CVE Vulnerabilities

CVE-2023-49933

Improper Enforcement of Message Integrity During Transmission in a Communication Channel

Published: Dec 14, 2023 | Modified: Nov 04, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. There is Improper Enforcement of Message Integrity During Transmission in a Communication Channel. This allows attackers to modify RPC traffic in a way that bypasses message hash checks. The fixed versions are 22.05.11, 23.02.7, and 23.11.1.

Weakness

The product establishes a communication channel with an endpoint and receives a message from that endpoint, but it does not sufficiently ensure that the message was not modified during transmission.

Affected Software

NameVendorStart VersionEnd Version
SlurmSchedmd22.05 (including)22.05.12 (excluding)
SlurmSchedmd23.02 (including)23.02.7 (excluding)
SlurmSchedmd23.11 (including)23.11 (including)
SlurmSchedmd23.11-rc1 (including)23.11-rc1 (including)
Slurm-llnlUbuntubionic*
Slurm-llnlUbuntuesm-apps/bionic*
Slurm-llnlUbuntuesm-apps/focal*
Slurm-llnlUbuntuesm-apps/xenial*
Slurm-llnlUbuntuesm-infra-legacy/trusty*
Slurm-llnlUbuntufocal*
Slurm-llnlUbuntutrusty*
Slurm-llnlUbuntutrusty/esm*
Slurm-llnlUbuntuxenial*
Slurm-wlmUbuntubionic*
Slurm-wlmUbuntuesm-apps/jammy*
Slurm-wlmUbuntujammy*
Slurm-wlmUbuntulunar*
Slurm-wlmUbuntumantic*
Slurm-wlmUbuntuoracular*
Slurm-wlmUbuntutrusty*
Slurm-wlmUbuntuxenial*

References