An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. There is Improper Enforcement of Message Integrity During Transmission in a Communication Channel. This allows attackers to modify RPC traffic in a way that bypasses message hash checks. The fixed versions are 22.05.11, 23.02.7, and 23.11.1. https://lists.schedmd.com/pipermail/slurm-announce/2023/000103.html https://www.schedmd.com/security-archive.php
Created slurm tracking bugs for this issue: Affects: fedora-all [bug 2254509]