SB2024013152 - SUSE update for slurm_22_05 



SB2024013152 - SUSE update for slurm_22_05

Published: January 31, 2024

Security Bulletin ID SB2024013152
Severity
High
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 25% Medium 50% Low 25%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Improper Enforcement of Message Integrity During Transmission in a Communication Channel (CVE-ID: CVE-2023-49933)

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exists due to improper integrity check. A remote attacker can perform MitM attack and modify RPC traffic.


2) NULL pointer dereference (CVE-ID: CVE-2023-49936)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error. A remote attacker can send specially crafted data to the application and perform a denial of service (DoS) attack.


3) Double Free (CVE-ID: CVE-2023-49937)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error. A remote attacker can send specially crafted data to the application, trigger double free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


4) Improper access control (CVE-ID: CVE-2023-49938)

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote user can modify extended group list that is used with the sbcast subsystem, and open files with an unauthorized set of extended groups


Remediation

Install update from vendor's website.