Slurm is an open source, fault-tolerant, and highly scalable cluster management and job scheduling system for Linux clusters. Components include machine status, partition management, job management, scheduling and accounting modules.
{"openvas": [{"lastseen": "2020-01-14T14:48:52", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-01-11T00:00:00", "type": "openvas", "title": "Fedora Update for slurm FEDORA-2019-a93d9cbe53", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19728", "CVE-2019-12838", "CVE-2019-19727"], "modified": "2020-01-13T00:00:00", "id": "OPENVAS:1361412562310877341", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310877341", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.877341\");\n script_version(\"2020-01-13T11:49:13+0000\");\n script_cve_id(\"CVE-2019-19727\", \"CVE-2019-19728\", \"CVE-2019-12838\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-13 11:49:13 +0000 (Mon, 13 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-11 04:02:03 +0000 (Sat, 11 Jan 2020)\");\n script_name(\"Fedora Update for slurm FEDORA-2019-a93d9cbe53\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC30\");\n\n script_xref(name:\"FEDORA\", value:\"2019-a93d9cbe53\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OFCBJLWMP4S5WU25UMBXLUK6CMX4M5F\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'slurm'\n package(s) announced via the FEDORA-2019-a93d9cbe53 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Slurm is an open source, fault-tolerant, and highly scalable\ncluster management and job scheduling system for Linux clusters.\nComponents include machine status, partition management,\njob management, scheduling and accounting modules.\");\n\n script_tag(name:\"affected\", value:\"'slurm' package(s) on Fedora 30.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC30\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm\", rpm:\"slurm~19.05.5~1.fc30\", rls:\"FC30\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-31T16:29:33", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-01-27T00:00:00", "type": "openvas", "title": "openSUSE: Security Advisory for slurm (openSUSE-SU-2020:0085_1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19728", "CVE-2019-12838", "CVE-2019-19727"], "modified": "2020-01-31T00:00:00", "id": "OPENVAS:1361412562310853012", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310853012", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.853012\");\n script_version(\"2020-01-31T08:04:39+0000\");\n script_cve_id(\"CVE-2019-12838\", \"CVE-2019-19727\", \"CVE-2019-19728\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:04:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-27 09:18:57 +0000 (Mon, 27 Jan 2020)\");\n script_name(\"openSUSE: Security Advisory for slurm (openSUSE-SU-2020:0085_1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap15\\.1\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2020:0085-1\");\n script_xref(name:\"URL\", value:\"https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00038.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'slurm'\n package(s) announced via the openSUSE-SU-2020:0085-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"This update for slurm to version 18.08.9 fixes the following issues:\n\n Security issues fixed:\n\n - CVE-2019-19728: Fixed a privilege escalation with srun, where --uid\n might have unintended side effects (bsc#1159692).\n\n - CVE-2019-12838: Fixed SchedMD Slurm SQL Injection issue (bnc#1140709).\n\n - CVE-2019-19727: Fixed permissions of slurmdbd.conf (bsc#1155784).\n\n Bug fixes:\n\n - Fix ownership of /var/spool/slurm on new installations and upgrade\n (bsc#1158696).\n\n - Fix %posttrans macro _res_update to cope with added newline\n (bsc#1153259).\n\n - Move srun from 'slurm' to 'slurm-node': srun is required on the nodes as\n well so sbatch will work. 'slurm-node' is a requirement when 'slurm' is\n installed (bsc#1153095).\n\n This update was imported from the SUSE:SLE-15-SP1:Update update project.\n\n Patch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended\n installation methods\n like YaST online_update or 'zypper patch'.\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.1:\n\n zypper in -t patch openSUSE-2020-85=1\");\n\n script_tag(name:\"affected\", value:\"'slurm' package(s) on openSUSE Leap 15.1.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap15.1\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"libpmi0\", rpm:\"libpmi0~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libpmi0-debuginfo\", rpm:\"libpmi0-debuginfo~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libslurm33\", rpm:\"libslurm33~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libslurm33-debuginfo\", rpm:\"libslurm33-debuginfo~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perl-slurm\", rpm:\"perl-slurm~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perl-slurm-debuginfo\", rpm:\"perl-slurm-debuginfo~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm\", rpm:\"slurm~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-auth-none\", rpm:\"slurm-auth-none~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-auth-none-debuginfo\", rpm:\"slurm-auth-none-debuginfo~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-config\", rpm:\"slurm-config~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-config-man\", rpm:\"slurm-config-man~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-cray\", rpm:\"slurm-cray~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-cray-debuginfo\", rpm:\"slurm-cray-debuginfo~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-debuginfo\", rpm:\"slurm-debuginfo~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-debugsource\", rpm:\"slurm-debugsource~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-devel\", rpm:\"slurm-devel~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-doc\", rpm:\"slurm-doc~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-hdf5\", rpm:\"slurm-hdf5~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-hdf5-debuginfo\", rpm:\"slurm-hdf5-debuginfo~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-lua\", rpm:\"slurm-lua~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-lua-debuginfo\", rpm:\"slurm-lua-debuginfo~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-munge\", rpm:\"slurm-munge~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-munge-debuginfo\", rpm:\"slurm-munge-debuginfo~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-node\", rpm:\"slurm-node~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-node-debuginfo\", rpm:\"slurm-node-debuginfo~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-openlava\", rpm:\"slurm-openlava~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-pam_slurm\", rpm:\"slurm-pam_slurm~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-pam_slurm-debuginfo\", rpm:\"slurm-pam_slurm-debuginfo~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-plugins\", rpm:\"slurm-plugins~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-plugins-debuginfo\", rpm:\"slurm-plugins-debuginfo~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-seff\", rpm:\"slurm-seff~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-sjstat\", rpm:\"slurm-sjstat~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-slurmdbd\", rpm:\"slurm-slurmdbd~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-slurmdbd-debuginfo\", rpm:\"slurm-slurmdbd-debuginfo~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-sql\", rpm:\"slurm-sql~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-sql-debuginfo\", rpm:\"slurm-sql-debuginfo~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-sview\", rpm:\"slurm-sview~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-sview-debuginfo\", rpm:\"slurm-sview-debuginfo~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-torque\", rpm:\"slurm-torque~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-torque-debuginfo\", rpm:\"slurm-torque-debuginfo~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-webdoc\", rpm:\"slurm-webdoc~18.08.9~lp151.2.6.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-28T14:41:09", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-01-12T00:00:00", "type": "openvas", "title": "Fedora Update for slurm FEDORA-2019-f5fe4e10d7", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19728", "CVE-2019-19727"], "modified": "2020-01-28T00:00:00", "id": "OPENVAS:1361412562310877347", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310877347", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.877347\");\n script_version(\"2020-01-28T08:10:01+0000\");\n script_cve_id(\"CVE-2019-19727\", \"CVE-2019-19728\");\n script_tag(name:\"cvss_base\", value:\"6.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:S/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-28 08:10:01 +0000 (Tue, 28 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-12 04:01:37 +0000 (Sun, 12 Jan 2020)\");\n script_name(\"Fedora Update for slurm FEDORA-2019-f5fe4e10d7\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC31\");\n\n script_xref(name:\"FEDORA\", value:\"2019-f5fe4e10d7\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YAPFSND34HTVAED65GYK43VY56MSBKDI\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'slurm'\n package(s) announced via the FEDORA-2019-f5fe4e10d7 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Slurm is an open source, fault-tolerant, and highly scalable\ncluster management and job scheduling system for Linux clusters.\nComponents include machine status, partition management,\njob management, scheduling and accounting modules.\");\n\n script_tag(name:\"affected\", value:\"'slurm' package(s) on Fedora 31.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC31\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm\", rpm:\"slurm~19.05.5~1.fc31\", rls:\"FC31\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 6.0, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2019-11-21T13:42:59", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2019-11-20T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 4572-1 (slurm-llnl - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-12838"], "modified": "2019-11-21T00:00:00", "id": "OPENVAS:1361412562310704572", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310704572", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.704572\");\n script_version(\"2019-11-21T07:51:10+0000\");\n script_cve_id(\"CVE-2019-12838\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-11-21 07:51:10 +0000 (Thu, 21 Nov 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-11-20 03:00:11 +0000 (Wed, 20 Nov 2019)\");\n script_name(\"Debian Security Advisory DSA 4572-1 (slurm-llnl - security update)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB10\");\n\n script_xref(name:\"URL\", value:\"https://www.debian.org/security/2019/dsa-4572.html\");\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/DSA-4572-1\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'slurm-llnl'\n package(s) announced via the DSA-4572-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that the Simple Linux Utility for Resource Management\n(SLURM), a cluster resource management and job scheduling system, did\nnot escape strings when importing an archive file into the\naccounting_storage/mysql backend, resulting in SQL injection.\");\n\n script_tag(name:\"affected\", value:\"'slurm-llnl' package(s) on Debian Linux.\");\n\n script_tag(name:\"solution\", value:\"For the stable distribution (buster), this problem has been fixed in\nversion 18.08.5.2-1+deb10u1.\n\nWe recommend that you upgrade your slurm-llnl packages.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"libpam-slurm\", ver:\"18.08.5.2-1+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libpmi0\", ver:\"18.08.5.2-1+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libpmi0-dev\", ver:\"18.08.5.2-1+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libpmi2-0\", ver:\"18.08.5.2-1+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libpmi2-0-dev\", ver:\"18.08.5.2-1+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libslurm-dev\", ver:\"18.08.5.2-1+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libslurm-perl\", ver:\"18.08.5.2-1+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libslurm33\", ver:\"18.08.5.2-1+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libslurmdb-dev\", ver:\"18.08.5.2-1+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libslurmdb-perl\", ver:\"18.08.5.2-1+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libslurmdb33\", ver:\"18.08.5.2-1+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"slurm-client\", ver:\"18.08.5.2-1+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"slurm-client-emulator\", ver:\"18.08.5.2-1+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"slurm-wlm\", ver:\"18.08.5.2-1+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"slurm-wlm-basic-plugins\", ver:\"18.08.5.2-1+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"slurm-wlm-basic-plugins-dev\", ver:\"18.08.5.2-1+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"slurm-wlm-doc\", ver:\"18.08.5.2-1+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"slurm-wlm-emulator\", ver:\"18.08.5.2-1+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"slurm-wlm-torque\", ver:\"18.08.5.2-1+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"slurmctld\", ver:\"18.08.5.2-1+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"slurmd\", ver:\"18.08.5.2-1+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"slurmdbd\", ver:\"18.08.5.2-1+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"sview\", ver:\"18.08.5.2-1+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n\nexit(0);", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-26T11:48:29", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2019-07-24T00:00:00", "type": "openvas", "title": "Fedora Update for slurm FEDORA-2019-5d0d2619df", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-12838"], "modified": "2019-07-25T00:00:00", "id": "OPENVAS:1361412562310876600", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310876600", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.876600\");\n script_version(\"2019-07-25T11:54:35+0000\");\n script_cve_id(\"CVE-2019-12838\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-25 11:54:35 +0000 (Thu, 25 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-07-24 02:19:19 +0000 (Wed, 24 Jul 2019)\");\n script_name(\"Fedora Update for slurm FEDORA-2019-5d0d2619df\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC30\");\n\n script_xref(name:\"FEDORA\", value:\"2019-5d0d2619df\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQ6EV3OWKGMTBWCSXZGS4MYADUBLVXSQ\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'slurm'\n package(s) announced via the FEDORA-2019-5d0d2619df advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Slurm is an open source, fault-tolerant, and highly scalable\ncluster management and job scheduling system for Linux clusters.\nComponents include machine status, partition management,\njob management, scheduling and accounting modules.\");\n\n script_tag(name:\"affected\", value:\"'slurm' package(s) on Fedora 30.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC30\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm\", rpm:\"slurm~18.08.8~1.fc30\", rls:\"FC30\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-31T16:29:26", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-01-09T00:00:00", "type": "openvas", "title": "openSUSE: Security Advisory for slurm (openSUSE-SU-2019:2052-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-12838"], "modified": "2020-01-31T00:00:00", "id": "OPENVAS:1361412562310852884", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310852884", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.852884\");\n script_version(\"2020-01-31T08:04:39+0000\");\n script_cve_id(\"CVE-2019-12838\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:04:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-09 09:41:20 +0000 (Thu, 09 Jan 2020)\");\n script_name(\"openSUSE: Security Advisory for slurm (openSUSE-SU-2019:2052-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap15\\.1\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2019:2052-1\");\n script_xref(name:\"URL\", value:\"https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00005.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'slurm'\n package(s) announced via the openSUSE-SU-2019:2052-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"This update for slurm to version 18.08.8 fixes the following issues:\n\n Security issue fixed:\n\n - CVE-2019-12838: Fixed a SQL injection in slurmdbd (bsc#1140709).\n\n This update was imported from the SUSE:SLE-15-SP1:Update update project.\n\n Patch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended\n installation methods\n like YaST online_update or 'zypper patch'.\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.1:\n\n zypper in -t patch openSUSE-2019-2052=1\");\n\n script_tag(name:\"affected\", value:\"'slurm' package(s) on openSUSE Leap 15.1.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap15.1\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"libpmi0\", rpm:\"libpmi0~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libpmi0-debuginfo\", rpm:\"libpmi0-debuginfo~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libslurm33\", rpm:\"libslurm33~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libslurm33-debuginfo\", rpm:\"libslurm33-debuginfo~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perl-slurm\", rpm:\"perl-slurm~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perl-slurm-debuginfo\", rpm:\"perl-slurm-debuginfo~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm\", rpm:\"slurm~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-auth-none\", rpm:\"slurm-auth-none~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-auth-none-debuginfo\", rpm:\"slurm-auth-none-debuginfo~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-config\", rpm:\"slurm-config~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-config-man\", rpm:\"slurm-config-man~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-cray\", rpm:\"slurm-cray~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-cray-debuginfo\", rpm:\"slurm-cray-debuginfo~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-debuginfo\", rpm:\"slurm-debuginfo~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-debugsource\", rpm:\"slurm-debugsource~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-devel\", rpm:\"slurm-devel~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-doc\", rpm:\"slurm-doc~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-hdf5\", rpm:\"slurm-hdf5~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-hdf5-debuginfo\", rpm:\"slurm-hdf5-debuginfo~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-lua\", rpm:\"slurm-lua~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-lua-debuginfo\", rpm:\"slurm-lua-debuginfo~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-munge\", rpm:\"slurm-munge~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-munge-debuginfo\", rpm:\"slurm-munge-debuginfo~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-node\", rpm:\"slurm-node~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-node-debuginfo\", rpm:\"slurm-node-debuginfo~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-openlava\", rpm:\"slurm-openlava~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-pam_slurm\", rpm:\"slurm-pam_slurm~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-pam_slurm-debuginfo\", rpm:\"slurm-pam_slurm-debuginfo~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-plugins\", rpm:\"slurm-plugins~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-plugins-debuginfo\", rpm:\"slurm-plugins-debuginfo~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-seff\", rpm:\"slurm-seff~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-sjstat\", rpm:\"slurm-sjstat~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-slurmdbd\", rpm:\"slurm-slurmdbd~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-slurmdbd-debuginfo\", rpm:\"slurm-slurmdbd-debuginfo~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-sql\", rpm:\"slurm-sql~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-sql-debuginfo\", rpm:\"slurm-sql-debuginfo~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-sview\", rpm:\"slurm-sview~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-sview-debuginfo\", rpm:\"slurm-sview-debuginfo~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-torque\", rpm:\"slurm-torque~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-torque-debuginfo\", rpm:\"slurm-torque-debuginfo~18.08.8~lp151.2.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-31T16:53:48", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2019-11-21T00:00:00", "type": "openvas", "title": "openSUSE: Security Advisory for slurm (openSUSE-SU-2019:2536-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-12838"], "modified": "2020-01-31T00:00:00", "id": "OPENVAS:1361412562310852780", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310852780", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.852780\");\n script_version(\"2020-01-31T08:04:39+0000\");\n script_cve_id(\"CVE-2019-12838\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:04:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-11-21 03:00:47 +0000 (Thu, 21 Nov 2019)\");\n script_name(\"openSUSE: Security Advisory for slurm (openSUSE-SU-2019:2536-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap15\\.0\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2019:2536-1\");\n script_xref(name:\"URL\", value:\"https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00051.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'slurm'\n package(s) announced via the openSUSE-SU-2019:2536-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"This update for slurm fixes the following issues:\n\n Security issue fixed:\n\n - CVE-2019-12838: Fixed an SQL injection (bsc#1140709).\n\n Non-security issue fixed:\n\n - Added X11-forwarding (bsc#1153245).\n\n - Moved srun from 'slurm' to 'slurm-node': srun is required on the nodes\n as well so sbatch will work. 'slurm-node' is a requirement when 'slurm'\n is installed (bsc#1153095).\n\n This update was imported from the SUSE:SLE-15:Update update project.\n\n Patch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended\n installation methods\n like YaST online_update or 'zypper patch'.\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.0:\n\n zypper in -t patch openSUSE-2019-2536=1\");\n\n script_tag(name:\"affected\", value:\"'slurm' package(s) on openSUSE Leap 15.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap15.0\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"libpmi0\", rpm:\"libpmi0~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libpmi0-debuginfo\", rpm:\"libpmi0-debuginfo~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libslurm32\", rpm:\"libslurm32~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libslurm32-debuginfo\", rpm:\"libslurm32-debuginfo~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perl-slurm\", rpm:\"perl-slurm~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perl-slurm-debuginfo\", rpm:\"perl-slurm-debuginfo~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm\", rpm:\"slurm~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-auth-none\", rpm:\"slurm-auth-none~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-auth-none-debuginfo\", rpm:\"slurm-auth-none-debuginfo~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-config\", rpm:\"slurm-config~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-debuginfo\", rpm:\"slurm-debuginfo~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-debugsource\", rpm:\"slurm-debugsource~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-devel\", rpm:\"slurm-devel~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-doc\", rpm:\"slurm-doc~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-lua\", rpm:\"slurm-lua~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-lua-debuginfo\", rpm:\"slurm-lua-debuginfo~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-munge\", rpm:\"slurm-munge~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-munge-debuginfo\", rpm:\"slurm-munge-debuginfo~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-node\", rpm:\"slurm-node~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-node-debuginfo\", rpm:\"slurm-node-debuginfo~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-openlava\", rpm:\"slurm-openlava~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-pam_slurm\", rpm:\"slurm-pam_slurm~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-pam_slurm-debuginfo\", rpm:\"slurm-pam_slurm-debuginfo~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-plugins\", rpm:\"slurm-plugins~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-plugins-debuginfo\", rpm:\"slurm-plugins-debuginfo~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-seff\", rpm:\"slurm-seff~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-sjstat\", rpm:\"slurm-sjstat~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-slurmdbd\", rpm:\"slurm-slurmdbd~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-slurmdbd-debuginfo\", rpm:\"slurm-slurmdbd-debuginfo~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-sql\", rpm:\"slurm-sql~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-sql-debuginfo\", rpm:\"slurm-sql-debuginfo~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-sview\", rpm:\"slurm-sview~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-sview-debuginfo\", rpm:\"slurm-sview-debuginfo~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-torque\", rpm:\"slurm-torque~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm-torque-debuginfo\", rpm:\"slurm-torque-debuginfo~17.11.13~lp150.5.24.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-26T11:48:03", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2019-07-24T00:00:00", "type": "openvas", "title": "Fedora Update for slurm FEDORA-2019-4ca3a39825", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-12838", "CVE-2019-6438"], "modified": "2019-07-25T00:00:00", "id": "OPENVAS:1361412562310876601", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310876601", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.876601\");\n script_version(\"2019-07-25T11:54:35+0000\");\n script_cve_id(\"CVE-2019-12838\", \"CVE-2019-6438\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-25 11:54:35 +0000 (Thu, 25 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-07-24 02:19:20 +0000 (Wed, 24 Jul 2019)\");\n script_name(\"Fedora Update for slurm FEDORA-2019-4ca3a39825\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC29\");\n\n script_xref(name:\"FEDORA\", value:\"2019-4ca3a39825\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2O47F72FWMYLEGF35QGNYY5VS33SUQS5\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'slurm'\n package(s) announced via the FEDORA-2019-4ca3a39825 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Slurm is an open source, fault-tolerant, and highly scalable\ncluster management and job scheduling system for Linux clusters.\nComponents include machine status, partition management,\njob management, scheduling and accounting modules.\");\n\n script_tag(name:\"affected\", value:\"'slurm' package(s) on Fedora 29.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC29\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"slurm\", rpm:\"slurm~18.08.8~1.fc29\", rls:\"FC29\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-03-20T19:01:17", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-03-18T00:00:00", "type": "openvas", "title": "Debian LTS: Security Advisory for slurm-llnl (DLA-2143-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-12838", "CVE-2019-6438"], "modified": "2020-03-18T00:00:00", "id": "OPENVAS:1361412562310892143", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310892143", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.892143\");\n script_version(\"2020-03-18T10:44:54+0000\");\n script_cve_id(\"CVE-2019-12838\", \"CVE-2019-6438\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-03-18 10:44:54 +0000 (Wed, 18 Mar 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-03-18 10:44:54 +0000 (Wed, 18 Mar 2020)\");\n script_name(\"Debian LTS: Security Advisory for slurm-llnl (DLA-2143-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB8\");\n\n script_xref(name:\"URL\", value:\"https://lists.debian.org/debian-lts-announce/2020/03/msg00016.html\");\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/DLA-2143-1\");\n script_xref(name:\"URL\", value:\"https://bugs.debian.org/920997\");\n script_xref(name:\"URL\", value:\"https://bugs.debian.org/931880\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'slurm-llnl'\n package(s) announced via the DLA-2143-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Several issue were found in Simple Linux Utility for Resource\nManagement (SLURM), a cluster resource management and job scheduling\nsystem.