openSUSE Security Update : slurm (openSUSE-2019-521)

medium Nessus Plugin ID 123219

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for slurm to version 17.11.7 fixes the following issues :

This security issue was fixed :

- CVE-2018-10995: Ensure correct handling of user names and group ids (bsc#1095508).

These non-security issues were fixed :

- CRAY - Add slurmsmwd to the contribs/cray dir

- PMIX - Added the direct connect authentication.

- Prevent the backup slurmctld from losing the active/available node features list on takeover.

- Be able to force power_down of cloud node even if in power_save state.

- Allow cloud nodes to be recognized in Slurm when booted out of band.

- Notify srun and ctld when unkillable stepd exits.

- Fixes daemoniziation in newly introduced slurmsmwd daemon.

The following tracked packaging changes are included :

- avoid postun error in libpmi0 (bsc#1100850) This update was imported from the SUSE:SLE-15:Update update project.

Solution

Update the affected slurm packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1095508

https://bugzilla.opensuse.org/show_bug.cgi?id=1100850

Plugin Details

Severity: Medium

ID: 123219

File Name: openSUSE-2019-521.nasl

Version: 1.5

Type: local

Agent: unix

Published: 3/27/2019

Updated: 6/11/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2018-10995

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:slurm-node-debuginfo, p-cpe:/a:novell:opensuse:slurm-plugins-debuginfo, cpe:/o:novell:opensuse:15.0, p-cpe:/a:novell:opensuse:slurm-sql, p-cpe:/a:novell:opensuse:libpmi0, p-cpe:/a:novell:opensuse:libslurm32, p-cpe:/a:novell:opensuse:slurm-debuginfo, p-cpe:/a:novell:opensuse:slurm-pam_slurm, p-cpe:/a:novell:opensuse:slurm-sview, p-cpe:/a:novell:opensuse:perl-slurm, p-cpe:/a:novell:opensuse:slurm-sql-debuginfo, p-cpe:/a:novell:opensuse:slurm-seff, p-cpe:/a:novell:opensuse:slurm-lua-debuginfo, p-cpe:/a:novell:opensuse:slurm, p-cpe:/a:novell:opensuse:slurm-munge, p-cpe:/a:novell:opensuse:slurm-auth-none, p-cpe:/a:novell:opensuse:slurm-node, p-cpe:/a:novell:opensuse:slurm-munge-debuginfo, p-cpe:/a:novell:opensuse:slurm-pam_slurm-debuginfo, p-cpe:/a:novell:opensuse:slurm-torque-debuginfo, p-cpe:/a:novell:opensuse:slurm-devel, p-cpe:/a:novell:opensuse:slurm-openlava, p-cpe:/a:novell:opensuse:slurm-debugsource, p-cpe:/a:novell:opensuse:slurm-slurmdbd-debuginfo, p-cpe:/a:novell:opensuse:slurm-torque, p-cpe:/a:novell:opensuse:slurm-lua, p-cpe:/a:novell:opensuse:libslurm32-debuginfo, p-cpe:/a:novell:opensuse:slurm-auth-none-debuginfo, p-cpe:/a:novell:opensuse:slurm-slurmdbd, p-cpe:/a:novell:opensuse:slurm-sview-debuginfo, p-cpe:/a:novell:opensuse:slurm-plugins, p-cpe:/a:novell:opensuse:libpmi0-debuginfo, p-cpe:/a:novell:opensuse:slurm-config, p-cpe:/a:novell:opensuse:perl-slurm-debuginfo, p-cpe:/a:novell:opensuse:slurm-sjstat

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 3/23/2019

Vulnerability Publication Date: 5/30/2018

Reference Information

CVE: CVE-2018-10995