<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">Security update for slurm_22_05</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:0311-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-02-02T05:03:38Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-02-02T05:03:38Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-02-02T05:03:38Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for slurm_22_05</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for slurm_22_05 fixes the following issues:

Update to slurm 22.05.11:

Security fixes:

- CVE-2023-49933: Prevent message extension attacks that could bypass the message hash. (bsc#1218046)
- CVE-2023-49936: Prevent NULL pointer dereference on `size_valp` overflow. (bsc#1218050)
- CVE-2023-49937: Prevent double-xfree() on error in `_unpack_node_reg_resp()`. (bsc#1218051)
- CVE-2023-49938: Prevent modified `sbcast` RPCs from opening a file with the wrong group permissions. (bsc#1218053)

Other fixes:

- Add missing service file for slurmrestd (bsc#1217711).
- Fix slurm upgrading to incompatible versions (bsc#1216869).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2024-311,SUSE-SLE-Module-HPC-12-2024-311</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20240311-1/</URL>
      <Description>Link for SUSE-SU-2024:0311-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2024-February/017845.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:0311-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1216869</URL>
      <Description>SUSE Bug 1216869</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1217711</URL>
      <Description>SUSE Bug 1217711</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218046</URL>
      <Description>SUSE Bug 1218046</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218050</URL>
      <Description>SUSE Bug 1218050</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218051</URL>
      <Description>SUSE Bug 1218051</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218053</URL>
      <Description>SUSE Bug 1218053</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-49933/</URL>
      <Description>SUSE CVE CVE-2023-49933 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-49936/</URL>
      <Description>SUSE CVE CVE-2023-49936 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-49937/</URL>
      <Description>SUSE CVE CVE-2023-49937 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-49938/</URL>
      <Description>SUSE CVE CVE-2023-49938 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for HPC 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for HPC 12">
        <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12" CPE="cpe:/o:suse:sle-module-hpc:12">SUSE Linux Enterprise Module for HPC 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libnss_slurm2_22_05-22.05.11-3.9.1">
      <FullProductName ProductID="libnss_slurm2_22_05-22.05.11-3.9.1">libnss_slurm2_22_05-22.05.11-3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpmi0_22_05-22.05.11-3.9.1">
      <FullProductName ProductID="libpmi0_22_05-22.05.11-3.9.1">libpmi0_22_05-22.05.11-3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libslurm38-22.05.11-3.9.1">
      <FullProductName ProductID="libslurm38-22.05.11-3.9.1">libslurm38-22.05.11-3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="perl-slurm_22_05-22.05.11-3.9.1">
      <FullProductName ProductID="perl-slurm_22_05-22.05.11-3.9.1">perl-slurm_22_05-22.05.11-3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_22_05-22.05.11-3.9.1">
      <FullProductName ProductID="slurm_22_05-22.05.11-3.9.1">slurm_22_05-22.05.11-3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_22_05-auth-none-22.05.11-3.9.1">
      <FullProductName ProductID="slurm_22_05-auth-none-22.05.11-3.9.1">slurm_22_05-auth-none-22.05.11-3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_22_05-config-22.05.11-3.9.1">
      <FullProductName ProductID="slurm_22_05-config-22.05.11-3.9.1">slurm_22_05-config-22.05.11-3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_22_05-config-man-22.05.11-3.9.1">
      <FullProductName ProductID="slurm_22_05-config-man-22.05.11-3.9.1">slurm_22_05-config-man-22.05.11-3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_22_05-cray-22.05.11-3.9.1">
      <FullProductName ProductID="slurm_22_05-cray-22.05.11-3.9.1">slurm_22_05-cray-22.05.11-3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_22_05-devel-22.05.11-3.9.1">
      <FullProductName ProductID="slurm_22_05-devel-22.05.11-3.9.1">slurm_22_05-devel-22.05.11-3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_22_05-doc-22.05.11-3.9.1">
      <FullProductName ProductID="slurm_22_05-doc-22.05.11-3.9.1">slurm_22_05-doc-22.05.11-3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_22_05-lua-22.05.11-3.9.1">
      <FullProductName ProductID="slurm_22_05-lua-22.05.11-3.9.1">slurm_22_05-lua-22.05.11-3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_22_05-munge-22.05.11-3.9.1">
      <FullProductName ProductID="slurm_22_05-munge-22.05.11-3.9.1">slurm_22_05-munge-22.05.11-3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_22_05-node-22.05.11-3.9.1">
      <FullProductName ProductID="slurm_22_05-node-22.05.11-3.9.1">slurm_22_05-node-22.05.11-3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_22_05-openlava-22.05.11-3.9.1">
      <FullProductName ProductID="slurm_22_05-openlava-22.05.11-3.9.1">slurm_22_05-openlava-22.05.11-3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_22_05-pam_slurm-22.05.11-3.9.1">
      <FullProductName ProductID="slurm_22_05-pam_slurm-22.05.11-3.9.1">slurm_22_05-pam_slurm-22.05.11-3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_22_05-plugins-22.05.11-3.9.1">
      <FullProductName ProductID="slurm_22_05-plugins-22.05.11-3.9.1">slurm_22_05-plugins-22.05.11-3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_22_05-seff-22.05.11-3.9.1">
      <FullProductName ProductID="slurm_22_05-seff-22.05.11-3.9.1">slurm_22_05-seff-22.05.11-3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_22_05-sjstat-22.05.11-3.9.1">
      <FullProductName ProductID="slurm_22_05-sjstat-22.05.11-3.9.1">slurm_22_05-sjstat-22.05.11-3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_22_05-slurmdbd-22.05.11-3.9.1">
