An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. There is Improper Enforcement of Message Integrity During Transmission in a Communication Channel. This allows attackers to modify RPC traffic in a way that bypasses message hash checks. The fixed versions are 22.05.11, 23.02.7, and 23.11.1.
The product establishes a communication channel with an endpoint and receives a message from that endpoint, but it does not sufficiently ensure that the message was not modified during transmission.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Slurm | Schedmd | 22.05 (including) | 22.05.12 (excluding) |
Slurm | Schedmd | 23.02 (including) | 23.02.7 (excluding) |
Slurm | Schedmd | 23.11 (including) | 23.11 (including) |
Slurm | Schedmd | 23.11-rc1 (including) | 23.11-rc1 (including) |
Slurm-llnl | Ubuntu | bionic | * |
Slurm-llnl | Ubuntu | trusty | * |
Slurm-llnl | Ubuntu | trusty/esm | * |
Slurm-llnl | Ubuntu | xenial | * |
Slurm-wlm | Ubuntu | bionic | * |
Slurm-wlm | Ubuntu | lunar | * |
Slurm-wlm | Ubuntu | mantic | * |
Slurm-wlm | Ubuntu | trusty | * |
Slurm-wlm | Ubuntu | xenial | * |