schedmd CVE Vulnerabilities & Metrics

Focus on schedmd vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About schedmd Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with schedmd. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total schedmd CVEs: 23
Earliest CVE date: 05 Jan 2017, 11:59 UTC
Latest CVE date: 14 Dec 2023, 05:15 UTC

Latest CVE reference: CVE-2023-49938

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical schedmd CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.46

Max CVSS: 9.0

Critical CVEs (≥9): 2

CVSS Range vs. Count

Range Count
0.0-3.9 8
4.0-6.9 7
7.0-8.9 6
9.0-10.0 2

CVSS Distribution Chart

Top 5 Highest CVSS schedmd CVEs

These are the five CVEs with the highest CVSS scores for schedmd, sorted by severity first and recency.

All CVEs for schedmd

CVE-2023-49938 schedmd vulnerability CVSS: 0 14 Dec 2023, 05:15 UTC

An issue was discovered in SchedMD Slurm 22.05.x and 23.02.x. There is Incorrect Access Control: an attacker can modified their extended group list that is used with the sbcast subsystem, and open files with an unauthorized set of extended groups. The fixed versions are 22.05.11 and 23.02.7.

CVE-2023-49937 schedmd vulnerability CVSS: 0 14 Dec 2023, 05:15 UTC

An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. Because of a double free, attackers can cause a denial of service or possibly execute arbitrary code. The fixed versions are 22.05.11, 23.02.7, and 23.11.1.

CVE-2023-49936 schedmd vulnerability CVSS: 0 14 Dec 2023, 05:15 UTC

An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. A NULL pointer dereference leads to denial of service. The fixed versions are 22.05.11, 23.02.7, and 23.11.1.

CVE-2023-49935 schedmd vulnerability CVSS: 0 14 Dec 2023, 05:15 UTC

An issue was discovered in SchedMD Slurm 23.02.x and 23.11.x. There is Incorrect Access Control because of a slurmd Message Integrity Bypass. An attacker can reuse root-level authentication tokens during interaction with the slurmd process. This bypasses the RPC message hashes that protect against undesired MUNGE credential reuse. The fixed versions are 23.02.7 and 23.11.1.

CVE-2023-49934 schedmd vulnerability CVSS: 0 14 Dec 2023, 05:15 UTC

An issue was discovered in SchedMD Slurm 23.11.x. There is SQL Injection against the SlurmDBD database. The fixed version is 23.11.1.

CVE-2023-49933 schedmd vulnerability CVSS: 0 14 Dec 2023, 05:15 UTC

An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. There is Improper Enforcement of Message Integrity During Transmission in a Communication Channel. This allows attackers to modify RPC traffic in a way that bypasses message hash checks. The fixed versions are 22.05.11, 23.02.7, and 23.11.1.

CVE-2023-41914 schedmd vulnerability CVSS: 0 03 Nov 2023, 05:15 UTC

SchedMD Slurm 23.02.x before 23.02.6 and 22.05.x before 22.05.10 allows filesystem race conditions for gaining ownership of a file, overwriting a file, or deleting files.

CVE-2022-29502 schedmd vulnerability CVSS: 7.5 05 May 2022, 17:15 UTC

SchedMD Slurm 21.08.x through 20.11.x has Incorrect Access Control that leads to Escalation of Privileges.

CVE-2022-29501 schedmd vulnerability CVSS: 9.0 05 May 2022, 17:15 UTC

SchedMD Slurm 21.08.x through 20.11.x has Incorrect Access Control that leads to Escalation of Privileges and code execution.

CVE-2022-29500 schedmd vulnerability CVSS: 9.0 05 May 2022, 17:15 UTC

SchedMD Slurm 21.08.x through 20.11.x has Incorrect Access Control that leads to Information Disclosure.

CVE-2021-43337 schedmd vulnerability CVSS: 4.0 17 Nov 2021, 06:15 UTC

SchedMD Slurm 21.08.* before 21.08.4 has Incorrect Access Control. On sites using the new AccountingStoreFlags=job_script and/or job_env options, the access control rules in SlurmDBD may permit users to request job scripts and environment files to which they should not have access.