      <FullProductName ProductID="slurm_22_05-slurmdbd-22.05.11-3.9.1">slurm_22_05-slurmdbd-22.05.11-3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_22_05-sql-22.05.11-3.9.1">
      <FullProductName ProductID="slurm_22_05-sql-22.05.11-3.9.1">slurm_22_05-sql-22.05.11-3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_22_05-sview-22.05.11-3.9.1">
      <FullProductName ProductID="slurm_22_05-sview-22.05.11-3.9.1">slurm_22_05-sview-22.05.11-3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_22_05-testsuite-22.05.11-3.9.1">
      <FullProductName ProductID="slurm_22_05-testsuite-22.05.11-3.9.1">slurm_22_05-testsuite-22.05.11-3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_22_05-torque-22.05.11-3.9.1">
      <FullProductName ProductID="slurm_22_05-torque-22.05.11-3.9.1">slurm_22_05-torque-22.05.11-3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_22_05-webdoc-22.05.11-3.9.1">
      <FullProductName ProductID="slurm_22_05-webdoc-22.05.11-3.9.1">slurm_22_05-webdoc-22.05.11-3.9.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libnss_slurm2_22_05-22.05.11-3.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:libnss_slurm2_22_05-22.05.11-3.9.1">libnss_slurm2_22_05-22.05.11-3.9.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpmi0_22_05-22.05.11-3.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:libpmi0_22_05-22.05.11-3.9.1">libpmi0_22_05-22.05.11-3.9.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="libslurm38-22.05.11-3.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:libslurm38-22.05.11-3.9.1">libslurm38-22.05.11-3.9.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="perl-slurm_22_05-22.05.11-3.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:perl-slurm_22_05-22.05.11-3.9.1">perl-slurm_22_05-22.05.11-3.9.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_22_05-22.05.11-3.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm_22_05-22.05.11-3.9.1">slurm_22_05-22.05.11-3.9.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_22_05-auth-none-22.05.11-3.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm_22_05-auth-none-22.05.11-3.9.1">slurm_22_05-auth-none-22.05.11-3.9.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_22_05-config-22.05.11-3.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm_22_05-config-22.05.11-3.9.1">slurm_22_05-config-22.05.11-3.9.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_22_05-config-man-22.05.11-3.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm_22_05-config-man-22.05.11-3.9.1">slurm_22_05-config-man-22.05.11-3.9.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_22_05-devel-22.05.11-3.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm_22_05-devel-22.05.11-3.9.1">slurm_22_05-devel-22.05.11-3.9.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_22_05-doc-22.05.11-3.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm_22_05-doc-22.05.11-3.9.1">slurm_22_05-doc-22.05.11-3.9.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_22_05-lua-22.05.11-3.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm_22_05-lua-22.05.11-3.9.1">slurm_22_05-lua-22.05.11-3.9.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_22_05-munge-22.05.11-3.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm_22_05-munge-22.05.11-3.9.1">slurm_22_05-munge-22.05.11-3.9.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_22_05-node-22.05.11-3.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm_22_05-node-22.05.11-3.9.1">slurm_22_05-node-22.05.11-3.9.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_22_05-pam_slurm-22.05.11-3.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm_22_05-pam_slurm-22.05.11-3.9.1">slurm_22_05-pam_slurm-22.05.11-3.9.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_22_05-plugins-22.05.11-3.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm_22_05-plugins-22.05.11-3.9.1">slurm_22_05-plugins-22.05.11-3.9.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_22_05-slurmdbd-22.05.11-3.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm_22_05-slurmdbd-22.05.11-3.9.1">slurm_22_05-slurmdbd-22.05.11-3.9.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_22_05-sql-22.05.11-3.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm_22_05-sql-22.05.11-3.9.1">slurm_22_05-sql-22.05.11-3.9.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_22_05-sview-22.05.11-3.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm_22_05-sview-22.05.11-3.9.1">slurm_22_05-sview-22.05.11-3.9.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_22_05-torque-22.05.11-3.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm_22_05-torque-22.05.11-3.9.1">slurm_22_05-torque-22.05.11-3.9.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_22_05-webdoc-22.05.11-3.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for HPC 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for HPC 12:slurm_22_05-webdoc-22.05.11-3.9.1">slurm_22_05-webdoc-22.05.11-3.9.1 as a component of SUSE Linux Enterprise Module for HPC 12</FullProductName>
    </Relationship>
  </ProductTree>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. There is Improper Enforcement of Message Integrity During Transmission in a Communication Channel. This allows attackers to modify RPC traffic in a way that bypasses message hash checks. The fixed versions are 22.05.11, 23.02.7, and 23.11.1.</Note>
    </Notes>
    <CVE>CVE-2023-49933</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for HPC 12:libnss_slurm2_22_05-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:libpmi0_22_05-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:libslurm38-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:perl-slurm_22_05-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-auth-none-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-config-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-config-man-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-devel-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-doc-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-lua-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-munge-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-node-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-pam_slurm-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-plugins-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-slurmdbd-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-sql-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-sview-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-torque-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-webdoc-22.05.11-3.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV3>
