<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for slurm</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:0315-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-02-02T08:55:34Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-02-02T08:55:34Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-02-02T08:55:34Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for slurm</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for slurm fixes the following issues:

- CVE-2023-49933: Fixed a message extension attack that could bypass
  the message hash (bsc#1218046).
- CVE-2023-49936: Fixed a NULL pointer dereference (bsc#1218050).
- CVE-2023-49937: Fixed a double free that could lead to denial of
  service or code execution (bsc#1218051).
- CVE-2023-49938: Fixed an incorrect access control issue that could
  allow an attacker to modify their extended group list (bsc#1218053).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2024-315,SUSE-SLE-Module-HPC-12-2024-315</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20240315-1/</URL>
      <Description>Link for SUSE-SU-2024:0315-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2024-February/017850.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:0315-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218046</URL>
      <Description>SUSE Bug 1218046</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218050</URL>
      <Description>SUSE Bug 1218050</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218051</URL>
      <Description>SUSE Bug 1218051</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218053</URL>
      <Description>SUSE Bug 1218053</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-49933/</URL>
      <Description>SUSE CVE CVE-2023-49933 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-49936/</URL>
      <Description>SUSE CVE CVE-2023-49936 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-49937/</URL>
      <Description>SUSE CVE CVE-2023-49937 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-49938/</URL>
      <Description>SUSE CVE CVE-2023-49938 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for HPC 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for HPC 12">
        <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12" CPE="cpe:/o:suse:sle-module-hpc:12">SUSE Linux Enterprise Module for HPC 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libpmi0-17.02.11-6.59.1">
      <FullProductName ProductID="libpmi0-17.02.11-6.59.1">libpmi0-17.02.11-6.59.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libslurm31-17.02.11-6.59.1">
      <FullProductName ProductID="libslurm31-17.02.11-6.59.1">libslurm31-17.02.11-6.59.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="perl-slurm-17.02.11-6.59.1">
      <FullProductName ProductID="perl-slurm-17.02.11-6.59.1">perl-slurm-17.02.11-6.59.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm-17.02.11-6.59.1">
      <FullProductName ProductID="slurm-17.02.11-6.59.1">slurm-17.02.11-6.59.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm-auth-none-17.02.11-6.59.1">
      <FullProductName ProductID="slurm-auth-none-17.02.11-6.59.1">slurm-auth-none-17.02.11-6.59.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm-config-17.02.11-6.59.1">
      <FullProductName ProductID="slurm-config-17.02.11-6.59.1">slurm-config-17.02.11-6.59.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm-devel-17.02.11-6.59.1">
      <FullProductName ProductID="slurm-devel-17.02.11-6.59.1">slurm-devel-17.02.11-6.59.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm-doc-17.02.11-6.59.1">
      <FullProductName ProductID="slurm-doc-17.02.11-6.59.1">slurm-doc-17.02.11-6.59.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm-lua-17.02.11-6.59.1">
      <FullProductName ProductID="slurm-lua-17.02.11-6.59.1">slurm-lua-17.02.11-6.59.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm-munge-17.02.11-6.59.1">
      <FullProductName ProductID="slurm-munge-17.02.11-6.59.1">slurm-munge-17.02.11-6.59.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm-openlava-17.02.11-6.59.1">
      <FullProductName ProductID="slurm-openlava-17.02.11-6.59.1">slurm-openlava-17.02.11-6.59.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm-pam_slurm-17.02.11-6.59.1">
      <FullProductName ProductID="slurm-pam_slurm-17.02.11-6.59.1">slurm-pam_slurm-17.02.11-6.59.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm-plugins-17.02.11-6.59.1">
      <FullProductName ProductID="slurm-plugins-17.02.11-6.59.1">slurm-plugins-17.02.11-6.59.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm-sched-wiki-17.02.11-6.59.1">
      <FullProductName ProductID="slurm-sched-wiki-17.02.11-6.59.1">slurm-sched-wiki-17.02.11-6.59.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm-seff-17.02.11-6.59.1">
      <FullProductName ProductID="slurm-seff-17.02.11-6.59.1">slurm-seff-17.02.11-6.59.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm-sjstat-17.02.11-6.59.1">
      <FullProductName ProductID="slurm-sjstat-17.02.11-6.59.1">slurm-sjstat-17.02.11-6.59.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm-slurmdb-direct-17.02.11-6.59.1">
      <FullProductName ProductID="slurm-slurmdb-direct-17.02.11-6.59.1">slurm-slurmdb-direct-17.02.11-6.59.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm-slurmdbd-17.02.11-6.59.1">
      <FullProductName ProductID="slurm-slurmdbd-17.02.11-6.59.1">slurm-slurmdbd-17.02.11-6.59.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm-sql-17.02.11-6.59.1">
      <FullProductName ProductID="slurm-sql-17.02.11-6.59.1">slurm-sql-17.02.11-6.59.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm-sview-17.02.11-6.59.1">
      <FullProductName ProductID="slurm-sview-17.02.11-6.59.1">slurm-sview-17.02.11-6.59.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm-testsuite-17.02.11-6.59.1">
      <FullProductName ProductID="slurm-testsuite-17.02.11-6.59.1">slurm-testsuite-17.02.11-6.59.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm-torque-17.02.11-6.59.1">
      <FullProductName ProductID="slurm-torque-17.02.11-6.59.1">slurm-torque-17.02.11-6.59.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm-torque-openqa-tests-17.02.11-6.59.1">
      <FullProductName ProductID="slurm-torque-openqa-tests-17.02.11-6.59.1">slurm-torque-openqa-tests-17.02.11-6.59.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libpmi0-17.02.11-6.59.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:libpmi0-17.02.11-6.59.1">libpmi0-17.02.11-6.59.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="libslurm31-17.02.11-6.59.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:libslurm31-17.02.11-6.59.1">libslurm31-17.02.11-6.59.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="perl-slurm-17.02.11-6.59.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:perl-slurm-17.02.11-6.59.1">perl-slurm-17.02.11-6.59.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm-17.02.11-6.59.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm-17.02.11-6.59.1">slurm-17.02.11-6.59.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm-auth-none-17.02.11-6.59.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm-auth-none-17.02.11-6.59.1">slurm-auth-none-17.02.11-6.59.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm-config-17.02.11-6.59.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm-config-17.02.11-6.59.1">slurm-config-17.02.11-6.59.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm-devel-17.02.11-6.59.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm-devel-17.02.11-6.59.1">slurm-devel-17.02.11-6.59.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm-doc-17.02.11-6.59.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm-doc-17.02.11-6.59.1">slurm-doc-17.02.11-6.59.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm-lua-17.02.11-6.59.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm-lua-17.02.11-6.59.1">slurm-lua-17.02.11-6.59.