Language:
https://security-tracker.debian.org/tracker/source-package/slurm-wlm
https://www.debian.org/security/2023/dsa-5529
Severity: High
ID: 183306
File Name: debian_DSA-5529.nasl
Version: 1.2
Type: local
Agent: unix
Family: Debian Local Security Checks
Published: 10/18/2023
Updated: 11/10/2023
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: Medium
Base Score: 6
Temporal Score: 4.4
Vector: CVSS2#AV:L/AC:H/Au:S/C:C/I:C/A:C
CVSS Score Source: CVE-2023-41914
Risk Factor: High
Base Score: 7
Temporal Score: 6.1
Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:debian:debian_linux:slurm-wlm-doc, p-cpe:/a:debian:debian_linux:slurm-wlm-emulator, p-cpe:/a:debian:debian_linux:slurm-wlm-ipmi-plugins-dev, p-cpe:/a:debian:debian_linux:slurm-wlm-hdf5-plugin-dev, p-cpe:/a:debian:debian_linux:slurmctld, p-cpe:/a:debian:debian_linux:slurm-wlm-plugins, p-cpe:/a:debian:debian_linux:libslurm-perl, p-cpe:/a:debian:debian_linux:slurm-wlm-influxdb-plugin, p-cpe:/a:debian:debian_linux:libslurmdb-perl, cpe:/o:debian:debian_linux:12.0, p-cpe:/a:debian:debian_linux:slurm-client, p-cpe:/a:debian:debian_linux:sview, p-cpe:/a:debian:debian_linux:libpam-slurm-adopt, p-cpe:/a:debian:debian_linux:slurm-wlm-basic-plugins-dev, p-cpe:/a:debian:debian_linux:slurm-wlm-plugins-dev, p-cpe:/a:debian:debian_linux:libpmi0-dev, p-cpe:/a:debian:debian_linux:slurm-wlm-mysql-plugin-dev, p-cpe:/a:debian:debian_linux:libpmi0, p-cpe:/a:debian:debian_linux:slurm-client-emulator, p-cpe:/a:debian:debian_linux:slurm-wlm-rsmi-plugin, p-cpe:/a:debian:debian_linux:slurm-wlm-jwt-plugin, p-cpe:/a:debian:debian_linux:slurm-wlm-mysql-plugin, p-cpe:/a:debian:debian_linux:slurm-wlm-influxdb-plugin-dev, p-cpe:/a:debian:debian_linux:slurm-wlm-rsmi-plugin-dev, p-cpe:/a:debian:debian_linux:slurm-wlm-elasticsearch-plugin-dev, p-cpe:/a:debian:debian_linux:libpmi2-0-dev, p-cpe:/a:debian:debian_linux:slurm-wlm-basic-plugins, p-cpe:/a:debian:debian_linux:slurm-wlm-hdf5-plugin, p-cpe:/a:debian:debian_linux:libslurm-dev, p-cpe:/a:debian:debian_linux:slurm-wlm-elasticsearch-plugin, p-cpe:/a:debian:debian_linux:slurm-wlm-jwt-plugin-dev, p-cpe:/a:debian:debian_linux:slurm-wlm-rrd-plugin, p-cpe:/a:debian:debian_linux:libpmi2-0, p-cpe:/a:debian:debian_linux:slurm-wlm-ipmi-plugins, p-cpe:/a:debian:debian_linux:slurmrestd, p-cpe:/a:debian:debian_linux:slurm-wlm-rrd-plugin-dev, p-cpe:/a:debian:debian_linux:slurm-wlm-torque, p-cpe:/a:debian:debian_linux:libpam-slurm, p-cpe:/a:debian:debian_linux:slurmd, p-cpe:/a:debian:debian_linux:slurmdbd, p-cpe:/a:debian:debian_linux:slurm-wlm, p-cpe:/a:debian:debian_linux:libslurm38
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Ease: No known exploits are available
Patch Publication Date: 10/17/2023
Vulnerability Publication Date: 10/17/2023
CVE: CVE-2023-41914