CVE-2021-31215 schedmd vulnerability CVSS: 6.5 13 May 2021, 06:15 UTC

SchedMD Slurm before 20.02.7 and 20.03.x through 20.11.x before 20.11.7 allows remote code execution as SlurmUser because use of a PrologSlurmctld or EpilogSlurmctld script leads to environment mishandling.

CVE-2020-27746 schedmd vulnerability CVSS: 4.3 27 Nov 2020, 18:15 UTC

Slurm before 19.05.8 and 20.x before 20.02.6 exposes Sensitive Information to an Unauthorized Actor because xauth for X11 magic cookies is affected by a race condition in a read operation on the /proc filesystem.

CVE-2020-27745 schedmd vulnerability CVSS: 6.8 27 Nov 2020, 17:15 UTC

Slurm before 19.05.8 and 20.x before 20.02.6 has an RPC Buffer Overflow in the PMIx MPI plugin.

CVE-2020-12693 schedmd vulnerability CVSS: 5.1 21 May 2020, 23:15 UTC

Slurm 19.05.x before 19.05.7 and 20.02.x before 20.02.3, in the rare case where Message Aggregation is enabled, allows Authentication Bypass via an Alternate Path or Channel. A race condition allows a user to launch a process as an arbitrary user.

CVE-2019-19728 schedmd vulnerability CVSS: 6.0 13 Jan 2020, 19:15 UTC

SchedMD Slurm before 18.08.9 and 19.x before 19.05.5 executes srun --uid with incorrect privileges.

CVE-2019-19727 schedmd vulnerability CVSS: 2.1 13 Jan 2020, 19:15 UTC

SchedMD Slurm before 18.08.9 and 19.x before 19.05.5 has weak slurmdbd.conf permissions.

CVE-2019-12838 schedmd vulnerability CVSS: 7.5 11 Jul 2019, 13:15 UTC

SchedMD Slurm 17.11.x, 18.08.0 through 18.08.7, and 19.05.0 allows SQL Injection.

CVE-2019-6438 schedmd vulnerability CVSS: 7.5 31 Jan 2019, 09:29 UTC

SchedMD Slurm before 17.11.13 and 18.x before 18.08.5 mishandles 32-bit systems.

CVE-2018-10995 schedmd vulnerability CVSS: 5.0 30 May 2018, 20:29 UTC

SchedMD Slurm before 17.02.11 and 17.1x.x before 17.11.7 mishandles user names (aka user_name fields) and group ids (aka gid fields).

CVE-2018-7033 schedmd vulnerability CVSS: 7.5 15 Mar 2018, 22:29 UTC

SchedMD Slurm before 17.02.10 and 17.11.x before 17.11.5 allows SQL Injection attacks against SlurmDBD.

CVE-2017-15566 schedmd vulnerability CVSS: 7.2 01 Nov 2017, 17:29 UTC

Insecure SPANK environment variable handling exists in SchedMD Slurm before 16.05.11, 17.x before 17.02.9, and 17.11.x before 17.11.0rc2, allowing privilege escalation to root during Prolog or Epilog execution.

CVE-2016-10030 schedmd vulnerability CVSS: 7.6 05 Jan 2017, 11:59 UTC

The _prolog_error function in slurmd/req.c in Slurm before 15.08.13, 16.x before 16.05.7, and 17.x before 17.02.0-pre4 has a vulnerability in how the slurmd daemon informs users of a Prolog failure on a compute node. That vulnerability could allow a user to assume control of an arbitrary file on the system. Any exploitation of this is dependent on the user being able to cause or anticipate the failure (non-zero return code) of a Prolog script that their job would run on. This issue affects all Slurm versions from 0.6.0 (September 2005) to present. Workarounds to prevent exploitation of this are to either disable your Prolog script, or modify it such that it always returns 0 ("success") and adjust it to set the node as down using scontrol instead of relying on the slurmd to handle that automatically. If you do not have a Prolog set you are unaffected by this issue.