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm-munge-17.02.11-6.59.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm-munge-17.02.11-6.59.1">slurm-munge-17.02.11-6.59.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm-pam_slurm-17.02.11-6.59.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm-pam_slurm-17.02.11-6.59.1">slurm-pam_slurm-17.02.11-6.59.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm-plugins-17.02.11-6.59.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm-plugins-17.02.11-6.59.1">slurm-plugins-17.02.11-6.59.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm-sched-wiki-17.02.11-6.59.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm-sched-wiki-17.02.11-6.59.1">slurm-sched-wiki-17.02.11-6.59.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm-slurmdb-direct-17.02.11-6.59.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm-slurmdb-direct-17.02.11-6.59.1">slurm-slurmdb-direct-17.02.11-6.59.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm-slurmdbd-17.02.11-6.59.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm-slurmdbd-17.02.11-6.59.1">slurm-slurmdbd-17.02.11-6.59.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm-sql-17.02.11-6.59.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm-sql-17.02.11-6.59.1">slurm-sql-17.02.11-6.59.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm-torque-17.02.11-6.59.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm-torque-17.02.11-6.59.1">slurm-torque-17.02.11-6.59.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. There is Improper Enforcement of Message Integrity During Transmission in a Communication Channel. This allows attackers to modify RPC traffic in a way that bypasses message hash checks. The fixed versions are 22.05.11, 23.02.7, and 23.11.1.</Note>
    </Notes>
    <CVE>CVE-2023-49933</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for HPC 12:libpmi0-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:libslurm31-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:perl-slurm-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-auth-none-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-config-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-devel-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-doc-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-lua-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-munge-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-pam_slurm-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-plugins-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-sched-wiki-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-slurmdb-direct-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-slurmdbd-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-sql-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-torque-17.02.11-6.59.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20240315-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-49933.html</URL>
        <Description>CVE-2023-49933</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218046</URL>
        <Description>SUSE Bug 1218046</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. A NULL pointer dereference leads to denial of service. The fixed versions are 22.05.11, 23.02.7, and 23.11.1.</Note>
    </Notes>
    <CVE>CVE-2023-49936</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for HPC 12:libpmi0-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:libslurm31-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:perl-slurm-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-auth-none-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-config-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-devel-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-doc-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-lua-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-munge-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-pam_slurm-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-plugins-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-sched-wiki-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-slurmdb-direct-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-slurmdbd-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-sql-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-torque-17.02.11-6.59.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20240315-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-49936.html</URL>
        <Description>CVE-2023-49936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218050</URL>
        <Description>SUSE Bug 1218050</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. Because of a double free, attackers can cause a denial of service or possibly execute arbitrary code. The fixed versions are 22.05.11, 23.02.7, and 23.11.1.</Note>
    </Notes>
    <CVE>CVE-2023-49937</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for HPC 12:libpmi0-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:libslurm31-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:perl-slurm-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-auth-none-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-config-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-devel-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-doc-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-lua-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-munge-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-pam_slurm-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-plugins-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-sched-wiki-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-slurmdb-direct-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-slurmdbd-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-sql-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-torque-17.02.11-6.59.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20240315-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-49937.html</URL>
        <Description>CVE-2023-49937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218051</URL>
        <Description>SUSE Bug 1218051</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in SchedMD Slurm 22.05.x and 23.02.x. There is Incorrect Access Control: an attacker can modified their extended group list that is used with the sbcast subsystem, and open files with an unauthorized set of extended groups. The fixed versions are 22.05.11 and 23.02.7.</Note>
    </Notes>
    <CVE>CVE-2023-49938</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for HPC 12:libpmi0-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:libslurm31-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:perl-slurm-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-auth-none-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-config-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-devel-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-doc-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-lua-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-munge-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-pam_slurm-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-plugins-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-sched-wiki-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-slurmdb-direct-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-slurmdbd-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-sql-17.02.11-6.59.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm-torque-17.02.11-6.59.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20240315-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-49938.html</URL>
        <Description>CVE-2023-49938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218053</URL>
        <Description>SUSE Bug 1218053</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
