Language:
https://bugzilla.suse.com/show_bug.cgi?id=1007053
https://bugzilla.suse.com/show_bug.cgi?id=1018371
https://bugzilla.suse.com/show_bug.cgi?id=1031872
https://bugzilla.suse.com/show_bug.cgi?id=1041706
https://bugzilla.suse.com/show_bug.cgi?id=1065697
https://bugzilla.suse.com/show_bug.cgi?id=1084125
https://bugzilla.suse.com/show_bug.cgi?id=1084917
https://bugzilla.suse.com/show_bug.cgi?id=1085240
https://bugzilla.suse.com/show_bug.cgi?id=1085606
https://bugzilla.suse.com/show_bug.cgi?id=1086859
https://bugzilla.suse.com/show_bug.cgi?id=1088693
https://bugzilla.suse.com/show_bug.cgi?id=1090292
https://bugzilla.suse.com/show_bug.cgi?id=1095508
https://bugzilla.suse.com/show_bug.cgi?id=1100850
https://bugzilla.suse.com/show_bug.cgi?id=1103561
https://bugzilla.suse.com/show_bug.cgi?id=1108671
https://bugzilla.suse.com/show_bug.cgi?id=1109373
https://bugzilla.suse.com/show_bug.cgi?id=1116758
https://bugzilla.suse.com/show_bug.cgi?id=1123304
https://bugzilla.suse.com/show_bug.cgi?id=1140709
https://bugzilla.suse.com/show_bug.cgi?id=1153095
https://bugzilla.suse.com/show_bug.cgi?id=1153259
https://bugzilla.suse.com/show_bug.cgi?id=1155784
https://bugzilla.suse.com/show_bug.cgi?id=1158696
https://bugzilla.suse.com/show_bug.cgi?id=1159692
https://bugzilla.suse.com/show_bug.cgi?id=1161716
https://bugzilla.suse.com/show_bug.cgi?id=1162377
https://bugzilla.suse.com/show_bug.cgi?id=1164326
https://bugzilla.suse.com/show_bug.cgi?id=1164386
https://bugzilla.suse.com/show_bug.cgi?id=1172004
https://bugzilla.suse.com/show_bug.cgi?id=1173805
https://www.suse.com/security/cve/CVE-2016-10030/
https://www.suse.com/security/cve/CVE-2017-15566/
https://www.suse.com/security/cve/CVE-2018-10995/
https://www.suse.com/security/cve/CVE-2018-7033/
https://www.suse.com/security/cve/CVE-2019-12838/
https://www.suse.com/security/cve/CVE-2019-19727/
https://www.suse.com/security/cve/CVE-2019-19728/
https://www.suse.com/security/cve/CVE-2019-6438/
Severity: Critical
ID: 143870
File Name: suse_SU-2020-2607-1.nasl
Version: 1.3
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 12/9/2020
Updated: 5/11/2022
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: High
Base Score: 7.6
Temporal Score: 5.6
Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2016-10030
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 8.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CVSS Score Source: CVE-2019-6438
CPE: p-cpe:/a:novell:suse_linux:libnss_slurm2_20_02, p-cpe:/a:novell:suse_linux:libnss_slurm2_20_02-debuginfo, p-cpe:/a:novell:suse_linux:libpmi0_20_02, p-cpe:/a:novell:suse_linux:libpmi0_20_02-debuginfo, p-cpe:/a:novell:suse_linux:libslurm35, p-cpe:/a:novell:suse_linux:libslurm35-debuginfo, p-cpe:/a:novell:suse_linux:pdsh-slurm_18_08, p-cpe:/a:novell:suse_linux:pdsh-slurm_18_08-debuginfo, p-cpe:/a:novell:suse_linux:pdsh-slurm_20_02, p-cpe:/a:novell:suse_linux:pdsh-slurm_20_02-debuginfo, p-cpe:/a:novell:suse_linux:perl-slurm_20_02, p-cpe:/a:novell:suse_linux:perl-slurm_20_02-debuginfo, p-cpe:/a:novell:suse_linux:slurm_20_02, p-cpe:/a:novell:suse_linux:slurm_20_02-auth-none, p-cpe:/a:novell:suse_linux:slurm_20_02-auth-none-debuginfo, p-cpe:/a:novell:suse_linux:slurm_20_02-config, p-cpe:/a:novell:suse_linux:slurm_20_02-config-man, p-cpe:/a:novell:suse_linux:slurm_20_02-debuginfo, p-cpe:/a:novell:suse_linux:slurm_20_02-debugsource, p-cpe:/a:novell:suse_linux:slurm_20_02-devel, p-cpe:/a:novell:suse_linux:slurm_20_02-doc, p-cpe:/a:novell:suse_linux:slurm_20_02-lua, p-cpe:/a:novell:suse_linux:slurm_20_02-lua-debuginfo, p-cpe:/a:novell:suse_linux:slurm_20_02-munge, p-cpe:/a:novell:suse_linux:slurm_20_02-munge-debuginfo, p-cpe:/a:novell:suse_linux:slurm_20_02-node, p-cpe:/a:novell:suse_linux:slurm_20_02-node-debuginfo, p-cpe:/a:novell:suse_linux:slurm_20_02-pam_slurm, p-cpe:/a:novell:suse_linux:slurm_20_02-pam_slurm-debuginfo, p-cpe:/a:novell:suse_linux:slurm_20_02-plugins, p-cpe:/a:novell:suse_linux:slurm_20_02-plugins-debuginfo, p-cpe:/a:novell:suse_linux:slurm_20_02-slurmdbd, p-cpe:/a:novell:suse_linux:slurm_20_02-slurmdbd-debuginfo, p-cpe:/a:novell:suse_linux:slurm_20_02-sql, p-cpe:/a:novell:suse_linux:slurm_20_02-sql-debuginfo, p-cpe:/a:novell:suse_linux:slurm_20_02-sview, p-cpe:/a:novell:suse_linux:slurm_20_02-sview-debuginfo, p-cpe:/a:novell:suse_linux:slurm_20_02-torque, p-cpe:/a:novell:suse_linux:slurm_20_02-torque-debuginfo, cpe:/o:novell:suse_linux:12
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 9/11/2020
Vulnerability Publication Date: 1/5/2017
CVE: CVE-2016-10030, CVE-2017-15566, CVE-2018-10995, CVE-2018-7033, CVE-2019-12838, CVE-2019-19727, CVE-2019-19728, CVE-2019-6438, CVE-2020-12693