5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.003 Low
EPSS
Percentile
65.4%
Debian Security Advisory DSA-4254-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
July 24, 2018 https://www.debian.org/security/faq
Package : slurm-llnl
CVE ID : CVE-2018-7033 CVE-2018-10995
Debian Bug : 893044 900548
Several vulnerabilities were discovered in the Simple Linux Utility for
Resource Management (SLURM), a cluster resource management and job
scheduling system. The Common Vulnerabilities and Exposures project
identifies the following problems:
CVE-2018-7033
Incomplete sanitization of user-provided text strings could lead to
SQL injection attacks against slurmdbd.
CVE-2018-10995
Insecure handling of user_name and gid fields leading to improper
authentication handling.
For the stable distribution (stretch), these problems have been fixed in
version 16.05.9-1+deb9u2.
We recommend that you upgrade your slurm-llnl packages.
For the detailed security status of slurm-llnl please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/slurm-llnl
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 9 | i386 | slurmctld | < 16.05.9-1+deb9u2 | slurmctld_16.05.9-1+deb9u2_i386.deb |
Debian | 9 | arm64 | libslurmdb30 | < 16.05.9-1+deb9u2 | libslurmdb30_16.05.9-1+deb9u2_arm64.deb |
Debian | 9 | ppc64el | slurm-wlm | < 16.05.9-1+deb9u2 | slurm-wlm_16.05.9-1+deb9u2_ppc64el.deb |
Debian | 8 | armhf | libslurm-dev | < 14.03.9-5+deb8u3 | libslurm-dev_14.03.9-5+deb8u3_armhf.deb |
Debian | 9 | amd64 | libslurm30-dbg | < 16.05.9-1+deb9u2 | libslurm30-dbg_16.05.9-1+deb9u2_amd64.deb |
Debian | 8 | amd64 | libslurm-dev | < 14.03.9-5+deb8u3 | libslurm-dev_14.03.9-5+deb8u3_amd64.deb |
Debian | 9 | arm64 | libslurm30-dbg | < 16.05.9-1+deb9u2 | libslurm30-dbg_16.05.9-1+deb9u2_arm64.deb |
Debian | 8 | i386 | libslurmdb27 | < 14.03.9-5+deb8u3 | libslurmdb27_14.03.9-5+deb8u3_i386.deb |
Debian | 9 | mips64el | libslurm-dev | < 16.05.9-1+deb9u2 | libslurm-dev_16.05.9-1+deb9u2_mips64el.deb |
Debian | 9 | mipsel | libpmi2-0 | < 16.05.9-1+deb9u2 | libpmi2-0_16.05.9-1+deb9u2_mipsel.deb |
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.003 Low
EPSS
Percentile
65.4%