        <BaseScoreV3>5.9</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20240311-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-49933.html</URL>
        <Description>CVE-2023-49933</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218046</URL>
        <Description>SUSE Bug 1218046</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. A NULL pointer dereference leads to denial of service. The fixed versions are 22.05.11, 23.02.7, and 23.11.1.</Note>
    </Notes>
    <CVE>CVE-2023-49936</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for HPC 12:libnss_slurm2_22_05-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:libpmi0_22_05-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:libslurm38-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:perl-slurm_22_05-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-auth-none-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-config-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-config-man-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-devel-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-doc-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-lua-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-munge-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-node-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-pam_slurm-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-plugins-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-slurmdbd-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-sql-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-sview-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-torque-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-webdoc-22.05.11-3.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV3>
        <BaseScoreV3>7.8</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20240311-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-49936.html</URL>
        <Description>CVE-2023-49936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218050</URL>
        <Description>SUSE Bug 1218050</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. Because of a double free, attackers can cause a denial of service or possibly execute arbitrary code. The fixed versions are 22.05.11, 23.02.7, and 23.11.1.</Note>
    </Notes>
    <CVE>CVE-2023-49937</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for HPC 12:libnss_slurm2_22_05-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:libpmi0_22_05-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:libslurm38-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:perl-slurm_22_05-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-auth-none-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-config-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-config-man-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-devel-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-doc-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-lua-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-munge-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-node-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-pam_slurm-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-plugins-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-slurmdbd-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-sql-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-sview-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-torque-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-webdoc-22.05.11-3.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV3>
        <BaseScoreV3>7.8</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20240311-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-49937.html</URL>
        <Description>CVE-2023-49937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218051</URL>
        <Description>SUSE Bug 1218051</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in SchedMD Slurm 22.05.x and 23.02.x. There is Incorrect Access Control: an attacker can modified their extended group list that is used with the sbcast subsystem, and open files with an unauthorized set of extended groups. The fixed versions are 22.05.11 and 23.02.7.</Note>
    </Notes>
    <CVE>CVE-2023-49938</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for HPC 12:libnss_slurm2_22_05-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:libpmi0_22_05-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:libslurm38-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:perl-slurm_22_05-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-auth-none-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-config-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-config-man-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-devel-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-doc-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-lua-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-munge-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-node-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-pam_slurm-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-plugins-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-slurmdbd-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-sql-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-sview-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-torque-22.05.11-3.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for HPC 12:slurm_22_05-webdoc-22.05.11-3.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV3>
        <BaseScoreV3>5.1</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20240311-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-49938.html</URL>
        <Description>CVE-2023-49938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218053</URL>
        <Description>SUSE Bug 1218053</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
</cvrfdoc>
