{"id":"CVE-2023-49933","details":"An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. There is Improper Enforcement of Message Integrity During Transmission in a Communication Channel. This allows attackers to modify RPC traffic in a way that bypasses message hash checks. The fixed versions are 22.05.11, 23.02.7, and 23.11.1.","modified":"2026-05-15T11:53:27.063243622Z","published":"2023-12-14T00:00:00Z","related":["SUSE-SU-2024:0278-1","SUSE-SU-2024:0279-1","SUSE-SU-2024:0280-1","SUSE-SU-2024:0283-1","SUSE-SU-2024:0284-1","SUSE-SU-2024:0286-1","SUSE-SU-2024:0287-1","SUSE-SU-2024:0288-1","SUSE-SU-2024:0289-1","SUSE-SU-2024:0309-1","SUSE-SU-2024:0310-1","SUSE-SU-2024:0311-1","SUSE-SU-2024:0312-1","SUSE-SU-2024:0313-1","SUSE-SU-2024:0314-1","SUSE-SU-2024:0315-1","openSUSE-SU-2024:13559-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/49xxx/CVE-2023-49933.json","cna_assigner":"mitre"},"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/63FEDDYEE2WK7FHWBHKON3OZVQI56WSQ/"},{"type":"WEB","url":"https://lists.schedmd.com/pipermail/slurm-announce/2023/000103.html"},{"type":"WEB","url":"https://www.schedmd.com/security-archive.php"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/49xxx/CVE-2023-49933.json"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63FEDDYEE2WK7FHWBHKON3OZVQI56WSQ/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYQS3LFGC4HE4WCW4L3NAA2I6FRIWMNO/"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-49933"}],"schema_version":"1.7.5"}