\n\nCVE-2019-6438\n\nSchedMD Slurm mishandles 32-bit systems, causing a heap overflow\nin xmalloc.\n\nCVE-2019-12838\n\nSchedMD Slurm did not escape strings when importing an archive\nfile into the accounting_storage/mysql backend, resulting in SQL\ninjection.\");\n\n script_tag(name:\"affected\", value:\"'slurm-llnl' package(s) on Debian Linux.\");\n\n script_tag(name:\"solution\", value:\"For Debian 8 'Jessie', these problems have been fixed in version\n14.03.9-5+deb8u5.\n\nWe recommend that you upgrade your slurm-llnl packages.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"libpam-slurm\", ver:\"14.03.9-5+deb8u5\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libpmi0\", ver:\"14.03.9-5+deb8u5\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libpmi0-dev\", ver:\"14.03.9-5+deb8u5\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libslurm-dev\", ver:\"14.03.9-5+deb8u5\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libslurm-perl\", ver:\"14.03.9-5+deb8u5\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libslurm27\", ver:\"14.03.9-5+deb8u5\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libslurmdb-dev\", ver:\"14.03.9-5+deb8u5\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libslurmdb-perl\", ver:\"14.03.9-5+deb8u5\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libslurmdb27\", ver:\"14.03.9-5+deb8u5\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"slurm-client\", ver:\"14.03.9-5+deb8u5\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"slurm-llnl\", ver:\"14.03.9-5+deb8u5\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"slurm-llnl-slurmdbd\", ver:\"14.03.9-5+deb8u5\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"slurm-wlm\", ver:\"14.03.9-5+deb8u5\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"slurm-wlm-basic-plugins\", ver:\"14.03.9-5+deb8u5\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"slurm-wlm-basic-plugins-dev\", ver:\"14.03.9-5+deb8u5\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"slurm-wlm-doc\", ver:\"14.03.9-5+deb8u5\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"slurm-wlm-torque\", ver:\"14.03.9-5+deb8u5\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"slurmctld\", ver:\"14.03.9-5+deb8u5\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"slurmd\", ver:\"14.03.9-5+deb8u5\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"slurmdbd\", ver:\"14.03.9-5+deb8u5\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"sview\", ver:\"14.03.9-5+deb8u5\", rls:\"DEB8\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n\nexit(0);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "suse": [{"lastseen": "2022-04-18T12:41:31", "description": "An update that solves three vulnerabilities and has three\n fixes is now available.\n\nDescription:\n\n This update for slurm to version 18.08.9 fixes the following issues:\n\n Security issues fixed:\n\n - CVE-2019-19728: Fixed a privilege escalation with srun, where --uid\n might have unintended side effects (bsc#1159692).\n - CVE-2019-12838: Fixed SchedMD Slurm SQL Injection issue (bnc#1140709).\n - CVE-2019-19727: Fixed permissions of slurmdbd.conf (bsc#1155784).\n\n Bug fixes:\n\n - Fix ownership of /var/spool/slurm on new installations and upgrade\n (bsc#1158696).\n - Fix %posttrans macro _res_update to cope with added newline\n (bsc#1153259).\n - Move srun from 'slurm' to 'slurm-node': srun is required on the nodes as\n well so sbatch will work. 'slurm-node' is a requirement when 'slurm' is\n installed (bsc#1153095).\n\n This update was imported from the SUSE:SLE-15-SP1:Update update project.\n\n\nPatch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended installation methods\n like YaST online_update or \"zypper patch\".\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.1:\n\n zypper in -t patch openSUSE-2020-85=1", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-01-21T00:00:00", "type": "suse", "title": "Security update for slurm (important)", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-12838", "CVE-2019-19727", "CVE-2019-19728"], "modified": "2020-01-21T00:00:00", "id": "OPENSUSE-SU-2020:0085-1", "href": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JWDCJIOVPR5P4ISSFNSYPNTNT3TDAMI4/", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-04-21T22:49:00", "description": "An update that fixes one vulnerability is now available.\n\nDescription:\n\n This update for slurm to version 18.08.8 fixes the following issues:\n\n Security issue fixed:\n\n - CVE-2019-12838: Fixed a SQL injection in slurmdbd (bsc#1140709).\n\n This update was imported from the SUSE:SLE-15-SP1:Update update project.\n\n\nPatch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended installation methods\n like YaST online_update or \"zypper patch\".\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.1:\n\n zypper in -t patch openSUSE-2019-2052=1", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-09-02T00:00:00", "type": "suse", "title": "Security update for slurm (important)", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-12838"], "modified": "2019-09-02T00:00:00", "id": "OPENSUSE-SU-2019:2052-1", "href": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y7MVDOTIK6WRM3KHON336HMYNNS6FNCE/", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-06-13T20:01:06", "description": "An update that solves one vulnerability and has two fixes\n is now available.\n\nDescription:\n\n This update for slurm fixes the following issues:\n\n Security issue fixed:\n\n - CVE-2019-12838: Fixed an SQL injection (bsc#1140709).\n\n Non-security issue fixed:\n\n - Added X11-forwarding (bsc#1153245).\n - Moved srun from 'slurm' to 'slurm-node': srun is required on the nodes\n as well so sbatch will work. 'slurm-node' is a requirement when 'slurm'\n is installed (bsc#1153095).\n\n This update was imported from the SUSE:SLE-15:Update update project.\n\n\nPatch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended installation methods\n like YaST online_update or \"zypper patch\".\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.0:\n\n zypper in -t patch openSUSE-2019-2536=1", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-11-20T00:00:00", "type": "suse", "title": "Security update for slurm (moderate)", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-12838"], "modified": "2019-11-20T00:00:00", "id": "OPENSUSE-SU-2019:2536-1", "href": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HUYNUS4IPN3MB2JAXAJP54H5VQCALV3G/", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2022-06-16T15:25:07", "description": "This update for slurm to version 18.08.9 fixes the following issues :\n\nSecurity issues fixed :\n\n - CVE-2019-19728: Fixed a privilege escalation with srun, where --uid might have unintended side effects (bsc#1159692).\n\n - CVE-2019-12838: Fixed SchedMD Slurm SQL Injection issue (bnc#1140709).\n\n - CVE-2019-19727: Fixed permissions of slurmdbd.conf (bsc#1155784). Bug fixes :\n\n - Fix ownership of /var/spool/slurm on new installations and upgrade (bsc#1158696).\n\n - Fix %posttrans macro _res_update to cope with added newline (bsc#1153259).\n\n - Move srun from 'slurm' to 'slurm-node': srun is required on the nodes as well so sbatch will work. 'slurm-node' is a requirement when 'slurm' is installed (bsc#1153095).\n\nThis update was imported from the SUSE:SLE-15-SP1:Update update project.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-01-22T00:00:00", "type": "nessus", "title": "openSUSE Security Update : slurm (openSUSE-2020-85)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-12838", "CVE-2019-19727", "CVE-2019-19728"], "modified": "2020-01-24T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:libpmi0", "p-cpe:/a:novell:opensuse:libpmi0-debuginfo", "p-cpe:/a:novell:opensuse:libslurm33", "p-cpe:/a:novell:opensuse:libslurm33-debuginfo", "p-cpe:/a:novell:opensuse:perl-slurm", "p-cpe:/a:novell:opensuse:perl-slurm-debuginfo", "p-cpe:/a:novell:opensuse:slurm", "p-cpe:/a:novell:opensuse:slurm-auth-none", "p-cpe:/a:novell:opensuse:slurm-auth-none-debuginfo", "p-cpe:/a:novell:opensuse:slurm-config", "p-cpe:/a:novell:opensuse:slurm-config-man", "p-cpe:/a:novell:opensuse:slurm-cray", "p-cpe:/a:novell:opensuse:slurm-cray-debuginfo", "p-cpe:/a:novell:opensuse:slurm-debuginfo", "p-cpe:/a:novell:opensuse:slurm-debugsource", "p-cpe:/a:novell:opensuse:slurm-devel", "p-cpe:/a:novell:opensuse:slurm-hdf5", "p-cpe:/a:novell:opensuse:slurm-hdf5-debuginfo", "p-cpe:/a:novell:opensuse:slurm-lua", "p-cpe:/a:novell:opensuse:slurm-lua-debuginfo", "p-cpe:/a:novell:opensuse:slurm-munge", "p-cpe:/a:novell:opensuse:slurm-munge-debuginfo", "p-cpe:/a:novell:opensuse:slurm-node", "p-cpe:/a:novell:opensuse:slurm-node-debuginfo", "p-cpe:/a:novell:opensuse:slurm-openlava", "p-cpe:/a:novell:opensuse:slurm-pam_slurm", "p-cpe:/a:novell:opensuse:slurm-pam_slurm-debuginfo", "p-cpe:/a:novell:opensuse:slurm-plugins", "p-cpe:/a:novell:opensuse:slurm-plugins-debuginfo", "p-cpe:/a:novell:opensuse:slurm-seff", "p-cpe:/a:novell:opensuse:slurm-sjstat", "p-cpe:/a:novell:opensuse:slurm-slurmdbd", "p-cpe:/a:novell:opensuse:slurm-slurmdbd-debuginfo", "p-cpe:/a:novell:opensuse:slurm-sql", "p-cpe:/a:novell:opensuse:slurm-sql-debuginfo", "p-cpe:/a:novell:opensuse:slurm-sview", "p-cpe:/a:novell:opensuse:slurm-sview-debuginfo", "p-cpe:/a:novell:opensuse:slurm-torque", "p-cpe:/a:novell:opensuse:slurm-torque-debuginfo", "p-cpe:/a:novell:opensuse:slurm-webdoc", "cpe:/o:novell:opensuse:15.1"], "id": "OPENSUSE-2020-85.NASL", "href": "https://www.tenable.com/plugins/nessus/133171", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2020-85.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(133171);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2020/01/24\");\n\n script_cve_id(\"CVE-2019-12838\", \"CVE-2019-19727\", \"CVE-2019-19728\");\n\n script_name(english:\"openSUSE Security Update : slurm (openSUSE-2020-85)\");\n script_summary(english:\"Check for the openSUSE-2020-85 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for slurm to version 18.08.9 fixes the following issues :\n\nSecurity issues fixed :\n\n - CVE-2019-19728: Fixed a privilege escalation with srun,\n where --uid might have unintended side effects\n (bsc#1159692).\n\n - CVE-2019-12838: Fixed SchedMD Slurm SQL Injection issue\n (bnc#1140709).\n\n - CVE-2019-19727: Fixed permissions of slurmdbd.conf\n (bsc#1155784). Bug fixes :\n\n - Fix ownership of /var/spool/slurm on new installations\n and upgrade (bsc#1158696).\n\n - Fix %posttrans macro _res_update to cope with added\n newline (bsc#1153259).\n\n - Move srun from 'slurm' to 'slurm-node': srun is required\n on the nodes as well so sbatch will work. 'slurm-node'\n is a requirement when 'slurm' is installed\n (bsc#1153095).\n\nThis update was imported from the SUSE:SLE-15-SP1:Update update\nproject.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140709\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1153095\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1153259\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1155784\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1158696\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1159692\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected slurm packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libpmi0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libpmi0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libslurm33\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libslurm33-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-auth-none\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-auth-none-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-config\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-config-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-cray\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-cray-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-hdf5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-hdf5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-lua\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-lua-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-munge\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-munge-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-node\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-node-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-openlava\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-pam_slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-pam_slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-plugins-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-seff\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-sjstat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-slurmdbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-slurmdbd-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-sql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-sql-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-sview\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-sview-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-torque\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-torque-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-webdoc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/07/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/01/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/01/22\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libpmi0-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libpmi0-debuginfo-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libslurm33-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libslurm33-debuginfo-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"perl-slurm-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"perl-slurm-debuginfo-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-auth-none-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-auth-none-debuginfo-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-config-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-config-man-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-cray-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-cray-debuginfo-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-debuginfo-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-debugsource-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-devel-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-hdf5-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-hdf5-debuginfo-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-lua-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-lua-debuginfo-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-munge-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-munge-debuginfo-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-node-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-node-debuginfo-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-openlava-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-pam_slurm-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-pam_slurm-debuginfo-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-plugins-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-plugins-debuginfo-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-seff-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-sjstat-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-slurmdbd-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-slurmdbd-debuginfo-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-sql-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-sql-debuginfo-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-sview-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-sview-debuginfo-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-torque-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-torque-debuginfo-18.08.9-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-webdoc-18.08.9-lp151.2.6.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libpmi0 / libpmi0-debuginfo / libslurm33 / libslurm33-debuginfo / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-06-16T15:24:29", "description": "This update for slurm to version 18.08.9 fixes the following issues :\n\nSecurity issues fixed :\n\nCVE-2019-19728: Fixed a privilege escalation with srun, where --uid might have unintended side effects (bsc#1159692).\n\nCVE-2019-12838: Fixed SchedMD Slurm SQL Injection issue (bnc#1140709).\n\nCVE-2019-19727: Fixed permissions of slurmdbd.conf (bsc#1155784).\n\nBug fixes :\n\nFix ownership of /var/spool/slurm on new installations and upgrade (bsc#1158696).\n\nFix %posttrans macro _res_update to cope with added newline (bsc#1153259).\n\nMove srun from 'slurm' to 'slurm-node': srun is required on the nodes as well so sbatch will work. 'slurm-node' is a requirement when 'slurm' is installed (bsc#1153095).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-01-17T00:00:00", "type": "nessus", "title": "SUSE SLED15 / SLES15 Security Update : slurm (SUSE-SU-2020:0110-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-12838", "CVE-2019-19727", "CVE-2019-19728"], "modified": "2021-01-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:libpmi0", "p-cpe:/a:novell:suse_linux:libpmi0-debuginfo", "p-cpe:/a:novell:suse_linux:libslurm33", "p-cpe:/a:novell:suse_linux:libslurm33-debuginfo", "p-cpe:/a:novell:suse_linux:perl-slurm", "p-cpe:/a:novell:suse_linux:perl-slurm-debuginfo", "p-cpe:/a:novell:suse_linux:slurm", "p-cpe:/a:novell:suse_linux:slurm-auth-none", "p-cpe:/a:novell:suse_linux:slurm-auth-none-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-config", "p-cpe:/a:novell:suse_linux:slurm-config-man", "p-cpe:/a:novell:suse_linux:slurm-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-debugsource", "p-cpe:/a:novell:suse_linux:slurm-devel", "p-cpe:/a:novell:suse_linux:slurm-doc", "p-cpe:/a:novell:suse_linux:slurm-lua", "p-cpe:/a:novell:suse_linux:slurm-lua-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-munge", "p-cpe:/a:novell:suse_linux:slurm-munge-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-node", "p-cpe:/a:novell:suse_linux:slurm-node-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-openlava", "p-cpe:/a:novell:suse_linux:slurm-pam_slurm", "p-cpe:/a:novell:suse_linux:slurm-pam_slurm-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-plugins", "p-cpe:/a:novell:suse_linux:slurm-plugins-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-seff", "p-cpe:/a:novell:suse_linux:slurm-sjstat", "p-cpe:/a:novell:suse_linux:slurm-slurmdbd", "p-cpe:/a:novell:suse_linux:slurm-slurmdbd-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-sql", "p-cpe:/a:novell:suse_linux:slurm-sql-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-sview", "p-cpe:/a:novell:suse_linux:slurm-sview-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-torque", "p-cpe:/a:novell:suse_linux:slurm-torque-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2020-0110-1.NASL", "href": "https://www.tenable.com/plugins/nessus/133032", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:0110-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(133032);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2019-12838\", \"CVE-2019-19727\", \"CVE-2019-19728\");\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : slurm (SUSE-SU-2020:0110-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update for slurm to version 18.08.9 fixes the following issues :\n\nSecurity issues fixed :\n\nCVE-2019-19728: Fixed a privilege escalation with srun, where --uid\nmight have unintended side effects (bsc#1159692).\n\nCVE-2019-12838: Fixed SchedMD Slurm SQL Injection issue (bnc#1140709).\n\nCVE-2019-19727: Fixed permissions of slurmdbd.conf (bsc#1155784).\n\nBug fixes :\n\nFix ownership of /var/spool/slurm on new installations and upgrade\n(bsc#1158696).\n\nFix %posttrans macro _res_update to cope with added newline\n(bsc#1153259).\n\nMove srun from 'slurm' to 'slurm-node': srun is required on the nodes\nas well so sbatch will work. 'slurm-node' is a requirement when\n'slurm' is installed (bsc#1153095).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140709\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1153095\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1153259\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1155784\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158696\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159692\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-12838/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-19727/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-19728/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20200110-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?35072979\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for Open Buildservice Development Tools\n15-SP1 :\n\nzypper in -t patch\nSUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-110=1\n\nSUSE Linux Enterprise Module for HPC 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Module-HPC-15-SP1-2020-110=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpmi0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpmi0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libslurm33\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libslurm33-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-auth-none\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-auth-none-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-config\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-config-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-lua\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-lua-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-munge\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-munge-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-node\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-node-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-openlava\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-pam_slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-pam_slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-plugins-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-seff\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sjstat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-slurmdbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-slurmdbd-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sql-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sview\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sview-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-torque\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-torque-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/07/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/01/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/01/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP1\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libpmi0-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libpmi0-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libslurm33-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libslurm33-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"perl-slurm-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"perl-slurm-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-auth-none-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-auth-none-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-config-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-config-man-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-devel-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-doc-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-lua-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-lua-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-munge-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-munge-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-node-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-node-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-pam_slurm-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-pam_slurm-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-plugins-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-plugins-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-slurmdbd-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-slurmdbd-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-sql-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-sql-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-torque-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-torque-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"libpmi0-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"libpmi0-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"libslurm33-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"libslurm33-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"perl-slurm-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"perl-slurm-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-auth-none-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-auth-none-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-config-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-config-man-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-devel-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-doc-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-lua-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-lua-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-munge-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-munge-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-node-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-node-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-pam_slurm-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-pam_slurm-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-plugins-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-plugins-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-slurmdbd-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-slurmdbd-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-sql-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-sql-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-torque-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-torque-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"slurm-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"slurm-debugsource-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"slurm-openlava-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"slurm-seff-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"slurm-sjstat-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"slurm-sview-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"slurm-sview-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"libpmi0-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"libpmi0-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"libslurm33-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"libslurm33-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"perl-slurm-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"perl-slurm-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-auth-none-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-auth-none-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-config-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-config-man-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-devel-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-doc-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-lua-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-lua-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-munge-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-munge-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-node-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-node-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-pam_slurm-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-pam_slurm-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-plugins-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-plugins-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-slurmdbd-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-slurmdbd-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-sql-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-sql-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-torque-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-torque-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"slurm-debuginfo-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"slurm-debugsource-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"slurm-openlava-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"slurm-seff-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"slurm-sjstat-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"slurm-sview-18.08.9-3.10.