2023-12-14 07:00:21 +00:00
{
"id" : "CVE-2023-49938" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2023-12-14T05:15:11.890" ,
2024-01-03 05:00:28 +00:00
"lastModified" : "2024-01-03T03:15:10.053" ,
"vulnStatus" : "Modified" ,
2023-12-14 07:00:21 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "An issue was discovered in SchedMD Slurm 22.05.x and 23.02.x. There is Incorrect Access Control: an attacker can modified their extended group list that is used with the sbcast subsystem, and open files with an unauthorized set of extended groups. The fixed versions are 22.05.11 and 23.02.7."
2023-12-19 17:00:28 +00:00
} ,
{
"lang" : "es" ,
"value" : "Se descubri\u00f3 un problema en SchedMD Slurm 22.05.x y 23.02.x. Hay un control de acceso incorrecto: un atacante puede modificar su lista de grupos extendidos que se usa con el subsistema sbcast y abrir archivos con un conjunto no autorizado de grupos extendidos. Las versiones fijas son 22.05.11 y 23.02.7."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 8.2 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 4.2
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:schedmd:slurm:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "22.05.0" ,
"versionEndExcluding" : "22.05.11" ,
"matchCriteriaId" : "E77BB569-B1F1-4636-B94D-0EF5E1D1CB34"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:schedmd:slurm:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "23.02.0" ,
"versionEndExcluding" : "23.02.7" ,
"matchCriteriaId" : "C81650BA-F3A5-4D8D-8F0E-336962EAC2E2"
}
]
}
]
2023-12-14 07:00:21 +00:00
}
] ,
"references" : [
2024-01-03 05:00:28 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63FEDDYEE2WK7FHWBHKON3OZVQI56WSQ/" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYQS3LFGC4HE4WCW4L3NAA2I6FRIWMNO/" ,
"source" : "cve@mitre.org"
} ,
2023-12-14 07:00:21 +00:00
{
"url" : "https://lists.schedmd.com/pipermail/slurm-announce/2023/000103.html" ,
2023-12-19 17:00:28 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Vendor Advisory"
]
2023-12-14 07:00:21 +00:00
} ,
{
"url" : "https://www.schedmd.com/security-archive.php" ,
2023-12-19 17:00:28 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2023-12-14 07:00:21 +00:00
}
]
}