Language:
https://bugzilla.suse.com/show_bug.cgi?id=1018371
https://bugzilla.suse.com/show_bug.cgi?id=1065697
https://bugzilla.suse.com/show_bug.cgi?id=1085240
https://bugzilla.suse.com/show_bug.cgi?id=1095508
https://bugzilla.suse.com/show_bug.cgi?id=1123304
https://bugzilla.suse.com/show_bug.cgi?id=1140709
https://bugzilla.suse.com/show_bug.cgi?id=1155784
https://bugzilla.suse.com/show_bug.cgi?id=1158709
https://bugzilla.suse.com/show_bug.cgi?id=1158798
https://bugzilla.suse.com/show_bug.cgi?id=1159692
https://www.suse.com/security/cve/CVE-2016-10030/
https://www.suse.com/security/cve/CVE-2017-15566/
https://www.suse.com/security/cve/CVE-2018-10995/
https://www.suse.com/security/cve/CVE-2018-7033/
https://www.suse.com/security/cve/CVE-2019-12838/
https://www.suse.com/security/cve/CVE-2019-19727/
https://www.suse.com/security/cve/CVE-2019-19728/
Severity: Critical
ID: 133949
File Name: suse_SU-2020-0434-1.nasl
Version: 1.3
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 2/24/2020
Updated: 5/18/2022
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: High
Base Score: 7.6
Temporal Score: 5.6
Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2016-10030
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 8.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CVSS Score Source: CVE-2019-6438
CPE: p-cpe:/a:novell:suse_linux:libpmi0_18_08, p-cpe:/a:novell:suse_linux:libpmi0_18_08-debuginfo, p-cpe:/a:novell:suse_linux:libslurm33, p-cpe:/a:novell:suse_linux:libslurm33-debuginfo, p-cpe:/a:novell:suse_linux:pdsh, p-cpe:/a:novell:suse_linux:pdsh-debuginfo, p-cpe:/a:novell:suse_linux:pdsh-debugsource, p-cpe:/a:novell:suse_linux:pdsh-dshgroup, p-cpe:/a:novell:suse_linux:pdsh-dshgroup-debuginfo, p-cpe:/a:novell:suse_linux:pdsh-genders, p-cpe:/a:novell:suse_linux:pdsh-genders-debuginfo, p-cpe:/a:novell:suse_linux:pdsh-machines, p-cpe:/a:novell:suse_linux:pdsh-machines-debuginfo, p-cpe:/a:novell:suse_linux:pdsh-netgroup, p-cpe:/a:novell:suse_linux:pdsh-netgroup-debuginfo, p-cpe:/a:novell:suse_linux:pdsh-slurm, p-cpe:/a:novell:suse_linux:pdsh-slurm-debuginfo, p-cpe:/a:novell:suse_linux:pdsh-slurm_18_08, p-cpe:/a:novell:suse_linux:pdsh-slurm_18_08-debuginfo, p-cpe:/a:novell:suse_linux:perl-slurm_18_08, p-cpe:/a:novell:suse_linux:perl-slurm_18_08-debuginfo, p-cpe:/a:novell:suse_linux:slurm_18_08, p-cpe:/a:novell:suse_linux:slurm_18_08-auth-none, p-cpe:/a:novell:suse_linux:slurm_18_08-auth-none-debuginfo, p-cpe:/a:novell:suse_linux:slurm_18_08-config, p-cpe:/a:novell:suse_linux:slurm_18_08-debuginfo, p-cpe:/a:novell:suse_linux:slurm_18_08-debugsource, p-cpe:/a:novell:suse_linux:slurm_18_08-devel, p-cpe:/a:novell:suse_linux:slurm_18_08-doc, p-cpe:/a:novell:suse_linux:slurm_18_08-lua, p-cpe:/a:novell:suse_linux:slurm_18_08-lua-debuginfo, p-cpe:/a:novell:suse_linux:slurm_18_08-munge, p-cpe:/a:novell:suse_linux:slurm_18_08-munge-debuginfo, p-cpe:/a:novell:suse_linux:slurm_18_08-node, p-cpe:/a:novell:suse_linux:slurm_18_08-node-debuginfo, p-cpe:/a:novell:suse_linux:slurm_18_08-pam_slurm, p-cpe:/a:novell:suse_linux:slurm_18_08-pam_slurm-debuginfo, p-cpe:/a:novell:suse_linux:slurm_18_08-plugins, p-cpe:/a:novell:suse_linux:slurm_18_08-plugins-debuginfo, p-cpe:/a:novell:suse_linux:slurm_18_08-slurmdbd, p-cpe:/a:novell:suse_linux:slurm_18_08-slurmdbd-debuginfo, p-cpe:/a:novell:suse_linux:slurm_18_08-sql, p-cpe:/a:novell:suse_linux:slurm_18_08-sql-debuginfo, p-cpe:/a:novell:suse_linux:slurm_18_08-torque, p-cpe:/a:novell:suse_linux:slurm_18_08-torque-debuginfo, cpe:/o:novell:suse_linux:12
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 2/21/2020
Vulnerability Publication Date: 1/5/2017
CVE: CVE-2016-10030, CVE-2017-15566, CVE-2018-10995, CVE-2018-7033, CVE-2019-12838, CVE-2019-19727, CVE-2019-19728, CVE-2019-6438