIWMNO https://lists.schedmd.com/pipermail/slurm-announce/2023/000103.html https://www.schedmd.com/security-archive.php • CWE-476: NULL Pointer Dereference •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. Because of a double free, attackers can cause a denial of service or possibly execute arbitrary code. The fixed versions are 22.05.11, 23.02.7, and 23.11.1. Se descubrió un problema en SchedMD Slurm 22.05.x, 23.02.x y 23.11.x. Debido a una doble liberación, los atacantes pueden provocar una denegación de servicio o posiblemente ejecutar código arbitrario. • https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63FEDDYEE2WK7FHWBHKON3OZVQI56WSQ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYQS3LFGC4HE4WCW4L3NAA2I6FRIWMNO https://lists.schedmd.com/pipermail/slurm-announce/2023/000103.html https://www.schedmd.com/security-archive.php • CWE-415: Double Free •