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"slurm-sview-debuginfo-18.08.9-3.10.1\")) flag++;\n\n\nif (flag)\n{\n set_kb_item(name:'www/0/SQLi', value:TRUE);\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"slurm\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-10-16T00:19:19", "description": "Release of 19.05.5. Closes security issues CVE-2019-19727, CVE-2019-19728.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 7.5, "vector": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-01-13T00:00:00", "type": "nessus", "title": "Fedora 30 : slurm (2019-a93d9cbe53)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19727", "CVE-2019-19728"], "modified": "2020-01-27T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:slurm", "cpe:/o:fedoraproject:fedora:30"], "id": "FEDORA_2019-A93D9CBE53.NASL", "href": "https://www.tenable.com/plugins/nessus/132784", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2019-a93d9cbe53.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(132784);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2020/01/27\");\n\n script_cve_id(\"CVE-2019-19727\", \"CVE-2019-19728\");\n script_xref(name:\"FEDORA\", value:\"2019-a93d9cbe53\");\n\n script_name(english:\"Fedora 30 : slurm (2019-a93d9cbe53)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Release of 19.05.5. Closes security issues CVE-2019-19727,\nCVE-2019-19728.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2019-a93d9cbe53\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected slurm package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-19728\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:30\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/01/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/01/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/01/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^30([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 30\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC30\", reference:\"slurm-19.05.5-1.fc30\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"slurm\");\n}\n", "cvss": {"score": 6, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2021-10-16T00:18:30", "description": "Release of 19.05.5. Closes security issues CVE-2019-19727, CVE-2019-19728.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 7.5, "vector": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-01-13T00:00:00", "type": "nessus", "title": "Fedora 31 : slurm (2019-f5fe4e10d7)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19727", "CVE-2019-19728"], "modified": "2020-01-27T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:slurm", "cpe:/o:fedoraproject:fedora:31"], "id": "FEDORA_2019-F5FE4E10D7.NASL", "href": "https://www.tenable.com/plugins/nessus/132786", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2019-f5fe4e10d7.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(132786);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2020/01/27\");\n\n script_cve_id(\"CVE-2019-19727\", \"CVE-2019-19728\");\n script_xref(name:\"FEDORA\", value:\"2019-f5fe4e10d7\");\n\n script_name(english:\"Fedora 31 : slurm (2019-f5fe4e10d7)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Release of 19.05.5. Closes security issues CVE-2019-19727,\nCVE-2019-19728.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2019-f5fe4e10d7\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected slurm package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-19728\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:31\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/01/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/01/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/01/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^31([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 31\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC31\", reference:\"slurm-19.05.5-1.fc31\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"slurm\");\n}\n", "cvss": {"score": 6, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2022-06-16T15:26:28", "description": "This update for pdsh, slurm_18_08 fixes the following issues :\n\nSlurm was included in the 18.08 release, as 'slurm_18_08' package. The version 18.08.9 contains all recent security fixes, including :\n\nCVE-2019-19728: Fixed a privilege escalation with srun, where --uid might have unintended side effects (bsc#1159692).\n\nCVE-2019-19727: Fixed permissions of slurmdbd.conf (bsc#1155784).\n\npdsh was updated to: Add support for an alternative SLURM version when building the slurm plugin.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-02-24T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : pdsh, slurm_18_08 (SUSE-SU-2020:0434-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-10030", "CVE-2017-15566", "CVE-2018-10995", "CVE-2018-7033", "CVE-2019-12838", "CVE-2019-19727", "CVE-2019-19728", "CVE-2019-6438"], "modified": "2022-05-18T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:libpmi0_18_08", "p-cpe:/a:novell:suse_linux:libpmi0_18_08-debuginfo", "p-cpe:/a:novell:suse_linux:libslurm33", "p-cpe:/a:novell:suse_linux:libslurm33-debuginfo", "p-cpe:/a:novell:suse_linux:pdsh", "p-cpe:/a:novell:suse_linux:pdsh-debuginfo", "p-cpe:/a:novell:suse_linux:pdsh-debugsource", "p-cpe:/a:novell:suse_linux:pdsh-dshgroup", "p-cpe:/a:novell:suse_linux:pdsh-dshgroup-debuginfo", "p-cpe:/a:novell:suse_linux:pdsh-genders", "p-cpe:/a:novell:suse_linux:pdsh-genders-debuginfo", "p-cpe:/a:novell:suse_linux:pdsh-machines", "p-cpe:/a:novell:suse_linux:pdsh-machines-debuginfo", "p-cpe:/a:novell:suse_linux:pdsh-netgroup", "p-cpe:/a:novell:suse_linux:pdsh-netgroup-debuginfo", "p-cpe:/a:novell:suse_linux:pdsh-slurm", "p-cpe:/a:novell:suse_linux:pdsh-slurm-debuginfo", "p-cpe:/a:novell:suse_linux:pdsh-slurm_18_08", "p-cpe:/a:novell:suse_linux:pdsh-slurm_18_08-debuginfo", "p-cpe:/a:novell:suse_linux:perl-slurm_18_08", "p-cpe:/a:novell:suse_linux:perl-slurm_18_08-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_18_08", "p-cpe:/a:novell:suse_linux:slurm_18_08-auth-none", "p-cpe:/a:novell:suse_linux:slurm_18_08-auth-none-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_18_08-config", "p-cpe:/a:novell:suse_linux:slurm_18_08-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_18_08-debugsource", "p-cpe:/a:novell:suse_linux:slurm_18_08-devel", "p-cpe:/a:novell:suse_linux:slurm_18_08-doc", "p-cpe:/a:novell:suse_linux:slurm_18_08-lua", "p-cpe:/a:novell:suse_linux:slurm_18_08-lua-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_18_08-munge", "p-cpe:/a:novell:suse_linux:slurm_18_08-munge-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_18_08-node", "p-cpe:/a:novell:suse_linux:slurm_18_08-node-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_18_08-pam_slurm", "p-cpe:/a:novell:suse_linux:slurm_18_08-pam_slurm-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_18_08-plugins", "p-cpe:/a:novell:suse_linux:slurm_18_08-plugins-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_18_08-slurmdbd", "p-cpe:/a:novell:suse_linux:slurm_18_08-slurmdbd-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_18_08-sql", "p-cpe:/a:novell:suse_linux:slurm_18_08-sql-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_18_08-torque", "p-cpe:/a:novell:suse_linux:slurm_18_08-torque-debuginfo", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2020-0434-1.NASL", "href": "https://www.tenable.com/plugins/nessus/133949", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:0434-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(133949);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/18\");\n\n script_cve_id(\n \"CVE-2016-10030\",\n \"CVE-2017-15566\",\n \"CVE-2018-7033\",\n \"CVE-2018-10995\",\n \"CVE-2019-6438\",\n \"CVE-2019-12838\",\n \"CVE-2019-19727\",\n \"CVE-2019-19728\"\n );\n\n script_name(english:\"SUSE SLES12 Security Update : pdsh, slurm_18_08 (SUSE-SU-2020:0434-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"This update for pdsh, slurm_18_08 fixes the following issues :\n\nSlurm was included in the 18.08 release, as 'slurm_18_08' package. The\nversion 18.08.9 contains all recent security fixes, including :\n\nCVE-2019-19728: Fixed a privilege escalation with srun, where --uid\nmight have unintended side effects (bsc#1159692).\n\nCVE-2019-19727: Fixed permissions of slurmdbd.conf (bsc#1155784).\n\npdsh was updated to: Add support for an alternative SLURM version when\nbuilding the slurm plugin.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1018371\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065697\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085240\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1095508\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1123304\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140709\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1155784\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158709\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158798\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159692\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2016-10030/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2017-15566/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-10995/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-7033/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12838/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-19727/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-19728/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-6438/\");\n # https://www.suse.com/support/update/announcement/2020/suse-su-20200434-1/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?202a566d\");\n script_set_attribute(attribute:\"solution\", value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for HPC 12:zypper in -t patch\nSUSE-SLE-Module-HPC-12-2020-434=1\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2016-10030\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2019-6438\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/01/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/02/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/02/24\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpmi0_18_08\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpmi0_18_08-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libslurm33\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libslurm33-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-dshgroup\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-dshgroup-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-genders\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-genders-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-machines\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-machines-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-netgroup\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-netgroup-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-slurm_18_08\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-slurm_18_08-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-slurm_18_08\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-slurm_18_08-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-auth-none\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-auth-none-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-config\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-lua\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-lua-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-munge\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-munge-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-node\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-node-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-pam_slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-pam_slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-plugins-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-slurmdbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-slurmdbd-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-sql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-sql-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-torque\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-torque-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"x86_64\") audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(0)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP0\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libpmi0_18_08-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libpmi0_18_08-debuginfo-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libslurm33-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libslurm33-debuginfo-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-2.33-7.18.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-debuginfo-2.33-7.18.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-debugsource-2.33-7.18.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-dshgroup-2.33-7.18.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-dshgroup-debuginfo-2.33-7.18.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-genders-2.33-7.18.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-genders-debuginfo-2.33-7.18.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-machines-2.33-7.18.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-machines-debuginfo-2.33-7.18.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-netgroup-2.33-7.18.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-netgroup-debuginfo-2.33-7.18.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-slurm-2.33-7.18.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-slurm-debuginfo-2.33-7.18.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-slurm_18_08-2.33-7.18.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-slurm_18_08-debuginfo-2.33-7.18.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"perl-slurm_18_08-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"perl-slurm_18_08-debuginfo-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-auth-none-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-auth-none-debuginfo-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-config-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-debuginfo-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-debugsource-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-devel-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-doc-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-lua-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-lua-debuginfo-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-munge-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-munge-debuginfo-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-node-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-node-debuginfo-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-pam_slurm-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-pam_slurm-debuginfo-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-plugins-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-plugins-debuginfo-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-slurmdbd-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-slurmdbd-debuginfo-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-sql-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-sql-debuginfo-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-torque-18.08.9-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-torque-debuginfo-18.08.9-3.5.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"pdsh / slurm_18_08\");\n}\n", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-06-16T15:27:09", "description": "This update for pdsh, slurm_18_08 fixes the following issues :\n\nSlurm was included in the 18.08 release, as 'slurm_18_08' package. The version 18.08.9 contains all recent security fixes, including :\n\nCVE-2019-19728: Fixed a privilege escalation with srun, where --uid might have unintended side effects (bsc#1159692).\n\nCVE-2019-19727: Fixed permissions of slurmdbd.conf (bsc#1155784).\n\npdsh was updated to: Add support for an alternative SLURM version when building the slurm plugin.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-02-25T00:00:00", "type": "nessus", "title": "SUSE SLED15 / SLES15 Security Update : pdsh, slurm_18_08 (SUSE-SU-2020:0443-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-10030", "CVE-2017-15566", "CVE-2018-10995", "CVE-2018-7033", "CVE-2019-12838", "CVE-2019-19727", "CVE-2019-19728", "CVE-2019-6438"], "modified": "2022-05-18T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:libpmi0_18_08", "p-cpe:/a:novell:suse_linux:libpmi0_18_08-debuginfo", "p-cpe:/a:novell:suse_linux:libslurm33", "p-cpe:/a:novell:suse_linux:libslurm33-debuginfo", "p-cpe:/a:novell:suse_linux:pdsh", "p-cpe:/a:novell:suse_linux:pdsh-debuginfo", "p-cpe:/a:novell:suse_linux:pdsh-debugsource", "p-cpe:/a:novell:suse_linux:pdsh-dshgroup", "p-cpe:/a:novell:suse_linux:pdsh-dshgroup-debuginfo", "p-cpe:/a:novell:suse_linux:pdsh-genders", "p-cpe:/a:novell:suse_linux:pdsh-genders-debuginfo", "p-cpe:/a:novell:suse_linux:pdsh-machines", "p-cpe:/a:novell:suse_linux:pdsh-machines-debuginfo", "p-cpe:/a:novell:suse_linux:pdsh-netgroup", "p-cpe:/a:novell:suse_linux:pdsh-netgroup-debuginfo", "p-cpe:/a:novell:suse_linux:pdsh-slurm", "p-cpe:/a:novell:suse_linux:pdsh-slurm-debuginfo", "p-cpe:/a:novell:suse_linux:pdsh-slurm_18_08", "p-cpe:/a:novell:suse_linux:pdsh-slurm_18_08-debuginfo", "p-cpe:/a:novell:suse_linux:perl-slurm_18_08", "p-cpe:/a:novell:suse_linux:perl-slurm_18_08-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_18_08", "p-cpe:/a:novell:suse_linux:slurm_18_08-auth-none", "p-cpe:/a:novell:suse_linux:slurm_18_08-auth-none-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_18_08-config", "p-cpe:/a:novell:suse_linux:slurm_18_08-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_18_08-debugsource", "p-cpe:/a:novell:suse_linux:slurm_18_08-devel", "p-cpe:/a:novell:suse_linux:slurm_18_08-doc", "p-cpe:/a:novell:suse_linux:slurm_18_08-lua", "p-cpe:/a:novell:suse_linux:slurm_18_08-lua-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_18_08-munge", "p-cpe:/a:novell:suse_linux:slurm_18_08-munge-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_18_08-node", "p-cpe:/a:novell:suse_linux:slurm_18_08-node-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_18_08-pam_slurm", "p-cpe:/a:novell:suse_linux:slurm_18_08-pam_slurm-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_18_08-plugins", "p-cpe:/a:novell:suse_linux:slurm_18_08-plugins-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_18_08-slurmdbd", "p-cpe:/a:novell:suse_linux:slurm_18_08-slurmdbd-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_18_08-sql", "p-cpe:/a:novell:suse_linux:slurm_18_08-sql-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_18_08-torque", "p-cpe:/a:novell:suse_linux:slurm_18_08-torque-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2020-0443-1.NASL", "href": "https://www.tenable.com/plugins/nessus/134036", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:0443-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(134036);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/18\");\n\n script_cve_id(\n \"CVE-2016-10030\",\n \"CVE-2017-15566\",\n \"CVE-2018-7033\",\n \"CVE-2018-10995\",\n \"CVE-2019-6438\",\n \"CVE-2019-12838\",\n \"CVE-2019-19727\",\n \"CVE-2019-19728\"\n );\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : pdsh, slurm_18_08 (SUSE-SU-2020:0443-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"This update for pdsh, slurm_18_08 fixes the following issues :\n\nSlurm was included in the 18.08 release, as 'slurm_18_08' package. The\nversion 18.08.9 contains all recent security fixes, including :\n\nCVE-2019-19728: Fixed a privilege escalation with srun, where --uid\nmight have unintended side effects (bsc#1159692).\n\nCVE-2019-19727: Fixed permissions of slurmdbd.conf (bsc#1155784).\n\npdsh was updated to: Add support for an alternative SLURM version when\nbuilding the slurm plugin.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1018371\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065697\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085240\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1095508\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1123304\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140709\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1155784\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158709\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158798\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159692\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2016-10030/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2017-15566/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-10995/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-7033/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12838/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-19727/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-19728/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-6438/\");\n # https://www.suse.com/support/update/announcement/2020/suse-su-20200443-1/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?f5e4d795\");\n script_set_attribute(attribute:\"solution\", value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for Open Buildservice Development Tools\n15-SP1:zypper in -t patch\nSUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-443=1\n\nSUSE Linux Enterprise Module for HPC 15-SP1:zypper in -t patch\nSUSE-SLE-Module-HPC-15-SP1-2020-443=1\n\nSUSE Linux Enterprise Module for HPC 15:zypper in -t patch\nSUSE-SLE-Module-HPC-15-2020-443=1\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2016-10030\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2019-6438\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/01/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/02/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/02/25\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpmi0_18_08\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpmi0_18_08-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libslurm33\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libslurm33-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-dshgroup\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-dshgroup-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-genders\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-genders-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-machines\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-machines-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-netgroup\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-netgroup-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-slurm_18_08\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-slurm_18_08-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-slurm_18_08\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-slurm_18_08-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-auth-none\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-auth-none-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-config\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-lua\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-lua-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-munge\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-munge-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-node\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-node-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-pam_slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-pam_slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-plugins-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-slurmdbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-slurmdbd-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-sql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-sql-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-torque\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_18_08-torque-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(0|1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP0/1\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"pdsh-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"pdsh-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"pdsh-debugsource-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"pdsh-dshgroup-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"pdsh-dshgroup-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"pdsh-genders-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"pdsh-genders-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"pdsh-machines-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"pdsh-machines-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"pdsh-netgroup-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"pdsh-netgroup-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"pdsh-slurm-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"pdsh-slurm-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"pdsh-slurm_18_08-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"pdsh-slurm_18_08-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-debugsource-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-dshgroup-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-dshgroup-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-genders-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-genders-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-machines-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-machines-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-netgroup-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-netgroup-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-slurm-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-slurm-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-slurm_18_08-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-slurm_18_08-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libpmi0_18_08-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libpmi0_18_08-debuginfo-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libslurm33-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libslurm33-debuginfo-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-debugsource-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-dshgroup-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-dshgroup-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-genders-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-genders-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-machines-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-machines-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-netgroup-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-netgroup-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-slurm-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-slurm-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-slurm_18_08-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-slurm_18_08-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"perl-slurm_18_08-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"perl-slurm_18_08-debuginfo-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-auth-none-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-auth-none-debuginfo-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-config-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-debuginfo-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-debugsource-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-devel-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-doc-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-lua-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-lua-debuginfo-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-munge-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-munge-debuginfo-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-node-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-node-debuginfo-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-pam_slurm-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-pam_slurm-debuginfo-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-plugins-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-plugins-debuginfo-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-slurmdbd-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-slurmdbd-debuginfo-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-sql-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-sql-debuginfo-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-torque-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_18_08-torque-debuginfo-18.08.9-1.5.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-debugsource-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-dshgroup-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-dshgroup-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-genders-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-genders-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-machines-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-machines-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-netgroup-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-netgroup-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-slurm-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-slurm-debuginfo-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-slurm_18_08-2.33-7.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"pdsh-slurm_18_08-debuginfo-2.33-7.6.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"pdsh / slurm_18_08\");\n}\n", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-05-15T14:34:09", "description": "This update for pdsh, slurm_20_02 fixes the following issues :\n\nChanges in slurm_20_02 :\n\nAdd support for openPMIx also for Leap/SLE 15.0/1 (bsc#1173805).\n\nDo not run %check on SLE-12-SP2: Some incompatibility in tcl makes this fail.\n\nRemove unneeded build dependency to postgresql-devel.\n\nDisable build on s390 (requires 64bit).\n\nBring QA to the package build: add %%check stage.\n\nRemove cruft that isn't needed any longer.\n\nAdd 'ghosted' run-file.\n\nAdd rpmlint filter to handle issues with library packages for Leap and enterprise upgrade versions.\n\nUpdated to 20.02.3 which fixes CVE-2020-12693 (bsc#1172004).\n\nOther changes are :\n\n - Factor in ntasks-per-core=1 with cons_tres.\n\n - Fix formatting in error message in cons_tres.\n\n - Fix calling stat on a NULL variable.\n\n - Fix minor memory leak when using reservations with flags=first_cores.\n\n - Fix gpu bind issue when CPUs=Cores and ThreadsPerCore > 1 on a node.\n\n - Fix --mem-per-gpu for heterogenous --gres requests.\n\n - Fix slurmctld load order in load_all_part_state().\n\n - Fix race condition not finding jobacct gather task cgroup entry.\n\n - Suppress error message when selecting nodes on disjoint topologies.\n\n - Improve performance of _pack_default_job_details() with large number of job\n\n - arguments.\n\n - Fix archive loading previous to 17.11 jobs per-node req_mem.\n\n - Fix regresion validating that --gpus-per-socket requires\n\n --sockets-per-node\n\n - for steps. Should only validate allocation requests.\n\n - error() instead of fatal() when parsing an invalid hostlist.\n\n - nss_slurm - fix potential deadlock in slurmstepd on overloaded systems.\n\n - cons_tres - fix --gres-flags=enforce-binding and related\n\n --cpus-per-gres.\n\n - cons_tres - Allocate lowest numbered cores when filtering cores with gres.\n\n - Fix getting system counts for named GRES/TRES.\n\n - MySQL - Fix for handing typed GRES for association rollups.\n\n - Fix step allocations when tasks_per_core > 1.\n\n - Fix allocating more GRES than requested when asking for multiple GRES types.\n\nTreat libnss_slurm like any other package: add version string to upgrade package.\n\nUpdated to 20.02.1 with following changes'\n\n - Improve job state reason for jobs hitting partition_job_depth.\n\n - Speed up testing of singleton dependencies.\n\n - Fix negative loop bound in cons_tres.\n\n - srun - capture the MPI plugin return code from mpi_hook_client_fini() and use as final return code for step failure.\n\n - Fix segfault in cli_filter/lua.\n\n - Fix --gpu-bind=map_gpu reusability if tasks > elements.\n\n - Make sure config_flags on a gres are sent to the slurmctld on node registration.\n\n - Prolog/Epilog - Fix missing GPU information.\n\n - Fix segfault when using config parser for expanded lines.\n\n - Fix bit overlap test function.\n\n - Don't accrue time if job begin time is in the future.\n\n - Remove accrue time when updating a job start/eligible time to the future.\n\n - Fix regression in 20.02.0 that broke --depend=expand.\n\n - Reset begin time on job release if it's not in the future.\n\n - Fix for recovering burst buffers when using high-availability.\n\n - Fix invalid read due to freeing an incorrectly allocated env array.\n\n - Update slurmctld -i message to warn about losing data.\n\n - Fix scontrol cancel_reboot so it clears the DRAIN flag and node reason for a pending ASAP reboot.\n\nChanges in pdsh: Bring QA to the package build: add %%check stage\n\nSince the build for the SLE-12 HPC Module got fixed, simplify spec file and remove legacy workarounds.\n\nRemove _multibuild file where not needed.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-12-09T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : pdsh, slurm_20_02 (SUSE-SU-2020:2607-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-10030", "CVE-2017-15566", "CVE-2018-10995", "CVE-2018-7033", "CVE-2019-12838", "CVE-2019-19727", "CVE-2019-19728", "CVE-2019-6438", "CVE-2020-12693"], "modified": "2022-05-11T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:libnss_slurm2_20_02", "p-cpe:/a:novell:suse_linux:libnss_slurm2_20_02-debuginfo", "p-cpe:/a:novell:suse_linux:libpmi0_20_02", "p-cpe:/a:novell:suse_linux:libpmi0_20_02-debuginfo", "p-cpe:/a:novell:suse_linux:libslurm35", "p-cpe:/a:novell:suse_linux:libslurm35-debuginfo", "p-cpe:/a:novell:suse_linux:pdsh-slurm_18_08", "p-cpe:/a:novell:suse_linux:pdsh-slurm_18_08-debuginfo", "p-cpe:/a:novell:suse_linux:pdsh-slurm_20_02", "p-cpe:/a:novell:suse_linux:pdsh-slurm_20_02-debuginfo", "p-cpe:/a:novell:suse_linux:perl-slurm_20_02", "p-cpe:/a:novell:suse_linux:perl-slurm_20_02-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_20_02", "p-cpe:/a:novell:suse_linux:slurm_20_02-auth-none", "p-cpe:/a:novell:suse_linux:slurm_20_02-auth-none-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_20_02-config", "p-cpe:/a:novell:suse_linux:slurm_20_02-config-man", "p-cpe:/a:novell:suse_linux:slurm_20_02-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_20_02-debugsource", "p-cpe:/a:novell:suse_linux:slurm_20_02-devel", "p-cpe:/a:novell:suse_linux:slurm_20_02-doc", "p-cpe:/a:novell:suse_linux:slurm_20_02-lua", "p-cpe:/a:novell:suse_linux:slurm_20_02-lua-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_20_02-munge", "p-cpe:/a:novell:suse_linux:slurm_20_02-munge-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_20_02-node", "p-cpe:/a:novell:suse_linux:slurm_20_02-node-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_20_02-pam_slurm", "p-cpe:/a:novell:suse_linux:slurm_20_02-pam_slurm-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_20_02-plugins", "p-cpe:/a:novell:suse_linux:slurm_20_02-plugins-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_20_02-slurmdbd", "p-cpe:/a:novell:suse_linux:slurm_20_02-slurmdbd-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_20_02-sql", "p-cpe:/a:novell:suse_linux:slurm_20_02-sql-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_20_02-sview", "p-cpe:/a:novell:suse_linux:slurm_20_02-sview-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_20_02-torque", "p-cpe:/a:novell:suse_linux:slurm_20_02-torque-debuginfo", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2020-2607-1.NASL", "href": "https://www.tenable.com/plugins/nessus/143870", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2607-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(143870);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/11\");\n\n script_cve_id(\n \"CVE-2016-10030\",\n \"CVE-2017-15566\",\n \"CVE-2018-7033\",\n \"CVE-2018-10995\",\n \"CVE-2019-6438\",\n \"CVE-2019-12838\",\n \"CVE-2019-19727\",\n \"CVE-2019-19728\",\n \"CVE-2020-12693\"\n );\n\n script_name(english:\"SUSE SLES12 Security Update : pdsh, slurm_20_02 (SUSE-SU-2020:2607-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"This update for pdsh, slurm_20_02 fixes the following issues :\n\nChanges in slurm_20_02 :\n\nAdd support for openPMIx also for Leap/SLE 15.0/1 (bsc#1173805).\n\nDo not run %check on SLE-12-SP2: Some incompatibility in tcl makes\nthis fail.\n\nRemove unneeded build dependency to postgresql-devel.\n\nDisable build on s390 (requires 64bit).\n\nBring QA to the package build: add %%check stage.\n\nRemove cruft that isn't needed any longer.\n\nAdd 'ghosted' run-file.\n\nAdd rpmlint filter to handle issues with library packages for Leap and\nenterprise upgrade versions.\n\nUpdated to 20.02.3 which fixes CVE-2020-12693 (bsc#1172004).\n\nOther changes are :\n\n - Factor in ntasks-per-core=1 with cons_tres.\n\n - Fix formatting in error message in cons_tres.\n\n - Fix calling stat on a NULL variable.\n\n - Fix minor memory leak when using reservations with\n flags=first_cores.\n\n - Fix gpu bind issue when CPUs=Cores and ThreadsPerCore >\n 1 on a node.\n\n - Fix --mem-per-gpu for heterogenous --gres requests.\n\n - Fix slurmctld load order in load_all_part_state().\n\n - Fix race condition not finding jobacct gather task\n cgroup entry.\n\n - Suppress error message when selecting nodes on disjoint\n topologies.\n\n - Improve performance of _pack_default_job_details() with\n large number of job\n\n - arguments.\n\n - Fix archive loading previous to 17.11 jobs per-node\n req_mem.\n\n - Fix regresion validating that --gpus-per-socket requires\n\n --sockets-per-node\n\n - for steps. Should only validate allocation requests.\n\n - error() instead of fatal() when parsing an invalid\n hostlist.\n\n - nss_slurm - fix potential deadlock in slurmstepd on\n overloaded systems.\n\n - cons_tres - fix --gres-flags=enforce-binding and related\n\n --cpus-per-gres.\n\n - cons_tres - Allocate lowest numbered cores when\n filtering cores with gres.\n\n - Fix getting system counts for named GRES/TRES.\n\n - MySQL - Fix for handing typed GRES for association\n rollups.\n\n - Fix step allocations when tasks_per_core > 1.\n\n - Fix allocating more GRES than requested when asking for\n multiple GRES types.\n\nTreat libnss_slurm like any other package: add version string to\nupgrade package.\n\nUpdated to 20.02.1 with following changes'\n\n - Improve job state reason for jobs hitting\n partition_job_depth.\n\n - Speed up testing of singleton dependencies.\n\n - Fix negative loop bound in cons_tres.\n\n - srun - capture the MPI plugin return code from\n mpi_hook_client_fini() and use as final return code for\n step failure.\n\n - Fix segfault in cli_filter/lua.\n\n - Fix --gpu-bind=map_gpu reusability if tasks > elements.\n\n - Make sure config_flags on a gres are sent to the\n slurmctld on node registration.\n\n - Prolog/Epilog - Fix missing GPU information.\n\n - Fix segfault when using config parser for expanded\n lines.\n\n - Fix bit overlap test function.\n\n - Don't accrue time if job begin time is in the future.\n\n - Remove accrue time when updating a job start/eligible\n time to the future.\n\n - Fix regression in 20.02.0 that broke --depend=expand.\n\n - Reset begin time on job release if it's not in the\n future.\n\n - Fix for recovering burst buffers when using\n high-availability.\n\n - Fix invalid read due to freeing an incorrectly allocated\n env array.\n\n - Update slurmctld -i message to warn about losing data.\n\n - Fix scontrol cancel_reboot so it clears the DRAIN flag\n and node reason for a pending ASAP reboot.\n\nChanges in pdsh: Bring QA to the package build: add %%check stage\n\nSince the build for the SLE-12 HPC Module got fixed, simplify spec\nfile and remove legacy workarounds.\n\nRemove _multibuild file where not needed.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1007053\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1018371\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1031872\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1041706\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065697\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1084125\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1084917\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085240\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085606\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1086859\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1088693\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1090292\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1095508\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1100850\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103561\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1108671\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109373\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1116758\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1123304\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140709\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1153095\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1153259\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1155784\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158696\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159692\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1161716\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162377\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1164326\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1164386\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172004\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173805\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2016-10030/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2017-15566/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-10995/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-7033/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12838/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-19727/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-19728/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-6438/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12693/\");\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202607-1\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?8522e9c3\");\n script_set_attribute(attribute:\"solution\", value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for HPC 12 :\n\nzypper in -t patch SUSE-SLE-Module-HPC-12-2020-2607=1\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2016-10030\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2019-6438\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/01/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libnss_slurm2_20_02\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libnss_slurm2_20_02-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpmi0_20_02\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpmi0_20_02-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libslurm35\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libslurm35-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-slurm_18_08\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-slurm_18_08-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-slurm_20_02\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-slurm_20_02-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-slurm_20_02\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-slurm_20_02-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02-auth-none\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02-auth-none-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02-config\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02-config-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02-lua\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02-lua-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02-munge\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02-munge-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02-node\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02-node-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02-pam_slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02-pam_slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02-plugins-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02-slurmdbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02-slurmdbd-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02-sql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02-sql-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02-sview\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02-sview-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02-torque\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_02-torque-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"x86_64\") audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(0)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP0\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libnss_slurm2_20_02-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libnss_slurm2_20_02-debuginfo-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libpmi0_20_02-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libpmi0_20_02-debuginfo-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libslurm35-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libslurm35-debuginfo-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-slurm_18_08-2.34-7.26.2\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-slurm_18_08-debuginfo-2.34-7.26.2\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-slurm_20_02-2.34-7.26.2\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-slurm_20_02-debuginfo-2.34-7.26.2\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"perl-slurm_20_02-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"perl-slurm_20_02-debuginfo-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-auth-none-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-auth-none-debuginfo-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-config-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-config-man-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-debuginfo-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-debugsource-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-devel-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-doc-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-lua-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-lua-debuginfo-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-munge-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-munge-debuginfo-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-node-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-node-debuginfo-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-pam_slurm-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-pam_slurm-debuginfo-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-plugins-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-plugins-debuginfo-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-slurmdbd-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-slurmdbd-debuginfo-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-sql-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-sql-debuginfo-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-sview-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-sview-debuginfo-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-torque-20.02.3-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_02-torque-debuginfo-20.02.3-3.5.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"pdsh / slurm_20_02\");\n}\n", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-02-19T13:07:38", "description": "This update for slurm fixes the following issues :\n\nCVE-2019-19727: Fix permissions of configuration file 'slurmdbd.conf' (bsc#1155784).\n\nFix ownership of /var/spool/slurm on new installations and upgrade (bsc#1158696).\n\nFix '%posttrans' macro to cope with added newline (bsc#1153259).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 5.5, "vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}, "published": "2020-01-27T00:00:00", "type": "nessus", "title": "SUSE SLED15 / SLES15 Security Update : slurm (SUSE-SU-2020:0228-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19727"], "modified": "2021-01-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:libpmi0", "p-cpe:/a:novell:suse_linux:libpmi0-debuginfo", "p-cpe:/a:novell:suse_linux:libslurm32", "p-cpe:/a:novell:suse_linux:libslurm32-debuginfo", "p-cpe:/a:novell:suse_linux:perl-slurm", "p-cpe:/a:novell:suse_linux:perl-slurm-debuginfo", "p-cpe:/a:novell:suse_linux:slurm", "p-cpe:/a:novell:suse_linux:slurm-auth-none", "p-cpe:/a:novell:suse_linux:slurm-auth-none-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-config", "p-cpe:/a:novell:suse_linux:slurm-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-debugsource", "p-cpe:/a:novell:suse_linux:slurm-devel", "p-cpe:/a:novell:suse_linux:slurm-doc", "p-cpe:/a:novell:suse_linux:slurm-lua", "p-cpe:/a:novell:suse_linux:slurm-lua-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-munge", "p-cpe:/a:novell:suse_linux:slurm-munge-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-node", "p-cpe:/a:novell:suse_linux:slurm-node-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-openlava", "p-cpe:/a:novell:suse_linux:slurm-pam_slurm", "p-cpe:/a:novell:suse_linux:slurm-pam_slurm-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-plugins", "p-cpe:/a:novell:suse_linux:slurm-plugins-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-seff", "p-cpe:/a:novell:suse_linux:slurm-sjstat", "p-cpe:/a:novell:suse_linux:slurm-slurmdbd", "p-cpe:/a:novell:suse_linux:slurm-slurmdbd-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-sql", "p-cpe:/a:novell:suse_linux:slurm-sql-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-sview", "p-cpe:/a:novell:suse_linux:slurm-sview-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-torque", "p-cpe:/a:novell:suse_linux:slurm-torque-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2020-0228-1.NASL", "href": "https://www.tenable.com/plugins/nessus/133256", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:0228-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(133256);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2019-19727\");\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : slurm (SUSE-SU-2020:0228-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update for slurm fixes the following issues :\n\nCVE-2019-19727: Fix permissions of configuration file 'slurmdbd.conf'\n(bsc#1155784).\n\nFix ownership of /var/spool/slurm on new installations and upgrade\n(bsc#1158696).\n\nFix '%posttrans' macro to cope with added newline (bsc#1153259).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1153259\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1155784\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158696\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-19727/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20200228-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9358dcbb\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for Open Buildservice Development Tools\n15-SP1 :\n\nzypper in -t patch\nSUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-228=1\n\nSUSE Linux Enterprise Module for Open Buildservice Development Tools\n15 :\n\nzypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-2020-228=1\n\nSUSE Linux Enterprise Module for HPC 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Module-HPC-15-SP1-2020-228=1\n\nSUSE Linux Enterprise Module for HPC 15 :\n\nzypper in -t patch SUSE-SLE-Module-HPC-15-2020-228=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpmi0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpmi0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libslurm32\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libslurm32-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-auth-none\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-auth-none-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-config\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-lua\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-lua-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-munge\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-munge-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-node\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-node-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-openlava\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-pam_slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-pam_slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-plugins-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-seff\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sjstat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-slurmdbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-slurmdbd-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sql-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sview\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sview-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-torque\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-torque-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/01/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/01/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/01/27\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(0|1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP0/1\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(0|1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP0/1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libslurm32-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libslurm32-debuginfo-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"libslurm32-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"libslurm32-debuginfo-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libpmi0-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libpmi0-debuginfo-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libslurm32-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libslurm32-debuginfo-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"perl-slurm-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"perl-slurm-debuginfo-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-auth-none-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-auth-none-debuginfo-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-config-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-devel-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-doc-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-lua-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-lua-debuginfo-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-munge-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-munge-debuginfo-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-node-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-node-debuginfo-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-pam_slurm-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-pam_slurm-debuginfo-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-plugins-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-plugins-debuginfo-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-slurmdbd-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-slurmdbd-debuginfo-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-sql-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-sql-debuginfo-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-torque-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-torque-debuginfo-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"slurm-debuginfo-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"slurm-debugsource-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"slurm-openlava-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"slurm-seff-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"slurm-sjstat-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"slurm-sview-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"slurm-sview-debuginfo-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"libslurm32-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"libslurm32-debuginfo-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"slurm-debuginfo-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"slurm-debugsource-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"slurm-openlava-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"slurm-seff-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"slurm-sjstat-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"slurm-sview-17.11.13-6.23.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"slurm-sview-debuginfo-17.11.13-6.23.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"slurm\");\n}\n", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-02-19T13:00:59", "description": "This update for slurm fixes the following issues :\n\nCVE-2019-19728: Fixed a privilege escalation with srun (bsc#1159692).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 7.5, "vector": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-02-20T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : slurm (SUSE-SU-2020:0420-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19728"], "modified": "2020-02-24T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:libpmi0", "p-cpe:/a:novell:suse_linux:libpmi0-debuginfo", "p-cpe:/a:novell:suse_linux:libslurm31", "p-cpe:/a:novell:suse_linux:libslurm31-debuginfo", "p-cpe:/a:novell:suse_linux:perl-slurm", "p-cpe:/a:novell:suse_linux:perl-slurm-debuginfo", "p-cpe:/a:novell:suse_linux:slurm", "p-cpe:/a:novell:suse_linux:slurm-auth-none", "p-cpe:/a:novell:suse_linux:slurm-auth-none-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-config", "p-cpe:/a:novell:suse_linux:slurm-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-debugsource", "p-cpe:/a:novell:suse_linux:slurm-devel", "p-cpe:/a:novell:suse_linux:slurm-doc", "p-cpe:/a:novell:suse_linux:slurm-lua", "p-cpe:/a:novell:suse_linux:slurm-lua-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-munge", "p-cpe:/a:novell:suse_linux:slurm-munge-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-pam_slurm", "p-cpe:/a:novell:suse_linux:slurm-pam_slurm-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-plugins", "p-cpe:/a:novell:suse_linux:slurm-plugins-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-sched-wiki", "p-cpe:/a:novell:suse_linux:slurm-slurmdb-direct", "p-cpe:/a:novell:suse_linux:slurm-slurmdbd", "p-cpe:/a:novell:suse_linux:slurm-slurmdbd-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-sql", "p-cpe:/a:novell:suse_linux:slurm-sql-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-torque", "p-cpe:/a:novell:suse_linux:slurm-torque-debuginfo", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2020-0420-1.NASL", "href": "https://www.tenable.com/plugins/nessus/133838", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:0420-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(133838);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/02/24\");\n\n script_cve_id(\"CVE-2019-19728\");\n\n script_name(english:\"SUSE SLES12 Security Update : slurm (SUSE-SU-2020:0420-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for slurm fixes the following issues :\n\nCVE-2019-19728: Fixed a privilege escalation with srun (bsc#1159692).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159692\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-19728/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20200420-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?65238403\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for HPC 12:zypper in -t patch\nSUSE-SLE-Module-HPC-12-2020-420=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpmi0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpmi0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libslurm31\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libslurm31-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-auth-none\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-auth-none-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-config\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-lua\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-lua-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-munge\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-munge-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-pam_slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-pam_slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-plugins-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sched-wiki\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-slurmdb-direct\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-slurmdbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-slurmdbd-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sql-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-torque\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-torque-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/01/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/02/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/02/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"x86_64\") audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(0)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP0\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libpmi0-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libpmi0-debuginfo-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libslurm31-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libslurm31-debuginfo-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"perl-slurm-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"perl-slurm-debuginfo-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-auth-none-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-auth-none-debuginfo-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-config-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-debuginfo-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-debugsource-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-devel-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-doc-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-lua-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-lua-debuginfo-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-munge-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-munge-debuginfo-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-pam_slurm-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-pam_slurm-debuginfo-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-plugins-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-plugins-debuginfo-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-sched-wiki-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-slurmdb-direct-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-slurmdbd-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-slurmdbd-debuginfo-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-sql-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-sql-debuginfo-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-torque-17.02.11-6.39.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-torque-debuginfo-17.02.11-6.39.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"slurm\");\n}\n", "cvss": {"score": 6, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2022-06-16T16:59:54", "description": "This update for slurm fixes the following issues :\n\nSecurity issue fixed :\n\n - CVE-2019-12838: Fixed a SQL injection (bsc#1140709).\n\nNon-security issue fixed :\n\n - Added X11-forwarding (bsc#1153245).\n\n - Moved srun from 'slurm' to 'slurm-node': srun is required on the nodes as well so sbatch will work.\n 'slurm-node' is a requirement when 'slurm' is installed (bsc#1153095). \n\nThis update was imported from the SUSE:SLE-15:Update update project.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-11-21T00:00:00", "type": "nessus", "title": "openSUSE Security Update : slurm (openSUSE-2019-2536)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-12838"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:libpmi0", "p-cpe:/a:novell:opensuse:libpmi0-debuginfo", "p-cpe:/a:novell:opensuse:libslurm32", "p-cpe:/a:novell:opensuse:libslurm32-debuginfo", "p-cpe:/a:novell:opensuse:perl-slurm", "p-cpe:/a:novell:opensuse:perl-slurm-debuginfo", "p-cpe:/a:novell:opensuse:slurm", "p-cpe:/a:novell:opensuse:slurm-auth-none", "p-cpe:/a:novell:opensuse:slurm-auth-none-debuginfo", "p-cpe:/a:novell:opensuse:slurm-config", "p-cpe:/a:novell:opensuse:slurm-debuginfo", "p-cpe:/a:novell:opensuse:slurm-debugsource", "p-cpe:/a:novell:opensuse:slurm-devel", "p-cpe:/a:novell:opensuse:slurm-lua", "p-cpe:/a:novell:opensuse:slurm-lua-debuginfo", "p-cpe:/a:novell:opensuse:slurm-munge", "p-cpe:/a:novell:opensuse:slurm-munge-debuginfo", "p-cpe:/a:novell:opensuse:slurm-node", "p-cpe:/a:novell:opensuse:slurm-node-debuginfo", "p-cpe:/a:novell:opensuse:slurm-openlava", "p-cpe:/a:novell:opensuse:slurm-pam_slurm", "p-cpe:/a:novell:opensuse:slurm-pam_slurm-debuginfo", "p-cpe:/a:novell:opensuse:slurm-plugins", "p-cpe:/a:novell:opensuse:slurm-plugins-debuginfo", "p-cpe:/a:novell:opensuse:slurm-seff", "p-cpe:/a:novell:opensuse:slurm-sjstat", "p-cpe:/a:novell:opensuse:slurm-slurmdbd", "p-cpe:/a:novell:opensuse:slurm-slurmdbd-debuginfo", "p-cpe:/a:novell:opensuse:slurm-sql", "p-cpe:/a:novell:opensuse:slurm-sql-debuginfo", "p-cpe:/a:novell:opensuse:slurm-sview", "p-cpe:/a:novell:opensuse:slurm-sview-debuginfo", "p-cpe:/a:novell:opensuse:slurm-torque", "p-cpe:/a:novell:opensuse:slurm-torque-debuginfo", "cpe:/o:novell:opensuse:15.0"], "id": "OPENSUSE-2019-2536.NASL", "href": "https://www.tenable.com/plugins/nessus/131181", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2019-2536.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(131181);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2019-12838\");\n\n script_name(english:\"openSUSE Security Update : slurm (openSUSE-2019-2536)\");\n script_summary(english:\"Check for the openSUSE-2019-2536 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for slurm fixes the following issues :\n\nSecurity issue fixed :\n\n - CVE-2019-12838: Fixed a SQL injection (bsc#1140709).\n\nNon-security issue fixed :\n\n - Added X11-forwarding (bsc#1153245).\n\n - Moved srun from 'slurm' to 'slurm-node': srun is\n required on the nodes as well so sbatch will work.\n 'slurm-node' is a requirement when 'slurm' is installed\n (bsc#1153095). \n\nThis update was imported from the SUSE:SLE-15:Update update project.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140709\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1153095\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1153245\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected slurm packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libpmi0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libpmi0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libslurm32\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libslurm32-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-auth-none\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-auth-none-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-config\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-lua\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-lua-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-munge\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-munge-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-node\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-node-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-openlava\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-pam_slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-pam_slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-plugins-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-seff\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-sjstat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-slurmdbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-slurmdbd-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-sql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-sql-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-sview\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-sview-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-torque\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-torque-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/07/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/11/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/11/21\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.0)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.0\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libpmi0-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libpmi0-debuginfo-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libslurm32-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libslurm32-debuginfo-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"perl-slurm-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"perl-slurm-debuginfo-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-auth-none-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-auth-none-debuginfo-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-config-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-debuginfo-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-debugsource-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-devel-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-lua-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-lua-debuginfo-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-munge-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-munge-debuginfo-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-node-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-node-debuginfo-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-openlava-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-pam_slurm-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-pam_slurm-debuginfo-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-plugins-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-plugins-debuginfo-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-seff-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-sjstat-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-slurmdbd-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-slurmdbd-debuginfo-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-sql-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-sql-debuginfo-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-sview-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-sview-debuginfo-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-torque-17.11.13-lp150.5.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"slurm-torque-debuginfo-17.11.13-lp150.5.24.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libpmi0 / libpmi0-debuginfo / libslurm32 / libslurm32-debuginfo / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-06-16T16:50:59", "description": "This update for slurm to version 18.08.8 fixes the following issues :\n\nSecurity issue fixed :\n\nCVE-2019-12838: Fixed a SQL injection in slurmdbd (bsc#1140709).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-08-29T00:00:00", "type": "nessus", "title": "SUSE SLED15 / SLES15 Security Update : slurm (SUSE-SU-2019:2229-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-12838"], "modified": "2021-01-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:libpmi0", "p-cpe:/a:novell:suse_linux:libpmi0-debuginfo", "p-cpe:/a:novell:suse_linux:libslurm33", "p-cpe:/a:novell:suse_linux:libslurm33-debuginfo", "p-cpe:/a:novell:suse_linux:perl-slurm", "p-cpe:/a:novell:suse_linux:perl-slurm-debuginfo", "p-cpe:/a:novell:suse_linux:slurm", "p-cpe:/a:novell:suse_linux:slurm-auth-none", "p-cpe:/a:novell:suse_linux:slurm-auth-none-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-config", "p-cpe:/a:novell:suse_linux:slurm-config-man", "p-cpe:/a:novell:suse_linux:slurm-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-debugsource", "p-cpe:/a:novell:suse_linux:slurm-devel", "p-cpe:/a:novell:suse_linux:slurm-doc", "p-cpe:/a:novell:suse_linux:slurm-lua", "p-cpe:/a:novell:suse_linux:slurm-lua-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-munge", "p-cpe:/a:novell:suse_linux:slurm-munge-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-node", "p-cpe:/a:novell:suse_linux:slurm-node-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-openlava", "p-cpe:/a:novell:suse_linux:slurm-pam_slurm", "p-cpe:/a:novell:suse_linux:slurm-pam_slurm-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-plugins", "p-cpe:/a:novell:suse_linux:slurm-plugins-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-seff", "p-cpe:/a:novell:suse_linux:slurm-sjstat", "p-cpe:/a:novell:suse_linux:slurm-slurmdbd", "p-cpe:/a:novell:suse_linux:slurm-slurmdbd-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-sql", "p-cpe:/a:novell:suse_linux:slurm-sql-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-sview", "p-cpe:/a:novell:suse_linux:slurm-sview-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-torque", "p-cpe:/a:novell:suse_linux:slurm-torque-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2019-2229-1.NASL", "href": "https://www.tenable.com/plugins/nessus/128314", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2019:2229-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(128314);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2019-12838\");\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : slurm (SUSE-SU-2019:2229-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update for slurm to version 18.08.8 fixes the following issues :\n\nSecurity issue fixed :\n\nCVE-2019-12838: Fixed a SQL injection in slurmdbd (bsc#1140709).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140709\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-12838/\"\n );\n # https://www.suse.com/support/update/announcement/2019/suse-su-20192229-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?16500e8a\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for Open Buildservice Development Tools\n15-SP1:zypper in -t patch\nSUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2229=1\n\nSUSE Linux Enterprise Module for HPC 15-SP1:zypper in -t patch\nSUSE-SLE-Module-HPC-15-SP1-2019-2229=1\n\nSUSE Linux Enterprise Module for Development Tools 15-SP1:zypper in -t\npatch SUSE-SLE-Module-Development-Tools-15-SP1-2019-2229=1\n\nSUSE Linux Enterprise Module for Development Tools 15:zypper in -t\npatch SUSE-SLE-Module-Development-Tools-15-2019-2229=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpmi0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpmi0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libslurm33\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libslurm33-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-auth-none\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-auth-none-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-config\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-config-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-lua\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-lua-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-munge\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-munge-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-node\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-node-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-openlava\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-pam_slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-pam_slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-plugins-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-seff\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sjstat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-slurmdbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-slurmdbd-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sql-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sview\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sview-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-torque\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-torque-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/07/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/08/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/08/29\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP1\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libpmi0-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libpmi0-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libslurm33-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libslurm33-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"perl-slurm-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"perl-slurm-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-auth-none-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-auth-none-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-config-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-config-man-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-devel-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-doc-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-lua-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-lua-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-munge-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-munge-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-node-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-node-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-pam_slurm-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-pam_slurm-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-plugins-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-plugins-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-slurmdbd-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-slurmdbd-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-sql-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-sql-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-torque-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"slurm-torque-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"libpmi0-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"libpmi0-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"libslurm33-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"libslurm33-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"perl-slurm-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"perl-slurm-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-auth-none-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-auth-none-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-config-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-config-man-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-devel-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-doc-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-lua-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-lua-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-munge-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-munge-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-node-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-node-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-pam_slurm-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-pam_slurm-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-plugins-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-plugins-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-slurmdbd-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-slurmdbd-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-sql-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-sql-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-torque-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-torque-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"slurm-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"slurm-debugsource-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"slurm-openlava-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"slurm-seff-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"slurm-sjstat-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"slurm-sview-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"slurm-sview-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"libpmi0-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"libpmi0-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"libslurm33-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"libslurm33-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"perl-slurm-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"perl-slurm-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-auth-none-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-auth-none-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-config-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-config-man-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-devel-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-doc-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-lua-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-lua-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-munge-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-munge-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-node-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-node-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-pam_slurm-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-pam_slurm-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-plugins-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-plugins-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-slurmdbd-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-slurmdbd-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-sql-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-sql-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-torque-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"slurm-torque-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"slurm-debuginfo-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"slurm-debugsource-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"slurm-openlava-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"slurm-seff-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"slurm-sjstat-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"slurm-sview-18.08.8-3.4.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"slurm-sview-debuginfo-18.08.8-3.4.1\")) flag++;\n\n\nif (flag)\n{\n set_kb_item(name:'www/0/SQLi', value:TRUE);\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"slurm\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-06-16T16:48:31", "description": "- Release of 18.08.8\n\n - Closes security issue (CVE-2019-12838)\n\n - Configure for UCX support on supported arches\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-07-24T00:00:00", "type": "nessus", "title": "Fedora 30 : slurm (2019-5d0d2619df)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-12838"], "modified": "2020-01-06T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:slurm", "cpe:/o:fedoraproject:fedora:30"], "id": "FEDORA_2019-5D0D2619DF.NASL", "href": "https://www.tenable.com/plugins/nessus/126970", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2019-5d0d2619df.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(126970);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2020/01/06\");\n\n script_cve_id(\"CVE-2019-12838\");\n script_xref(name:\"FEDORA\", value:\"2019-5d0d2619df\");\n\n script_name(english:\"Fedora 30 : slurm (2019-5d0d2619df)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - Release of 18.08.8\n\n - Closes security issue (CVE-2019-12838)\n\n - Configure for UCX support on supported arches\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2019-5d0d2619df\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected slurm package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:30\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/07/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/07/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/07/24\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^30([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 30\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC30\", reference:\"slurm-18.08.8-1.fc30\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"slurm\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-06-16T16:48:52", "description": "- Release of 18.08.8\n\n - Closes security issue (CVE-2019-12838)\n\n - Configure for UCX support on supported arches\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-07-24T00:00:00", "type": "nessus", "title": "Fedora 29 : slurm (2019-4ca3a39825)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-12838"], "modified": "2020-01-06T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:slurm", "cpe:/o:fedoraproject:fedora:29"], "id": "FEDORA_2019-4CA3A39825.NASL", "href": "https://www.tenable.com/plugins/nessus/126969", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2019-4ca3a39825.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(126969);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2020/01/06\");\n\n script_cve_id(\"CVE-2019-12838\");\n script_xref(name:\"FEDORA\", value:\"2019-4ca3a39825\");\n\n script_name(english:\"Fedora 29 : slurm (2019-4ca3a39825)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - Release of 18.08.8\n\n - Closes security issue (CVE-2019-12838)\n\n - Configure for UCX support on supported arches\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2019-4ca3a39825\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected slurm package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:29\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/07/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/07/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/07/24\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^29([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 29\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC29\", reference:\"slurm-18.08.8-1.fc29\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"slurm\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-06-16T16:55:26", "description": "This update for slurm to version 18.08.8 fixes the following issues :\n\nSecurity issue fixed :\n\n - CVE-2019-12838: Fixed a SQL injection in slurmdbd (bsc#1140709).\n\nThis update was imported from the SUSE:SLE-15-SP1:Update update project.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-09-03T00:00:00", "type": "nessus", "title": "openSUSE Security Update : slurm (openSUSE-2019-2052)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-12838"], "modified": "2019-12-31T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:libpmi0", "p-cpe:/a:novell:opensuse:libpmi0-debuginfo", "p-cpe:/a:novell:opensuse:libslurm33", "p-cpe:/a:novell:opensuse:libslurm33-debuginfo", "p-cpe:/a:novell:opensuse:perl-slurm", "p-cpe:/a:novell:opensuse:perl-slurm-debuginfo", "p-cpe:/a:novell:opensuse:slurm", "p-cpe:/a:novell:opensuse:slurm-auth-none", "p-cpe:/a:novell:opensuse:slurm-auth-none-debuginfo", "p-cpe:/a:novell:opensuse:slurm-config", "p-cpe:/a:novell:opensuse:slurm-config-man", "p-cpe:/a:novell:opensuse:slurm-cray", "p-cpe:/a:novell:opensuse:slurm-cray-debuginfo", "p-cpe:/a:novell:opensuse:slurm-debuginfo", "p-cpe:/a:novell:opensuse:slurm-debugsource", "p-cpe:/a:novell:opensuse:slurm-devel", "p-cpe:/a:novell:opensuse:slurm-hdf5", "p-cpe:/a:novell:opensuse:slurm-hdf5-debuginfo", "p-cpe:/a:novell:opensuse:slurm-lua", "p-cpe:/a:novell:opensuse:slurm-lua-debuginfo", "p-cpe:/a:novell:opensuse:slurm-munge", "p-cpe:/a:novell:opensuse:slurm-munge-debuginfo", "p-cpe:/a:novell:opensuse:slurm-node", "p-cpe:/a:novell:opensuse:slurm-node-debuginfo", "p-cpe:/a:novell:opensuse:slurm-openlava", "p-cpe:/a:novell:opensuse:slurm-pam_slurm", "p-cpe:/a:novell:opensuse:slurm-pam_slurm-debuginfo", "p-cpe:/a:novell:opensuse:slurm-plugins", "p-cpe:/a:novell:opensuse:slurm-plugins-debuginfo", "p-cpe:/a:novell:opensuse:slurm-seff", "p-cpe:/a:novell:opensuse:slurm-sjstat", "p-cpe:/a:novell:opensuse:slurm-slurmdbd", "p-cpe:/a:novell:opensuse:slurm-slurmdbd-debuginfo", "p-cpe:/a:novell:opensuse:slurm-sql", "p-cpe:/a:novell:opensuse:slurm-sql-debuginfo", "p-cpe:/a:novell:opensuse:slurm-sview", "p-cpe:/a:novell:opensuse:slurm-sview-debuginfo", "p-cpe:/a:novell:opensuse:slurm-torque", "p-cpe:/a:novell:opensuse:slurm-torque-debuginfo", "cpe:/o:novell:opensuse:15.1"], "id": "OPENSUSE-2019-2052.NASL", "href": "https://www.tenable.com/plugins/nessus/128461", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2019-2052.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(128461);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2019/12/31\");\n\n script_cve_id(\"CVE-2019-12838\");\n\n script_name(english:\"openSUSE Security Update : slurm (openSUSE-2019-2052)\");\n script_summary(english:\"Check for the openSUSE-2019-2052 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for slurm to version 18.08.8 fixes the following issues :\n\nSecurity issue fixed :\n\n - CVE-2019-12838: Fixed a SQL injection in slurmdbd\n (bsc#1140709).\n\nThis update was imported from the SUSE:SLE-15-SP1:Update update\nproject.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1140709\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected slurm packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libpmi0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libpmi0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libslurm33\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libslurm33-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-auth-none\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-auth-none-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-config\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-config-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-cray\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-cray-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-hdf5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-hdf5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-lua\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-lua-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-munge\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-munge-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-node\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-node-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-openlava\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-pam_slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-pam_slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-plugins-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-seff\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-sjstat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-slurmdbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-slurmdbd-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-sql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-sql-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-sview\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-sview-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-torque\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:slurm-torque-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/07/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/09/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/09/03\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libpmi0-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libpmi0-debuginfo-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libslurm33-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libslurm33-debuginfo-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"perl-slurm-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"perl-slurm-debuginfo-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-auth-none-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-auth-none-debuginfo-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-config-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-config-man-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-cray-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-cray-debuginfo-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-debuginfo-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-debugsource-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-devel-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-hdf5-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-hdf5-debuginfo-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-lua-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-lua-debuginfo-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-munge-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-munge-debuginfo-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-node-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-node-debuginfo-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-openlava-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-pam_slurm-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-pam_slurm-debuginfo-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-plugins-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-plugins-debuginfo-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-seff-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-sjstat-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-slurmdbd-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-slurmdbd-debuginfo-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-sql-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-sql-debuginfo-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-sview-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-sview-debuginfo-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-torque-18.08.8-lp151.2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"slurm-torque-debuginfo-18.08.8-lp151.2.3.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libpmi0 / libpmi0-debuginfo / libslurm33 / libslurm33-debuginfo / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-06-16T17:01:34", "description": "It was discovered that the Simple Linux Utility for Resource Management (SLURM), a cluster resource management and job scheduling system, did not escape strings when importing an archive file into the accounting_storage/mysql backend, resulting in SQL injection.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-11-20T00:00:00", "type": "nessus", "title": "Debian DSA-4572-1 : slurm-llnl - security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-12838"], "modified": "2019-12-09T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:slurm-llnl", "cpe:/o:debian:debian_linux:10.0"], "id": "DEBIAN_DSA-4572.NASL", "href": "https://www.tenable.com/plugins/nessus/131140", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-4572. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(131140);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2019/12/09\");\n\n script_cve_id(\"CVE-2019-12838\");\n script_xref(name:\"DSA\", value:\"4572\");\n\n script_name(english:\"Debian DSA-4572-1 : slurm-llnl - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that the Simple Linux Utility for Resource\nManagement (SLURM), a cluster resource management and job scheduling\nsystem, did not escape strings when importing an archive file into the\naccounting_storage/mysql backend, resulting in SQL injection.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/source-package/slurm-llnl\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/buster/slurm-llnl\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2019/dsa-4572\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the slurm-llnl packages.\n\nFor the stable distribution (buster), this problem has been fixed in\nversion 18.08.5.2-1+deb10u1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurm-llnl\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:10.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/07/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/11/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/11/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"10.0\", prefix:\"libpam-slurm\", reference:\"18.08.5.2-1+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libpmi0\", reference:\"18.08.5.2-1+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libpmi0-dev\", reference:\"18.08.5.2-1+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libpmi2-0\", reference:\"18.08.5.2-1+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libpmi2-0-dev\", reference:\"18.08.5.2-1+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libslurm-dev\", reference:\"18.08.5.2-1+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libslurm-perl\", reference:\"18.08.5.2-1+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libslurm33\", reference:\"18.08.5.2-1+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libslurmdb-dev\", reference:\"18.08.5.2-1+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libslurmdb-perl\", reference:\"18.08.5.2-1+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libslurmdb33\", reference:\"18.08.5.2-1+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"slurm-client\", reference:\"18.08.5.2-1+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"slurm-client-emulator\", reference:\"18.08.5.2-1+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"slurm-wlm\", reference:\"18.08.5.2-1+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"slurm-wlm-basic-plugins\", reference:\"18.08.5.2-1+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"slurm-wlm-basic-plugins-dev\", reference:\"18.08.5.2-1+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"slurm-wlm-doc\", reference:\"18.08.5.2-1+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"slurm-wlm-emulator\", reference:\"18.08.5.2-1+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"slurm-wlm-torque\", reference:\"18.08.5.2-1+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"slurmctld\", reference:\"18.08.5.2-1+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"slurmd\", reference:\"18.08.5.2-1+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"slurmdbd\", reference:\"18.08.5.2-1+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"sview\", reference:\"18.08.5.2-1+deb10u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-06-16T17:01:09", "description": "This update for slurm fixes the following issues :\n\nSecurity issue fixed :\n\nCVE-2019-12838: Fixed an SQL injection (bsc#1140709).\n\nNon-security issue fixed: Added X11-forwarding (bsc#1153245).\n\nMoved srun from 'slurm' to 'slurm-node': srun is required on the nodes as well so sbatch will work. 'slurm-node' is a requirement when 'slurm' is installed (bsc#1153095).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-11-18T00:00:00", "type": "nessus", "title": "SUSE SLED15 / SLES15 Security Update : slurm (SUSE-SU-2019:2989-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-12838"], "modified": "2021-01-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:libpmi0", "p-cpe:/a:novell:suse_linux:libpmi0-debuginfo", "p-cpe:/a:novell:suse_linux:libslurm32", "p-cpe:/a:novell:suse_linux:libslurm32-debuginfo", "p-cpe:/a:novell:suse_linux:perl-slurm", "p-cpe:/a:novell:suse_linux:perl-slurm-debuginfo", "p-cpe:/a:novell:suse_linux:slurm", "p-cpe:/a:novell:suse_linux:slurm-auth-none", "p-cpe:/a:novell:suse_linux:slurm-auth-none-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-config", "p-cpe:/a:novell:suse_linux:slurm-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-debugsource", "p-cpe:/a:novell:suse_linux:slurm-devel", "p-cpe:/a:novell:suse_linux:slurm-doc", "p-cpe:/a:novell:suse_linux:slurm-lua", "p-cpe:/a:novell:suse_linux:slurm-lua-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-munge", "p-cpe:/a:novell:suse_linux:slurm-munge-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-node", "p-cpe:/a:novell:suse_linux:slurm-node-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-openlava", "p-cpe:/a:novell:suse_linux:slurm-pam_slurm", "p-cpe:/a:novell:suse_linux:slurm-pam_slurm-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-plugins", "p-cpe:/a:novell:suse_linux:slurm-plugins-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-seff", "p-cpe:/a:novell:suse_linux:slurm-sjstat", "p-cpe:/a:novell:suse_linux:slurm-slurmdbd", "p-cpe:/a:novell:suse_linux:slurm-slurmdbd-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-sql", "p-cpe:/a:novell:suse_linux:slurm-sql-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-sview", "p-cpe:/a:novell:suse_linux:slurm-sview-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-torque", "p-cpe:/a:novell:suse_linux:slurm-torque-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2019-2989-1.NASL", "href": "https://www.tenable.com/plugins/nessus/131124", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2019:2989-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(131124);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2019-12838\");\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : slurm (SUSE-SU-2019:2989-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update for slurm fixes the following issues :\n\nSecurity issue fixed :\n\nCVE-2019-12838: Fixed an SQL injection (bsc#1140709).\n\nNon-security issue fixed: Added X11-forwarding (bsc#1153245).\n\nMoved srun from 'slurm' to 'slurm-node': srun is required on the nodes\nas well so sbatch will work. 'slurm-node' is a requirement when\n'slurm' is installed (bsc#1153095).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140709\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1153095\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1153245\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-12838/\"\n );\n # https://www.suse.com/support/update/announcement/2019/suse-su-20192989-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2e5884e8\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for Open Buildservice Development Tools\n15-SP1:zypper in -t patch\nSUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2989=1\n\nSUSE Linux Enterprise Module for Open Buildservice Development Tools\n15:zypper in -t patch\nSUSE-SLE-Module-Development-Tools-OBS-15-2019-2989=1\n\nSUSE Linux Enterprise Module for HPC 15-SP1:zypper in -t patch\nSUSE-SLE-Module-HPC-15-SP1-2019-2989=1\n\nSUSE Linux Enterprise Module for HPC 15:zypper in -t patch\nSUSE-SLE-Module-HPC-15-2019-2989=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpmi0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpmi0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libslurm32\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libslurm32-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-auth-none\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-auth-none-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-config\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-lua\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-lua-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-munge\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-munge-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-node\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-node-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-openlava\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-pam_slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-pam_slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-plugins-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-seff\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sjstat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-slurmdbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-slurmdbd-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sql-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sview\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sview-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-torque\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-torque-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/07/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/11/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/11/18\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(0|1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP0/1\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(0|1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP0/1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libslurm32-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libslurm32-debuginfo-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"libslurm32-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"libslurm32-debuginfo-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libpmi0-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libpmi0-debuginfo-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libslurm32-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libslurm32-debuginfo-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"perl-slurm-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"perl-slurm-debuginfo-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-auth-none-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-auth-none-debuginfo-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-config-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-devel-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-doc-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-lua-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-lua-debuginfo-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-munge-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-munge-debuginfo-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-node-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-node-debuginfo-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-pam_slurm-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-pam_slurm-debuginfo-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-plugins-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-plugins-debuginfo-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-slurmdbd-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-slurmdbd-debuginfo-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-sql-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-sql-debuginfo-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-torque-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-torque-debuginfo-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"slurm-debuginfo-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"slurm-debugsource-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"slurm-openlava-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"slurm-seff-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"slurm-sjstat-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"slurm-sview-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"slurm-sview-debuginfo-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"libslurm32-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"libslurm32-debuginfo-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"slurm-debuginfo-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"slurm-debugsource-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"slurm-openlava-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"slurm-seff-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"slurm-sjstat-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"slurm-sview-17.11.13-6.18.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"slurm-sview-debuginfo-17.11.13-6.18.1\")) flag++;\n\n\nif (flag)\n{\n set_kb_item(name:'www/0/SQLi', value:TRUE);\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"slurm\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-06-16T14:55:17", "description": "This update for pdsh fixes the following issues :\n\nPreparing pdsh for Slurm 20.11 (jsc#ECO-2412)\n\nSimplify convoluted condition.\n\nThis update for slurm fixes the following issues :\n\nFix potential buffer overflows from use of unpackmem(). CVE-2020-27745 (bsc#1178890)\n\nFix potential leak of the magic cookie when sent as an argument to the xauth command. CVE-2020-27746 (bsc#1178891)\n\nAdd support for openPMIx also for Leap/SLE 15.0/1 (bsc#1173805).\n\nUpdated to 20.02.3 which fixes CVE-2020-12693 (bsc#1172004).\n\nslurm-plugins will now also require pmix not only libpmix (bsc#1164326)\n\nRemoved autopatch as it doesn't work for the SLE-11-SP4 build.\n\nDisable %arm builds as this is no longer supported.\n\npmix searches now also for libpmix.so.2 so that there is no dependency for devel package (bsc#1164386)\n\nUpdate to version 20.02.0 (jsc#SLE-8491)\n\n - Fix minor memory leak in slurmd on reconfig.\n\n - Fix invalid ptr reference when rolling up data in the database.\n\n - Change shtml2html.py to require python3 for RHEL8 support, and match man2html.py.\n\n - slurm.spec - override 'hardening' linker flags to ensure RHEL8 builds in a usable manner.\n\n - Fix type mismatches in the perl API.\n\n - Prevent use of uninitialized slurmctld_diag_stats.\n\n - Fixed various Coverity issues.\n\n - Only show warning about root-less topology in daemons.\n\n - Fix accounting of jobs in IGNORE_JOBS reservations.\n\n - Fix issue with batch steps state not loading correctly when upgrading from 19.05.\n\n - Deprecate max_depend_depth in SchedulerParameters and move it to DependencyParameters.\n\n - Silence erroneous error on slurmctld upgrade when loading federation state.\n\n - Break infinite loop in cons_tres dealing with incorrect tasks per tres request resulting in slurmctld hang.\n\n - Improve handling of --gpus-per-task to make sure appropriate number of GPUs is assigned to job.\n\n - Fix seg fault on cons_res when requesting --spread-job.\n\nMove to python3 for everything but SLE-11-SP4\n\n - For SLE-11-SP4 add a workaround to handle a python3 script (python2.7 compliant).\n\n - sbatch - fix segfault when no newline at the end of a burst buffer file.\n\n - Change scancel to only check job's base state when matching -t options.\n\n - Save job dependency list in state files.\n\n - cons_tres - allow jobs to be run on systems with root-less topologies.\n\n - Restore pre-20.02pre1 PrologSlurmctld synchonization behavior to avoid various race conditions, and ensure proper batch job launch.\n\n - Add new slurmrestd command/daemon which implements the Slurm REST API.\n\nstandard slurm.conf uses now also SlurmctldHost on all build targets (bsc#1162377)\n\nstart slurmdbd after mariadb (bsc#1161716)\n\nUpdate to version 19.05.5 (jsc#SLE-8491)\n\n - Includes security fixes CVE-2019-19727, CVE-2019-19728, CVE-2019-12838.\n\n - Disable i586 builds as this is no longer supported.\n\n - Create libnss_slurm package to support user and group resolution thru slurmstepd.\n\nUpdate to v18.08.9 for fixing CVE-2019-19728 (bsc#1159692).\n\n - Make Slurm compile on linux after sys/sysctl.h was deprecated.\n\n - Install slurmdbd.conf.example with 0600 permissions to encourage secure use. CVE-2019-19727.\n\n - srun - do not continue with job launch if --uid fails.\n CVE-2019-19728.\n\nadded pmix support jsc#SLE-10800\n\nUse --with-shared-libslurm to build slurm binaries using libslurm.\n\nMake libslurm depend on slurm-config.\n\nFix ownership of /var/spool/slurm on new installations and upgrade (bsc#1158696).\n\nFix permissions of slurmdbd.conf (bsc#1155784, CVE-2019-19727).\n\nFix %posttrans macro _res_update to cope with added newline (bsc#1153259).\n\nAdd package slurm-webdoc which sets up a web server to provide the documentation for the version shipped.\n\nMove srun from 'slurm' to 'slurm-node': srun is required on the nodes as well so sbatch will work. 'slurm-node' is a requirement when 'slurm' is installed (bsc#1153095).\n\nUpdated to 18.08.8 for fixing (CVE-2019-12838, bsc#1140709, jsc#SLE-7341, jsc#SLE-7342)\n\n - Update 'xauth list' to use the same 10000ms timeout as the other xauth commands.\n\n - Fix issue in gres code to handle a gres cnt of 0.\n\n - Don't purge jobs if backfill is running.\n\n - Verify job is pending add/removing accrual time.\n\n - Don't abort when the job doesn't have an association that was removed before the job was able to make it to the database.\n\n - Set state_reason if select_nodes() fails job for QOS or Account.\n\n - Avoid seg_fault on referencing association without a valid_qos bitmap.\n\n - If Association/QOS is removed on a pending job set that job as ineligible.\n\n - When changing a jobs account/qos always make sure you remove the old limits.\n\n - Don't reset a FAIL_QOS or FAIL_ACCOUNT job reason until the qos or account changed.\n\n - Restore 'sreport -T ALL' functionality.\n\n - Correctly typecast signals being sent through the api.\n\n - Properly initialize structures throughout Slurm.\n\n - Sync 'numtask' squeue format option for jobs and steps to 'numtasks'.\n\n - Fix sacct -PD to avoid CA before start jobs.\n\n - Fix potential deadlock with backup slurmctld.\n\n - Fixed issue with jobs not appearing in sacct after dependency satisfied.\n\n - Fix showing non-eligible jobs when asking with -j and not -s.\n\n - Fix issue with backfill scheduler scheduling tasks of an array when not the head job.\n\n - accounting_storage/mysql - fix SIGABRT in the archive load logic.\n\n - accounting_storage/mysql - fix memory leak in the archive load logic.\n\n - Limit records per single SQL statement when loading archived data.\n\n - Fix unnecessary reloading of job submit plugins.\n\n - Allow job submit plugins to be turned on/off with a reconfigure.\n\n - Fix segfault when loading/unloading Lua job submit plugin multiple times.\n\n - Fix printing duplicate error messages of jobs rejected by job submit plugin.\n\n - Fix printing of job submit plugin messages of het jobs without pack id.\n\n - Fix memory leak in group_cache.c\n\n - Fix jobs stuck from FedJobLock when requeueing in a federation\n\n - Fix requeueing job in a federation of clusters with differing associations\n\n - sacctmgr - free memory before exiting in 'sacctmgr show runaway'.\n\n - Fix seff showing memory overflow when steps tres mem usage is 0.\n\n - Upon archive file name collision, create new archive file instead of overwriting the old one to prevent lost records.\n\n - Limit archive files to 50000 records per file so that archiving large databases will succeed.\n\n - Remove stray newlines in SPANK plugin error messages.\n\n - Fix archive loading events.\n\n - In select/cons_res: Only allocate 1 CPU per node with the --overcommit and --nodelist options.\n\n - Fix main scheduler from potentially not running through whole queue.\n\n - cons_res/job_test - prevent a job from overallocating a node memory.\n\n - cons_res/job_test - fix to consider a node's current allocated memory when testing a job's memory request.\n\n - Fix issue where multi-node job steps on cloud nodes wouldn't finish cleaning up until the end of the job (rather than the end of the step).\n\n - Fix issue with a 17.11 sbcast call to a 18.08 daemon.\n\n - Add new job bit_flags of JOB_DEPENDENT.\n\n - Make it so dependent jobs reset the AccrueTime and do not count against any AccrueTime limits.\n\n - Fix sacctmgr --parsable2 output for reservations and tres.\n\n - Prevent slurmctld from potential segfault after job_start_data() called for completing job.\n\n - Fix jobs getting on nodes with 'scontrol reboot asap'.\n\n - Record node reboot events to database.\n\n - Fix node reboot failure message getting to event table.\n\n - Don't write '(null)' to event table when no event reason exists.\n\n - Fix minor memory leak when clearing runaway jobs.\n\n - Avoid flooding slurmctld and logging when prolog complete RPC errors occur.\n\n - Fix GCC 9 compiler warnings.\n\n - Fix seff human readable memory string for values below a megabyte.\n\n - Fix dump/load of rejected heterogeneous jobs.\n\n - For heterogeneous jobs, do not count the each component against the QOS or association job limit multiple times.\n\n - slurmdbd - avoid reservation flag column corruption with the use of newer flags, instead preserve the older flag fields that we can still fit in the smallint field, and discard the rest.\n\n - Fix security issue in accounting_storage/mysql plugin on archive file loads by always escaping strings within the slurmdbd. CVE-2019-12838.\n\n - Fix underflow causing decay thread to exit.\n\n - Fix main scheduler not considering hetjobs when building the job queue.\n\n - Fix regression for sacct to display old jobs without a start time.\n\n - Fix setting correct number of gres topology bits.\n\n - Update hetjobs pending state reason when appropriate.\n\n - Fix accounting_storage/filetxt's understanding of TRES.\n\n - Set Accrue time when not enforcing limits.\n\n - Fix srun segfault when requesting a hetjob with test_exec or bcast options.\n\n - Hide multipart priorities log message behind Priority debug flag.\n\n - sched/backfill - Make hetjobs sensitive to bf_max_job_start.\n\n - Fix slurmctld segfault due to job's partition pointer NULL dereference.\n\n - Fix issue with OR'ed job dependencies.\n\n - Add new job's bit_flags of INVALID_DEPEND to prevent rebuilding a job's dependency string when it has at least one invalid and purged dependency.\n\n - Promote federation unsynced siblings log message from debug to info.\n\n - burst_buffer/cray - fix slurmctld SIGABRT due to illegal read/writes.\n\n - burst_buffer/cray - fix memory leak due to unfreed job script content.\n\n - node_features/knl_cray - fix script_argv use-after-free.\n\n - burst_buffer/cray - fix script_argv use-after-free.\n\n - Fix invalid reads of size 1 due to non null-terminated string reads.\n\n - Add extra debug2 logs to identify why BadConstraints reason is set.\n\nDo not build hdf5 support where not available.\n\nAdd support for version updates on SLE: Update packages to a later version than the version supported originally on SLE will receive a version string in their package name.\n\nadded the hdf5 job data gathering plugin\n\nAdd backward compatibility with SLE-11 SP4\n\nUpdate to version 18.08.05 :\n\n - Add mitigation for a potential heap overflow on 32-bit systems in xmalloc. (CVE-2019-6438, bsc#1123304)\n\nFix fallout from 750cc23ed for CVE-2019-6438.\n\nUpdate to 18.08.04, with following highlights\n\n - Fix message sent to user to display preempted instead of time limit when a job is preempted.\n\n - Fix memory leak when a failure happens processing a nodes gres config.\n\n - Improve error message when failures happen processing a nodes gres config.\n\n - Don't skip jobs in scontrol hold.\n\n - Allow --cpu-bind=verbose to be used with SLURM_HINT environment variable.\n\n - Enhanced handling for runaway jobs\n\n - cons_res: Delay exiting cr_job_test until after cores/cpus are calculated and distributed.\n\n - Don't check existence of srun --prolog or --epilog executables when set to 'none' and SLURM_TEST_EXEC is used.\n\n - Add 'P' suffix support to job and step tres specifications.\n\n - Fix jobacct_gather/cgroup to work correctly when more than one task is started on a node.\n\n - salloc - set SLURM_NTASKS_PER_CORE and SLURM_NTASKS_PER_SOCKET in the environment if the corresponding command line options are used.\n\n - slurmd - fix handling of the -f flag to specify alternate config file locations.\n\n - Add SchedulerParameters option of bf_ignore_newly_avail_nodes to avoid scheduling lower priority jobs on resources that become available during the backfill scheduling cycle when bf_continue is enabled.\n\n - job_submit/lua: Add several slurmctld return codes and add user/group info\n\n - salloc/sbatch/srun - print warning if mutually exclusive options of\n\n --mem and --mem-per-cpu are both set.\n\nrestarting services on update only when activated\n\nadded rotation of logs\n\nAdded backported patches which harden the pam module pam_slurm_adopt.\n(BOO#1116758)\n\nMoved config man pages to a separate package: This way, they won't get installed on compute nodes.\n\nadded correct link flags for perl bindings (bsc#1108671)\n\n - perl:Switch is required by slurm torque wrappers\n\nFix Requires(pre) and Requires(post) for slurm-config and slurm-node.\nThis fixes issues with failing slurm user creation when installed during initial system installation. (bsc#1109373)\n\nWhen using a remote shared StateSaveLocation, slurmctld needs to be started after remote filesystems have become available. Add 'remote-fs.target' to the 'After=' directive in slurmctld.service (bsc#1103561).\n\nUpdate to 17.11.8\n\n - Fix incomplete RESPONSE_[RESOURCE|JOB_PACK]_ALLOCATION building path.\n\n - Do not allocate nodes that were marked down due to the node not responding by ResumeTimeout.\n\n - task/cray plugin - search for 'mems' cgroup information in the file 'cpuset.mems' then fall back to the file 'mems'.\n\n - Fix ipmi profile debug uninitialized variable.\n\n - PMIx: fixed the direct connect inline msg sending.\n\n - MYSQL: Fix issue not handling all fields when loading an archive dump.\n\n - Allow a job_submit plugin to change the admin_comment field during job_submit_plugin_modify().\n\n - job_submit/lua - fix access into reservation table.\n\n - MySQL - Prevent deadlock caused by archive logic locking reads.\n\n - Don't enforce MaxQueryTimeRange when requesting specific jobs.\n\n - Modify --test-only logic to properly support jobs submitted to more than one partition.\n\n - Prevent slurmctld from abort when attempting to set non-existing qos as def_qos_id.\n\n - Add new job dependency type of 'afterburstbuffer'. The pending job will be delayed until the first job completes execution and it's burst buffer stage-out is completed.\n\n - Reorder proctrack/task plugin load in the slurmstepd to match that of slurmd and avoid race condition calling task before proctrack can introduce.\n\n - Prevent reboot of a busy KNL node when requesting inactive features.\n\n - Revert to previous behavior when requesting memory per cpu/node introduced in 17.11.7.\n\n - Fix to reinitialize previously adjusted job members to their original value when validating the job memory in multi-partition requests.\n\n - Fix _step_signal() from always returning SLURM_SUCCESS.\n\n - Combine active and available node feature change logs on one line rather than one line per node for performance reasons.\n\n - Prevent occasionally leaking freezer cgroups.\n\n - Fix potential segfault when closing the mpi/pmi2 plugin.\n\n - Fix issues with --exclusive=[user|mcs] to work correctly with preemption or when job requests a specific list of hosts.\n\n - Make code compile with hdf5 1.10.2+\n\n - mpi/pmix: Fixed the collectives canceling.\n\n - SlurmDBD: improve error message handling on archive load failure.\n\n - Fix incorrect locking when deleting reservations.\n\n - Fix incorrect locking when setting up the power save module.\n\n - Fix setting format output length for squeue when showing array jobs.\n\n - Add xstrstr function.\n\n - Fix printing out of --hint options in sbatch, salloc\n --help.\n\n - Prevent possible divide by zero in\n _validate_time_limit().\n\n - Add Delegate=yes to the slurmd.service file to prevent systemd from interfering with the jobs' cgroup hierarchies.\n\n - Change the backlog argument to the listen() syscall within srun to 4096 to match elsewhere in the code, and avoid communication problems at scale.\n\n Fix race in the slurmctld backup controller which prevents it to clean up allocations on nodes properly after failing over (bsc#1084917). Handled %license in a backward compatible manner.\n\nAdd a 'Recommends: slurm-munge' to slurm-slurmdbd.\n\nShield comments between script snippets with a %{!?nil:...} to avoid them being interpreted as scripts - in which case the update level is passed as argument (see chapter 'Shared libraries' in:\nhttps://en.opensuse.org/openSUSE:Packaging_scriptlet_snippets) (bsc#1100850).\n\nUpdate from 17.11.5 to 17.11.7\n\nFix security issue in handling of username and gid fields CVE-2018-10995 and bsc#1095508 what implied an update from 17.11.5 to 17.11.7 Highlights of 17.11.6 :\n\n - CRAY - Add slurmsmwd to the contribs/cray dir\n\n - PMIX - Added the direct connect authentication.\n\n - Prevent the backup slurmctld from losing the active/available node features list on takeover.\n\n - Be able to force power_down of cloud node even if in power_save state.\n\n - Allow cloud nodes to be recognized in Slurm when booted out of band.\n\n - Numerous fixes - check 'NEWS' file. Highlights of 17.11.7 :\n\n - Notify srun and ctld when unkillable stepd exits.\n\n - Numerous fixes - check 'NEWS' file.\n\n - Fixes daemoniziation in newly introduced slurmsmwd daemon.\n\nRename :\n\n - remain in sync with commit messages which introduced that file\n\nAvoid running pretrans scripts when running in an instsys: there may be not much installed, yet. pretrans code should be done in lua, this way, it will be executed by the rpm-internal lua interpreter and not be passed to a shell which may not be around at the time this scriptlet is run (bsc#1090292).\n\nAdd requires for slurm-sql to the slurmdbd package.\n\nPackage READMEs for pam and pam_slurm_adopt.\n\nUse the new %%license directive for COPYING file. Fix interaction with systemd: systemd expects that a daemonizing process doesn't go away until the PID file with it PID of the daemon has bee written (bsc#1084125).\n\nMake sure systemd services get restarted only when all packages are in a consistent state, not in the middle of an 'update' transaction (bsc#1088693). Since the %postun scripts that run on update are from the old package they cannot be changed - thus we work around the restart breakage.\n\nfixed wrong log file location in slurmdbd.conf and fixed pid location for slurmdbd and made slurm-slurmdbd depend on slurm config which provides the dir /var/run/slurm (bsc#1086859).\n\nadded comment for (bsc#1085606)\n\nFix security issue in accounting_storage/mysql plugin by always escaping strings within the slurmdbd. CVE-2018-7033 (bsc#1085240).\n\nUpdate slurm to v17.11.5 (FATE#325451) Highlights of 17.11 :\n\n - Support for federated clusters to manage a single work-flow across a set of clusters.\n\n - Support for heterogeneous job allocations (various processor types, memory sizes, etc. by job component).\n Support for heterogeneous job steps within a single MPI_COMM_WORLD is not yet supported for most configurations.\n\n - X11 support is now fully integrated with the main Slurm code. Remove any X11 plugin configured in your plugstack.conf file to avoid errors being logged about conflicting options.\n\n - Added new advanced reservation flag of 'flex', which permits jobs requesting the reservation to begin prior to the reservation's start time and use resources inside or outside of the reservation. A typical use case is to prevent jobs not explicitly requesting the reservation from using those reserved resources rather than forcing jobs requesting the reservation to use those resources in the time frame reserved.\n\n - The sprio command has been modified to report a job's priority information for every partition the job has been submitted to.\n\n - Group ID lookup performed at job submit time to avoid lookup on all compute nodes. Enable with PrologFlags=SendGIDs configuration parameter.\n\n - Slurm commands and daemons dynamically link to libslurmfull.so instead of statically linking. This dramatically reduces the footprint of Slurm.\n\n - In switch plugin, added plugin_id symbol to plugins and wrapped switch_jobinfo_t with dynamic_plugin_data_t in interface calls in order to pass switch information between clusters with different switch types.\n\n - Changed default ProctrackType to cgroup.\n\n - Changed default sched_min_interval from 0 to 2 microseconds.\n\n - Added new 'scontrol write batch_script ' command to fetch a job's batch script. Removed the ability to see the script as part of the 'scontrol -dd show job' command.\n\n - Add new 'billing' TRES which allows jobs to be limited based on the job's billable TRES calculated by the job's partition's TRESBillingWeights.\n\n - Regular user use of 'scontrol top' command is now disabled. Use the configuration parameter 'SchedulerParameters=enable_user_top' to enable that functionality. The configuration parameter 'SchedulerParameters=disable_user_top' will be silently ignored.\n\n - Change default to let pending jobs run outside of reservation after reservation is gone to put jobs in held state. Added NO_HOLD_JOBS_AFTER_END reservation flag to use old default. Support for PMIx v2.0 as well as UCX support.\n\n - Remove plugins for obsolete MPI stacks :\n\n - lam\n\n - mpich1_p4\n\n - mpich1_shmem\n\n - mvapich\n\n - Numerous fixes - check 'NEWS' file. Replaced by sed script.\n\nFix some rpmlint warnings.\n\nmoved config files to slurm-config package (FATE#324574).\n\nMoved slurmstepd and man page into slurm-node due to slurmd dependency\n\nMoved config files into slurm-node\n\nMoved slurmd rc scripts into slurm-node\n\nMade slurm-munge require slurm-plugins instead of slurm itself\n\n - slurm-node suggested slurm-munge, causing the whole slurm to be installed. The slurm-plugins seems to be a more base class (FATE#324574).\n\nsplit up light wight slurm-node package for deployment on nodes (FATE#324574).\n\nPackage so-versioned libs separately. libslurm is expected to change more frequently and thus is packaged separately from libpmi.\n\nUpdated to 17.02.9 to fix CVE-2017-15566 (bsc#1065697). Changes in 17.0.9\n\n - When resuming powered down nodes, mark DOWN nodes right after ResumeTimeout has been reached (previous logic would wait about one minute longer).\n\n - Fix sreport not showing full column name for TRES Count.\n\n - Fix slurmdb_reservations_get() giving wrong usage data when job's spanned reservation that was modified.\n\n - Fix sreport reservation utilization report showing bad data.\n\n - Show all TRES' on a reservation in sreport reservation utilization report by default.\n\n - Fix sacctmgr show reservation handling 'end' parameter.\n\n - Work around issue with sysmacros.h and gcc7 / glibc 2.25.\n\n - Fix layouts code to only allow setting a boolean.\n\n - Fix sbatch --wait to keep waiting even if a message timeout occurs.\n\n - CRAY - If configured with NodeFeatures=knl_cray and there are non-KNL nodes which include no features the slurmctld will abort without this patch when attemping strtok_r(NULL).\n\n - Fix regression in 17.02.7 which would run the spank_task_privileged as part of the slurmstepd instead of it's child process.\n\n - Fix security issue in Prolog and Epilog by always prepending SPANK_ to all user-set environment variables.\n CVE-2017-15566. Changes in 17.0.8 :\n\n - Add 'slurmdbd:' to the accounting plugin to notify message is from dbd instead of local.\n\n - mpi/mvapich - Buffer being only partially cleared. No failures observed.\n\n - Fix for job --switch option on dragonfly network.\n\n - In salloc with --uid option, drop supplementary groups before changing UID.\n\n - jobcomp/elasticsearch - strip any trailing slashes from JobCompLoc.\n\n - jobcomp/elasticsearch - fix memory leak when transferring generated buffer.\n\n - Prevent slurmstepd ABRT when parsing gres.conf CPUs.\n\n - Fix sbatch --signal to signal all MPI ranks in a step instead of just those on node 0.\n\n - Check multiple partition limits when scheduling a job that were previously only checked on submit.\n\n - Cray: Avoid running application/step Node Health Check on the external job step.\n\n - Optimization enhancements for partition based job preemption.\n\n - Address some build warnings from GCC 7.1, and one possible memory leak if /proc is inaccessible.\n\n - If creating/altering a core based reservation with scontrol/sview on a remote cluster correctly determine the select type.\n\n - Fix autoconf test for libcurl when clang is used.\n\n - Fix default location for cgroup_allowed_devices_file.conf to use correct default path.\n\n - Document NewName option to sacctmgr.\n\n - Reject a second PMI2_Init call within a single step to prevent slurmstepd from hanging.\n\n - Handle old 32bit values stored in the database for requested memory correctly in sacct.\n\n - Fix memory leaks in the task/cgroup plugin when constraining devices.\n\n - Make extremely verbose info messages debug2 messages in the task/cgroup plugin when constraining devices.\n\n - Fix issue that would deny the stepd access to /dev/null where GRES has a 'type' but no file defined.\n\n - Fix issue where the slurmstepd would fatal on job launch if you have no gres listed in your slurm.conf but some in gres.conf.\n\n - Fix validating time spec to correctly validate various time formats.\n\n - Make scontrol work correctly with job update timelimit [+|-]=.\n\n - Reduce the visibily of a number of warnings in\n _part_access_check.\n\n - Prevent segfault in sacctmgr if no association name is specified for an update command.\n\n - burst_buffer/cray plugin modified to work with changes in Cray UP05 software release.\n\n - Fix job reasons for jobs that are violating assoc MaxTRESPerNode limits.\n\n - Fix segfault when unpacking a 16.05 slurm_cred in a 17.02 daemon.\n\n - Fix setting TRES limits with case insensitive TRES names.\n\n - Add alias for xstrncmp() -- slurm_xstrncmp().\n\n - Fix sorting of case insensitive strings when using xstrcasecmp().\n\n - Gracefully handle race condition when reading /proc as process exits.\n\n - Avoid error on Cray duplicate setup of core specialization.\n\n - Skip over undefined (hidden in Slurm) nodes in pbsnodes.\n\n - Add empty hashes in perl api's slurm_load_node() for hidden nodes.\n\n - CRAY - Add rpath logic to work for the alpscomm libs.\n\n - Fixes for administrator extended TimeLimit (job reason & time limit reset).\n\n - Fix gres selection on systems running select/linear.\n\n - sview: Added window decorator for maximize,minimize,close buttons for all systems.\n\n - squeue: interpret negative length format specifiers as a request to delimit values with spaces.\n\n - Fix the torque pbsnodes wrapper script to parse a gres field with a type set correctly.\n\nFixed ABI version of libslurm.\n\nTrim redundant wording in descriptions.\n\nUpdated to slurm 17-02-7-1\n\n - Added python as BuildRequires\n\n - Removed sched-wiki package\n\n - Removed slurmdb-direct package\n\n - Obsoleted sched-wiki and slurmdb-direct packages\n\n - Removing Cray-specific files\n\n - Added /etc/slurm/layout.d files (new for this version)\n\n - Remove /etc/slurm/cgroup files from package\n\n - Added lib/slurm/mcs_account.so\n\n - Removed lib/slurm/jobacct_gather_aix.so\n\n - Removed lib/slurm/job_submit_cnode.so\n\nCreated slurm-sql package\n\nMoved files from slurm-plugins to slurm-torque package\n\nMoved creation of /usr/lib/tmpfiles.d/slurm.conf into slurm.spec\n\n - Removed tmpfiles.d-slurm.conf\n\nChanged /var/run path for slurm daemons to /var/run/slurm (FATE#324026).\n\nMade tmpfiles_create post-install macro SLE12 SP2 or greater\n\nDirectly calling systemd-tmpfiles --create for before SLE12 SP2\n\nAllows OpenSUSE Factory build as well\n\nRemoves unused .service files from project\n\nAdds /var/run/slurm to /usr/lib/tmpfiles.d for boottime creation\n\n - Patches upstream .service files to allow for /var/run/slurm path\n\n - Modifies slurm.conf to allow for /var/run/slurm path\n\nMove wrapper script mpiexec provided by slrum-torque to mpiexec.slurm to avoid conflicts. This file is normally provided by the MPI implementation (bsc#1041706).\n\nReplace remaining ${RPM_BUILD_ROOT}s.\n\nImprove description.\n\nFix up changelog.\n\nSpec file: Replace 'Requires : slurm-perlapi' by 'Requires: perl-slurm = %{version}' (bsc#1031872).\n\nTrim redundant parts of description. Fixup RPM groups.\n\nReplace unnecessary %__ macro indirections; replace historic $RPM_* variables by macros.\n\nUse %slurm_u and %slurm_g macros defined at the beginning of the spec file when adding the slurm user/group for consistency.\n\nDefine these macros to daemon,root for non-systemd.\n\nFor anything newer than Leap 42.1 or SLE-12-SP1 build OpenHPC compatible.\n\nUpdated to 16.05.8.1\n\n - Remove StoragePass from being printed out in the slurmdbd log at debug2 level.\n\n - Defer PATH search for task program until launch in slurmstepd.\n\n - Modify regression test1.89 to avoid leaving vestigial job. Also reduce logging to reduce likelyhood of Expect buffer overflow.\n\n - Do not PATH search for mult-prog launches if LaunchParamters=test_exec is enabled.\n\n - Fix for possible infinite loop in select/cons_res plugin when trying to satisfy a job's ntasks_per_core or socket specification.\n\n - If job is held for bad constraints make it so once updated the job doesn't go into JobAdminHeld.\n\n - sched/backfill - Fix logic to reserve resources for jobs that require a node reboot (i.e. to change KNL mode) in order to start.\n\n - When unpacking a node or front_end record from state and the protocol version is lower than the min version, set it to the min.\n\n - Remove redundant lookup for part_ptr when updating a reservation's nodes.\n\n - Fix memory and file descriptor leaks in slurmd daemon's sbcast logic.\n\n - Do not allocate specialized cores to jobs using the\n --exclusive option.\n\n - Cancel interactive job if Prolog failure with 'PrologFlags=contain' or 'PrologFlags=alloc' configured.\n Send new error prolog failure message to the salloc or srun command as needed.\n\n - Prevent possible out-of-bounds read in slurmstepd on an invalid #! line.\n\n - Fix check for PluginDir within slurmctld to work with multiple directories.\n\n - Cancel interactive jobs automatically on communication error to launching srun/salloc process.\n\n - Fix security issue caused by insecure file path handling triggered by the failure of a Prolog script. To exploit this a user needs to anticipate or cause the Prolog to fail for their job. CVE-2016-10030 (bsc#1018371).\n\nReplace group/user add macros with function calls.\n\nFix array initialzation and ensure strings are always NULL terminated in\n\npam_slurm.c (bsc#1007053).\n\nDisable building with netloc support: the netloc API is part of the devel branch of hwloc. Since this devel branch was included accidentally and has been reversed since, we need to disable this for the time being.\n\nConditionalized architecture specific pieces to support non-x86 architectures better.\n\nRemove: unneeded 'BuildRequires: python'\n\nAdd: BuildRequires: freeipmi-devel BuildRequires: libibmad-devel BuildRequires: libibumad-devel so they are picked up by the slurm build.\n\nEnable modifications from openHPC Project.\n\nEnable lua API package build.\n\nAdd a recommends for slurm-munge to the slurm package: This is way, the munge auth method is available and slurm works out of the box.\n\nCreate /var/lib/slurm as StateSaveLocation directory. /tmp is dangerous.\n\nCreate slurm user/group in preinstall script.\n\nKeep %{_libdir}/libpmi* and %{_libdir}/mpi_pmi2* on SUSE.\n\nFix build with and without OHCP_BUILD define.\n\nFix build for systemd and non-systemd.\n\nUpdated to 16-05-5 - equvalent to OpenHPC 1.2.\n\n - Fix issue with resizing jobs and limits not be kept track of correctly.\n\n - BGQ - Remove redeclaration of job_read_lock.\n\n - BGQ - Tighter locks around structures when nodes/cables change state.\n\n - Make it possible to change CPUsPerTask with scontrol.\n\n - Make it so scontrol update part qos= will take away a partition QOS from a partition.\n\n - Backfill scheduling properly synchronized with Cray Node Health Check. Prior logic could result in highest priority job getting improperly postponed.\n\n - Make it so daemons also support TopologyParam=NoInAddrAny.\n\n - If scancel is operating on large number of jobs and RPC responses from slurmctld daemon are slow then introduce a delay in sending the cancel job requests from scancel in order to reduce load on slurmctld.\n\n - Remove redundant logic when updating a job's task count.\n\n - MySQL - Fix querying jobs with reservations when the id's have rolled.\n\n - Perl - Fix use of uninitialized variable in slurm_job_step_get_pids.\n\n - Launch batch job requsting --reboot after the boot completes.\n\n - Do not attempt to power down a node which has never responded if the slurmctld daemon restarts without state.\n\n - Fix for possible slurmstepd segfault on invalid user ID.\n\n - MySQL - Fix for possible race condition when archiving multiple clusters at the same time.\n\n - Add logic so that slurmstepd can be launched under valgrind.