Double Free Affecting slurm_20_11-sql package, versions <20.11.9-150200.6.16.1
Threat Intelligence
EPSS
0.11% (44th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-SLES152-SLURM2011SQL-6221377
- published 1 Feb 2024
- disclosed 31 Jan 2024
Introduced: 31 Jan 2024
CVE-2023-49937 Open this link in a new tabHow to fix?
Upgrade SLES:15.2 slurm_20_11-sql to version 20.11.9-150200.6.16.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream slurm_20_11-sql package and not the slurm_20_11-sql package as distributed by SLES.
See How to fix? for SLES:15.2 relevant fixed versions and status.
An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. Because of a double free, attackers can cause a denial of service or possibly execute arbitrary code. The fixed versions are 22.05.11, 23.02.7, and 23.11.1.
References
- https://www.suse.com/security/cve/CVE-2023-49937.html
- https://bugzilla.suse.com/1218051
- https://lists.schedmd.com/pipermail/slurm-announce/2023/000103.html
- https://www.schedmd.com/security-archive.php
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63FEDDYEE2WK7FHWBHKON3OZVQI56WSQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYQS3LFGC4HE4WCW4L3NAA2I6FRIWMNO/
CVSS Scores
version 3.1