5 results (0.007 seconds)

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

14 Dec 2023 — An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. There is Improper Enforcement of Message Integrity During Transmission in a Communication Channel. This allows attackers to modify RPC traffic in a way that bypasses message hash checks. The fixed versions are 22.05.11, 23.02.7, and 23.11.1. Se descubrió un problema en SchedMD Slurm 22.05.x, 23.02.x y 23.11.x. • https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63FEDDYEE2WK7FHWBHKON3OZVQI56WSQ • CWE-924: Improper Enforcement of Message Integrity During Transmission in a Communication Channel •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

14 Dec 2023 — An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. A NULL pointer dereference leads to denial of service. The fixed versions are 22.05.11, 23.02.7, and 23.11.1. Se descubrió un problema en SchedMD Slurm 22.05.x, 23.02.x y 23.11.x. Una desreferencia de puntero NULL conduce a una denegación de servicio. • https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63FEDDYEE2WK7FHWBHKON3OZVQI56WSQ • CWE-476: NULL Pointer Dereference •

CVSS: 10.0EPSS: 1%CPEs: 4EXPL: 0

14 Dec 2023 — An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. Because of a double free, attackers can cause a denial of service or possibly execute arbitrary code. The fixed versions are 22.05.11, 23.02.7, and 23.11.1. Se descubrió un problema en SchedMD Slurm 22.05.x, 23.02.x y 23.11.x. Debido a una doble liberación, los atacantes pueden provocar una denegación de servicio o posiblemente ejecutar código arbitrario. • https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63FEDDYEE2WK7FHWBHKON3OZVQI56WSQ • CWE-415: Double Free •

CVSS: 8.5EPSS: 0%CPEs: 2EXPL: 0

14 Dec 2023 — An issue was discovered in SchedMD Slurm 22.05.x and 23.02.x. There is Incorrect Access Control: an attacker can modified their extended group list that is used with the sbcast subsystem, and open files with an unauthorized set of extended groups. The fixed versions are 22.05.11 and 23.02.7. Se descubrió un problema en SchedMD Slurm 22.05.x y 23.02.x. Hay un control de acceso incorrecto: un atacante puede modificar su lista de grupos extendidos que se usa con el subsistema sbcast y abrir archivos con un con... • https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63FEDDYEE2WK7FHWBHKON3OZVQI56WSQ •

CVSS: 7.0EPSS: 0%CPEs: 3EXPL: 0

18 Oct 2023 — SchedMD Slurm 23.02.x before 23.02.6 and 22.05.x before 22.05.10 allows filesystem race conditions for gaining ownership of a file, overwriting a file, or deleting files. SchedMD Slurm 23.02.x anterior al 23.02.6 y 22.05.x anterior al 22.05.10 permite condiciones de ejecución del sistema de archivos para obtener la propiedad de un archivo, sobrescribir un archivo o eliminar archivos. Francois Diakhate discovered that several race conditions in file processing of the Simple Linux Utility for Resource Managem... • https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OWKTCYZT3DXEH66QXQJYB7NI7ONDRS4M • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •