Race Condition Affecting slurm_20_11-munge package, versions <20.11.9-150100.3.19.1
Threat Intelligence
EPSS
0.04% (6th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-SLES151-SLURM2011MUNGE-6009116
- published 19 Oct 2023
- disclosed 18 Oct 2023
Introduced: 18 Oct 2023
CVE-2023-41914 Open this link in a new tabHow to fix?
Upgrade SLES:15.1 slurm_20_11-munge to version 20.11.9-150100.3.19.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream slurm_20_11-munge package and not the slurm_20_11-munge package as distributed by SLES.
See How to fix? for SLES:15.1 relevant fixed versions and status.
SchedMD Slurm 23.02.x before 23.02.6 and 22.05.x before 22.05.10 allows filesystem race conditions for gaining ownership of a file, overwriting a file, or deleting files.
References
- https://www.suse.com/security/cve/CVE-2023-41914.html
- https://bugzilla.suse.com/1216207
- https://lists.schedmd.com/pipermail/slurm-announce/2023/000100.html
- https://schedmd.com/security.php
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OWKTCYZT3DXEH66QXQJYB7NI7ONDRS4M/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OWKTCYZT3DXEH66QXQJYB7NI7ONDRS4M/
CVSS Scores
version 3.1