CVE Vulnerabilities

CVE-2023-49935

Insufficient Session Expiration

Published: Dec 14, 2023 | Modified: Nov 21, 2024
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

An issue was discovered in SchedMD Slurm 23.02.x and 23.11.x. There is Incorrect Access Control because of a slurmd Message Integrity Bypass. An attacker can reuse root-level authentication tokens during interaction with the slurmd process. This bypasses the RPC message hashes that protect against undesired MUNGE credential reuse. The fixed versions are 23.02.7 and 23.11.1.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

Name Vendor Start Version End Version
Slurm Schedmd 23.02 (including) 23.02.7 (excluding)
Slurm Schedmd 23.11 (including) 23.11 (including)
Slurm Schedmd 23.11-rc1 (including) 23.11-rc1 (including)
Slurm-llnl Ubuntu bionic *
Slurm-llnl Ubuntu trusty *
Slurm-llnl Ubuntu trusty/esm *
Slurm-llnl Ubuntu xenial *
Slurm-wlm Ubuntu bionic *
Slurm-wlm Ubuntu lunar *
Slurm-wlm Ubuntu mantic *
Slurm-wlm Ubuntu trusty *
Slurm-wlm Ubuntu xenial *

Potential Mitigations

References