\n\n - Increase buffer size to read /proc/*/stat files.\n\n - Remove the SchedulerParameters option of 'assoc_limit_continue', making it the default value. Add option of 'assoc_limit_stop'. If 'assoc_limit_stop' is set and a job cannot start due to association limits, then do not attempt to initiate any lower priority jobs in that partition. Setting this can decrease system throughput and utlization, but avoid potentially starving larger jobs by preventing them from launching indefinitely.\n\n - Update a node's socket and cores per socket counts as needed after a node boot to reflect configuration changes which can occur on KNL processors. Note that the node's total core count must not change, only the distribution of cores across varying socket counts (KNL NUMA nodes treated as sockets by Slurm).\n\n - Rename partition configuration from 'Shared' to 'OverSubscribe'. Rename salloc, sbatch, srun option from '--shared' to '--oversubscribe'. The old options will continue to function. Output field names also changed in scontrol, sinfo, squeue and sview.\n\n - Add SLURM_UMASK environment variable to user job.\n\n - knl_conf: Added new configuration parameter of CapmcPollFreq.\n\n - Cleanup two minor Coverity warnings.\n\n - Make it so the tres units in a job's formatted string are converted like they are in a step.\n\n - Correct partition's MaxCPUsPerNode enforcement when nodes are shared by multiple partitions.\n\n - node_feature/knl_cray - Prevent slurmctld GRES errors for 'hbm' references.\n\n - Display thread name instead of thread id and remove process name in stderr logging for 'thread_id' LogTimeFormat.\n\n - Log IP address of bad incomming message to slurmctld.\n\n - If a user requests tasks, nodes and ntasks-per-node and tasks-per-node/nodes != tasks print warning and ignore ntasks-per-node.\n\n - Release CPU 'owner' file locks.\n\n - Update seff to fix warnings with ncpus, and list slurm-perlapi dependency in spec file.\n\n - Allow QOS timelimit to override partition timelimit when EnforcePartLimits is set to all/any.\n\n - Make it so qsub will do a 'basename' on a wrapped command for the output and error files.\n\n - Add logic so that slurmstepd can be launched under valgrind.\n\n - Increase buffer size to read /proc/*/stat files.\n\n - Prevent job stuck in configuring state if slurmctld daemon restarted while PrologSlurmctld is running. Also re-issue burst_buffer/pre-load operation as needed.\n\n - Move test for job wait reason value of BurstBufferResources and BurstBufferStageIn later in the scheduling logic.\n\n - Document which srun options apply to only job, only step, or job and step allocations.\n\n - Use more compatible function to get thread name (>= 2.6.11).\n\n - Make it so the extern step uses a reverse tree when cleaning up.\n\n - If extern step doesn't get added into the proctrack plugin make sure the sleep is killed.\n\n - Add web links to Slurm Diamond Collectors (from Harvard University) and collectd (from EDF).\n\n - Add job_submit plugin for the 'reboot' field.\n\n - Make some more Slurm constants (INFINITE, NO_VAL64, etc.) available to job_submit/lua plugins.\n\n - Send in a -1 for a taskid into spank_task_post_fork for the extern_step.\n\n - MYSQL - Sightly better logic if a job completion comes in with an end time of 0.\n\n - task/cgroup plugin is configured with ConstrainRAMSpace=yes, then set soft memory limit to allocated memory limit (previously no soft limit was set).\n\n - Streamline when schedule() is called when running with message aggregation on batch script completes.\n\n - Fix incorrect casting when [un]packing derived_ec on slurmdb_job_rec_t.\n\n - Document that persistent burst buffers can not be created or destroyed using the salloc or srun --bb options.\n\n - Add support for setting the SLURM_JOB_ACCOUNT, SLURM_JOB_QOS and SLURM_JOB_RESERVAION environment variables are set for the salloc command. Document the same environment variables for the salloc, sbatch and srun commands in their man pages.\n\n - Fix issue where sacctmgr load cluster.cfg wouldn't load associations that had a partition in them.\n\n - Don't return the extern step from sstat by default.\n\n - In sstat print 'extern' instead of 4294967295 for the extern step.\n\n - Make advanced reservations work properly with core specialization.\n\n - slurmstepd modified to pre-load all relevant plugins at startup to avoid the possibility of modified plugins later resulting in inconsistent API or data structures and a failure of slurmstepd.\n\n - Export functions from parse_time.c in libslurm.so.\n\n - Export unit convert functions from slurm_protocol_api.c in libslurm.so.\n\n - Fix scancel to allow multiple steps from a job to be cancelled at once.\n\n - Update and expand upgrade guide (in Quick Start Administrator web page).\n\n - burst_buffer/cray: Requeue, but do not hold a job which fails the pre_run operation.\n\n - Insure reported expected job start time is not in the past for pending jobs.\n\n - Add support for PMIx v2. Required for FATE#316379.\n\nSetting 'download_files' service to mode='localonly' and adding source tarball. (Required for Factory).\n\nversion 15.08.7.1\n\n - Remove the 1024-character limit on lines in batch scripts. task/affinity: Disable core-level task binding if more CPUs required than available cores.\n\n - Preemption/gang scheduling: If a job is suspended at slurmctld restart or reconfiguration time, then leave it suspended rather than resume+suspend.\n\n - Don't use lower weight nodes for job allocation when topology/tree used.\n\n - Don't allow user specified reservation names to disrupt the normal reservation sequeuece numbering scheme.\n\n - Avoid hard-link/copy of script/environment files for job arrays. Use the master job record file for all tasks of the job array. NOTE: Job arrays submitted to Slurm version 15.08.6 or later will fail if the slurmctld daemon is downgraded to an earlier version of Slurm.\n\n - In slurmctld log file, log duplicate job ID found by slurmd. Previously was being logged as prolog/epilog failure.\n\n - If a job is requeued while in the process of being launch, remove it's job ID from slurmd's record of active jobs in order to avoid generating a duplicate job ID error when launched for the second time (which would drain the node).\n\n - Cleanup messages when handling job script and environment variables in older directory structure formats.\n\n - Prevent triggering gang scheduling within a partition if configured with PreemptType=partition_prio and PreemptMode=suspend,gang.\n\n - Decrease parallelism in job cancel request to prevent denial of service when cancelling huge numbers of jobs.\n\n - If all ephemeral ports are in use, try using other port numbers.\n\n - Prevent 'scontrol update job' from updating jobs that have already finished.\n\n - Show requested TRES in 'squeue -O tres' when job is pending.\n\n - Backfill scheduler: Test association and QOS node limits before reserving resources for pending job.\n\n - Many bug fixes.\n\nUse source services to download package.\n\nFix code for new API of hwloc-2.0.\n\npackage netloc_to_topology where avialable.\n\nPackage documentation.\n\nversion 15.08.3\n\n - Many new features and bug fixes. See NEWS file\n\nupdate files list accordingly\n\nfix wrong end of line in some files\n\nversion 14.11.8\n\n - Many bug fixes. See NEWS file\n\nupdate files list accordingly\n\nadd missing systemd requirements\n\nadd missing rclink\n\nversion 14.03.9\n\n - Many bug fixes. See NEWS file\n\nadd systemd support\n\nversion 14.03.6\n\n - Added support for native Slurm operation on Cray systems (without ALPS).\n\n - Added partition configuration parameters AllowAccounts, AllowQOS, DenyAccounts and DenyQOS to provide greater control over use.\n\n - Added the ability to perform load based scheduling.\n Allocating resources to jobs on the nodes with the largest number if idle CPUs.\n\n - Added support for reserving cores on a compute node for system services (core specialization)\n\n - Add mechanism for job_submit plugin to generate error message for srun, salloc or sbatch to stderr.\n\n - Support for Postgres database has long since been out of date and problematic, so it has been removed entirely.\n If you would like to use it the code still exists in <= 2.6, but will not be included in this and future versions of the code.\n\n - Added new structures and support for both server and cluster resources.\n\n - Significant performance improvements, especially with respect to job array support.\n\nupdate files list\n\nupdate to version 2.6.7\n\n - Support for job arrays, which increases performance and ease of use for sets of similar jobs.\n\n - Job profiling capability added to record a wide variety of job characteristics for each task on a user configurable periodic basis. Data currently available includes CPU use, memory use, energy use, Infiniband network use, Lustre file system use, etc.\n\n - Support for MPICH2 using PMI2 communications interface with much greater scalability.\n\n - Prolog and epilog support for advanced reservations.\n\n - Much faster throughput for job step execution with\n --exclusive option. The srun process is notified when resources become available rather than periodic polling.\n\n - Support improved for Intel MIC (Many Integrated Core) processor.\n\n - Advanced reservations with hostname and core counts now supports asymmetric reservations (e.g. specific different core count for each node).\n\n - External sensor plugin infrastructure added to record power consumption, temperature, etc.\n\n - Improved performance for high-throughput computing.\n\n - MapReduce+ support (launches ~1000x faster, runs ~10x faster).\n\n - Added 'MaxCPUsPerNode' partition configuration parameter. This can be especially useful to schedule GPUs. For example a node can be associated with two Slurm partitions (e.g. 'cpu' and 'gpu') and the partition/queue 'cpu' could be limited to only a subset of the node's CPUs, insuring that one or more CPUs would be available to jobs in the 'gpu' partition/queue.\n\nversion 2.5.7\n\n - Fix for linking to the select/cray plugin to not give warning about undefined variable.\n\n - Add missing symbols to the xlator.h\n\n - Avoid placing pending jobs in AdminHold state due to backfill scheduler interactions with advanced reservation.\n\n - Accounting - make average by task not cpu.\n\n - POE - Correct logic to support poe option '-euidevice sn_all' and '-euidevice sn_single'.\n\n - Accounting - Fix minor initialization error.\n\n - POE - Correct logic to support srun network instances count with POE.\n\n - POE - With the srun --launch-cmd option, report proper task count when the --cpus-per-task option is used without the\n\n --ntasks option.\n\n - POE - Fix logic binding tasks to CPUs.\n\n - sview - Fix race condition where new information could of slipped past the node tab and we didn't notice.\n\n - Accounting - Fix an invalid memory read when slurmctld sends data about start job to slurmdbd.\n\n - If a prolog or epilog failure occurs, drain the node rather than setting it down and killing all of its jobs.\n\n - Priority/multifactor - Avoid underflow in half-life calculation.\n\n - POE - pack missing variable to allow fanout (more than 32 nodes)\n\n - Prevent clearing reason field for pending jobs. This bug was introduced in v2.5.5 (see 'Reject job at submit time ...').\n\n - BGQ - Fix issue with preemption on sub-block jobs where a job would kill all preemptable jobs on the midplane instead of just the ones it needed to.\n\n - switch/nrt - Validate dynamic window allocation size.\n\n - BGQ - When --geo is requested do not impose the default conn_types.\n\n - RebootNode logic - Defers (rather than forgets) reboot request with job running on the node within a reservation.\n\n - switch/nrt - Correct network_id use logic. Correct support for user sn_all and sn_single options.\n\n - sched/backfill - Modify logic to reduce overhead under heavy load.\n\n - Fix job step allocation with --exclusive and --hostlist option.\n\n - Select/cons_res - Fix bug resulting in error of 'cons_res: sync loop not progressing, holding job #'\n\n - checkpoint/blcr - Reset max_nodes from zero to NO_VAL on job restart.\n\n - launch/poe - Fix for hostlist file support with repeated host names.\n\n - priority/multifactor2 - Prevent possible divide by zero.\n\n -- srun - Don't check for executable if --test-only flag is used.\n\n - energy - On a single node only use the last task for gathering energy. Since we don't currently track energy usage per task (only per step). Otherwise we get double the energy.\n\nversion 2.5.4\n\n - Support for Intel® Many Integrated Core (MIC) processors.\n\n - User control over CPU frequency of each job step.\n\n - Recording power usage information for each job.\n\n - Advanced reservation of cores rather than whole nodes.\n\n - Integration with IBM's Parallel Environment including POE (Parallel Operating Environment) and NRT (Network Resource Table) API.\n\n - Highly optimized throughput for serial jobs in a new 'select/serial' plugin.\n\n - CPU load is information available\n\n - Configurable number of CPUs available to jobs in each SLURM partition, which provides a mechanism to reserve CPUs for use with GPUs.\n\nremore runlevel 4 from init script thanks to patch1\n\nfix self obsoletion of slurm-munge package\n\nuse fdupes to remove duplicates\n\nspec file reformaing\n\nput perl macro in a better within install section\n\nenable numa on x86_64 arch only\n\nadd numa and hwloc support\n\nfix perl module files list\n\nuse perl_process_packlist macro for the perl files cleanup\n\nfix some summaries length\n\nadd cgoups directory and example the cgroup.release_common file\n\nspec file cleanup\n\nfirst package\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2021-03-15T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : slurm_20_11 / pdsh (SUSE-SU-2021:0773-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-10030", "CVE-2017-15566", "CVE-2018-10995", "CVE-2018-7033", "CVE-2019-12838", "CVE-2019-19727", "CVE-2019-19728", "CVE-2019-6438", "CVE-2020-12693", "CVE-2020-27745", "CVE-2020-27746"], "modified": "2022-05-10T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:libnss_slurm2_20_11", "p-cpe:/a:novell:suse_linux:libnss_slurm2_20_11-debuginfo", "p-cpe:/a:novell:suse_linux:libpmi0_20_11", "p-cpe:/a:novell:suse_linux:libpmi0_20_11-debuginfo", "p-cpe:/a:novell:suse_linux:libslurm36", "p-cpe:/a:novell:suse_linux:libslurm36-debuginfo", "p-cpe:/a:novell:suse_linux:pdsh", "p-cpe:/a:novell:suse_linux:pdsh-debuginfo", "p-cpe:/a:novell:suse_linux:pdsh-debugsource", "p-cpe:/a:novell:suse_linux:pdsh-dshgroup", "p-cpe:/a:novell:suse_linux:pdsh-dshgroup-debuginfo", "p-cpe:/a:novell:suse_linux:pdsh-genders", "p-cpe:/a:novell:suse_linux:pdsh-genders-debuginfo", "p-cpe:/a:novell:suse_linux:pdsh-machines", "p-cpe:/a:novell:suse_linux:pdsh-machines-debuginfo", "p-cpe:/a:novell:suse_linux:pdsh-netgroup", "p-cpe:/a:novell:suse_linux:pdsh-netgroup-debuginfo", "p-cpe:/a:novell:suse_linux:pdsh-slurm", "p-cpe:/a:novell:suse_linux:pdsh-slurm-debuginfo", "p-cpe:/a:novell:suse_linux:pdsh-slurm_18_08", "p-cpe:/a:novell:suse_linux:pdsh-slurm_18_08-debuginfo", "p-cpe:/a:novell:suse_linux:pdsh-slurm_20_02", "p-cpe:/a:novell:suse_linux:pdsh-slurm_20_02-debuginfo", "p-cpe:/a:novell:suse_linux:pdsh-slurm_20_11", "p-cpe:/a:novell:suse_linux:pdsh-slurm_20_11-debuginfo", "p-cpe:/a:novell:suse_linux:pdsh_slurm_18_08-debugsource", "p-cpe:/a:novell:suse_linux:pdsh_slurm_20_02-debugsource", "p-cpe:/a:novell:suse_linux:pdsh_slurm_20_11-debugsource", "p-cpe:/a:novell:suse_linux:perl-slurm_20_11", "p-cpe:/a:novell:suse_linux:perl-slurm_20_11-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_20_11", "p-cpe:/a:novell:suse_linux:slurm_20_11-auth-none", "p-cpe:/a:novell:suse_linux:slurm_20_11-auth-none-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_20_11-config", "p-cpe:/a:novell:suse_linux:slurm_20_11-config-man", "p-cpe:/a:novell:suse_linux:slurm_20_11-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_20_11-debugsource", "p-cpe:/a:novell:suse_linux:slurm_20_11-devel", "p-cpe:/a:novell:suse_linux:slurm_20_11-doc", "p-cpe:/a:novell:suse_linux:slurm_20_11-lua", "p-cpe:/a:novell:suse_linux:slurm_20_11-lua-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_20_11-munge", "p-cpe:/a:novell:suse_linux:slurm_20_11-munge-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_20_11-node", "p-cpe:/a:novell:suse_linux:slurm_20_11-node-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_20_11-pam_slurm", "p-cpe:/a:novell:suse_linux:slurm_20_11-pam_slurm-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_20_11-plugins", "p-cpe:/a:novell:suse_linux:slurm_20_11-plugins-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_20_11-slurmdbd", "p-cpe:/a:novell:suse_linux:slurm_20_11-slurmdbd-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_20_11-sql", "p-cpe:/a:novell:suse_linux:slurm_20_11-sql-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_20_11-sview", "p-cpe:/a:novell:suse_linux:slurm_20_11-sview-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_20_11-torque", "p-cpe:/a:novell:suse_linux:slurm_20_11-torque-debuginfo", "p-cpe:/a:novell:suse_linux:slurm_20_11-webdoc", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2021-0773-1.NASL", "href": "https://www.tenable.com/plugins/nessus/147801", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2021:0773-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(147801);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/10\");\n\n script_cve_id(\n \"CVE-2016-10030\",\n \"CVE-2017-15566\",\n \"CVE-2018-7033\",\n \"CVE-2018-10995\",\n \"CVE-2019-6438\",\n \"CVE-2019-12838\",\n \"CVE-2019-19727\",\n \"CVE-2019-19728\",\n \"CVE-2020-12693\",\n \"CVE-2020-27745\",\n \"CVE-2020-27746\"\n );\n\n script_name(english:\"SUSE SLES12 Security Update : slurm_20_11 / pdsh (SUSE-SU-2021:0773-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"This update for pdsh fixes the following issues :\n\nPreparing pdsh for Slurm 20.11 (jsc#ECO-2412)\n\nSimplify convoluted condition.\n\nThis update for slurm fixes the following issues :\n\nFix potential buffer overflows from use of unpackmem(). CVE-2020-27745\n(bsc#1178890)\n\nFix potential leak of the magic cookie when sent as an argument to the\nxauth command. CVE-2020-27746 (bsc#1178891)\n\nAdd support for openPMIx also for Leap/SLE 15.0/1 (bsc#1173805).\n\nUpdated to 20.02.3 which fixes CVE-2020-12693 (bsc#1172004).\n\nslurm-plugins will now also require pmix not only libpmix\n(bsc#1164326)\n\nRemoved autopatch as it doesn't work for the SLE-11-SP4 build.\n\nDisable %arm builds as this is no longer supported.\n\npmix searches now also for libpmix.so.2 so that there is no dependency\nfor devel package (bsc#1164386)\n\nUpdate to version 20.02.0 (jsc#SLE-8491)\n\n - Fix minor memory leak in slurmd on reconfig.\n\n - Fix invalid ptr reference when rolling up data in the\n database.\n\n - Change shtml2html.py to require python3 for RHEL8\n support, and match man2html.py.\n\n - slurm.spec - override 'hardening' linker flags to ensure\n RHEL8 builds in a usable manner.\n\n - Fix type mismatches in the perl API.\n\n - Prevent use of uninitialized slurmctld_diag_stats.\n\n - Fixed various Coverity issues.\n\n - Only show warning about root-less topology in daemons.\n\n - Fix accounting of jobs in IGNORE_JOBS reservations.\n\n - Fix issue with batch steps state not loading correctly\n when upgrading from 19.05.\n\n - Deprecate max_depend_depth in SchedulerParameters and\n move it to DependencyParameters.\n\n - Silence erroneous error on slurmctld upgrade when\n loading federation state.\n\n - Break infinite loop in cons_tres dealing with incorrect\n tasks per tres request resulting in slurmctld hang.\n\n - Improve handling of --gpus-per-task to make sure\n appropriate number of GPUs is assigned to job.\n\n - Fix seg fault on cons_res when requesting --spread-job.\n\nMove to python3 for everything but SLE-11-SP4\n\n - For SLE-11-SP4 add a workaround to handle a python3\n script (python2.7 compliant).\n\n - sbatch - fix segfault when no newline at the end of a\n burst buffer file.\n\n - Change scancel to only check job's base state when\n matching -t options.\n\n - Save job dependency list in state files.\n\n - cons_tres - allow jobs to be run on systems with\n root-less topologies.\n\n - Restore pre-20.02pre1 PrologSlurmctld synchonization\n behavior to avoid various race conditions, and ensure\n proper batch job launch.\n\n - Add new slurmrestd command/daemon which implements the\n Slurm REST API.\n\nstandard slurm.conf uses now also SlurmctldHost on all build targets\n(bsc#1162377)\n\nstart slurmdbd after mariadb (bsc#1161716)\n\nUpdate to version 19.05.5 (jsc#SLE-8491)\n\n - Includes security fixes CVE-2019-19727, CVE-2019-19728,\n CVE-2019-12838.\n\n - Disable i586 builds as this is no longer supported.\n\n - Create libnss_slurm package to support user and group\n resolution thru slurmstepd.\n\nUpdate to v18.08.9 for fixing CVE-2019-19728 (bsc#1159692).\n\n - Make Slurm compile on linux after sys/sysctl.h was\n deprecated.\n\n - Install slurmdbd.conf.example with 0600 permissions to\n encourage secure use. CVE-2019-19727.\n\n - srun - do not continue with job launch if --uid fails.\n CVE-2019-19728.\n\nadded pmix support jsc#SLE-10800\n\nUse --with-shared-libslurm to build slurm binaries using libslurm.\n\nMake libslurm depend on slurm-config.\n\nFix ownership of /var/spool/slurm on new installations and upgrade\n(bsc#1158696).\n\nFix permissions of slurmdbd.conf (bsc#1155784, CVE-2019-19727).\n\nFix %posttrans macro _res_update to cope with added newline\n(bsc#1153259).\n\nAdd package slurm-webdoc which sets up a web server to provide the\ndocumentation for the version shipped.\n\nMove srun from 'slurm' to 'slurm-node': srun is required on the nodes\nas well so sbatch will work. 'slurm-node' is a requirement when\n'slurm' is installed (bsc#1153095).\n\nUpdated to 18.08.8 for fixing (CVE-2019-12838, bsc#1140709,\njsc#SLE-7341, jsc#SLE-7342)\n\n - Update 'xauth list' to use the same 10000ms timeout as\n the other xauth commands.\n\n - Fix issue in gres code to handle a gres cnt of 0.\n\n - Don't purge jobs if backfill is running.\n\n - Verify job is pending add/removing accrual time.\n\n - Don't abort when the job doesn't have an association\n that was removed before the job was able to make it to\n the database.\n\n - Set state_reason if select_nodes() fails job for QOS or\n Account.\n\n - Avoid seg_fault on referencing association without a\n valid_qos bitmap.\n\n - If Association/QOS is removed on a pending job set that\n job as ineligible.\n\n - When changing a jobs account/qos always make sure you\n remove the old limits.\n\n - Don't reset a FAIL_QOS or FAIL_ACCOUNT job reason until\n the qos or account changed.\n\n - Restore 'sreport -T ALL' functionality.\n\n - Correctly typecast signals being sent through the api.\n\n - Properly initialize structures throughout Slurm.\n\n - Sync 'numtask' squeue format option for jobs and steps\n to 'numtasks'.\n\n - Fix sacct -PD to avoid CA before start jobs.\n\n - Fix potential deadlock with backup slurmctld.\n\n - Fixed issue with jobs not appearing in sacct after\n dependency satisfied.\n\n - Fix showing non-eligible jobs when asking with -j and\n not -s.\n\n - Fix issue with backfill scheduler scheduling tasks of an\n array when not the head job.\n\n - accounting_storage/mysql - fix SIGABRT in the archive\n load logic.\n\n - accounting_storage/mysql - fix memory leak in the\n archive load logic.\n\n - Limit records per single SQL statement when loading\n archived data.\n\n - Fix unnecessary reloading of job submit plugins.\n\n - Allow job submit plugins to be turned on/off with a\n reconfigure.\n\n - Fix segfault when loading/unloading Lua job submit\n plugin multiple times.\n\n - Fix printing duplicate error messages of jobs rejected\n by job submit plugin.\n\n - Fix printing of job submit plugin messages of het jobs\n without pack id.\n\n - Fix memory leak in group_cache.c\n\n - Fix jobs stuck from FedJobLock when requeueing in a\n federation\n\n - Fix requeueing job in a federation of clusters with\n differing associations\n\n - sacctmgr - free memory before exiting in 'sacctmgr show\n runaway'.\n\n - Fix seff showing memory overflow when steps tres mem\n usage is 0.\n\n - Upon archive file name collision, create new archive\n file instead of overwriting the old one to prevent lost\n records.\n\n - Limit archive files to 50000 records per file so that\n archiving large databases will succeed.\n\n - Remove stray newlines in SPANK plugin error messages.\n\n - Fix archive loading events.\n\n - In select/cons_res: Only allocate 1 CPU per node with\n the --overcommit and --nodelist options.\n\n - Fix main scheduler from potentially not running through\n whole queue.\n\n - cons_res/job_test - prevent a job from overallocating a\n node memory.\n\n - cons_res/job_test - fix to consider a node's current\n allocated memory when testing a job's memory request.\n\n - Fix issue where multi-node job steps on cloud nodes\n wouldn't finish cleaning up until the end of the job\n (rather than the end of the step).\n\n - Fix issue with a 17.11 sbcast call to a 18.08 daemon.\n\n - Add new job bit_flags of JOB_DEPENDENT.\n\n - Make it so dependent jobs reset the AccrueTime and do\n not count against any AccrueTime limits.\n\n - Fix sacctmgr --parsable2 output for reservations and\n tres.\n\n - Prevent slurmctld from potential segfault after\n job_start_data() called for completing job.\n\n - Fix jobs getting on nodes with 'scontrol reboot asap'.\n\n - Record node reboot events to database.\n\n - Fix node reboot failure message getting to event table.\n\n - Don't write '(null)' to event table when no event reason\n exists.\n\n - Fix minor memory leak when clearing runaway jobs.\n\n - Avoid flooding slurmctld and logging when prolog\n complete RPC errors occur.\n\n - Fix GCC 9 compiler warnings.\n\n - Fix seff human readable memory string for values below a\n megabyte.\n\n - Fix dump/load of rejected heterogeneous jobs.\n\n - For heterogeneous jobs, do not count the each component\n against the QOS or association job limit multiple times.\n\n - slurmdbd - avoid reservation flag column corruption with\n the use of newer flags, instead preserve the older flag\n fields that we can still fit in the smallint field, and\n discard the rest.\n\n - Fix security issue in accounting_storage/mysql plugin on\n archive file loads by always escaping strings within the\n slurmdbd. CVE-2019-12838.\n\n - Fix underflow causing decay thread to exit.\n\n - Fix main scheduler not considering hetjobs when building\n the job queue.\n\n - Fix regression for sacct to display old jobs without a\n start time.\n\n - Fix setting correct number of gres topology bits.\n\n - Update hetjobs pending state reason when appropriate.\n\n - Fix accounting_storage/filetxt's understanding of TRES.\n\n - Set Accrue time when not enforcing limits.\n\n - Fix srun segfault when requesting a hetjob with\n test_exec or bcast options.\n\n - Hide multipart priorities log message behind Priority\n debug flag.\n\n - sched/backfill - Make hetjobs sensitive to\n bf_max_job_start.\n\n - Fix slurmctld segfault due to job's partition pointer\n NULL dereference.\n\n - Fix issue with OR'ed job dependencies.\n\n - Add new job's bit_flags of INVALID_DEPEND to prevent\n rebuilding a job's dependency string when it has at\n least one invalid and purged dependency.\n\n - Promote federation unsynced siblings log message from\n debug to info.\n\n - burst_buffer/cray - fix slurmctld SIGABRT due to illegal\n read/writes.\n\n - burst_buffer/cray - fix memory leak due to unfreed job\n script content.\n\n - node_features/knl_cray - fix script_argv use-after-free.\n\n - burst_buffer/cray - fix script_argv use-after-free.\n\n - Fix invalid reads of size 1 due to non null-terminated\n string reads.\n\n - Add extra debug2 logs to identify why BadConstraints\n reason is set.\n\nDo not build hdf5 support where not available.\n\nAdd support for version updates on SLE: Update packages to a later\nversion than the version supported originally on SLE will receive a\nversion string in their package name.\n\nadded the hdf5 job data gathering plugin\n\nAdd backward compatibility with SLE-11 SP4\n\nUpdate to version 18.08.05 :\n\n - Add mitigation for a potential heap overflow on 32-bit\n systems in xmalloc. (CVE-2019-6438, bsc#1123304)\n\nFix fallout from 750cc23ed for CVE-2019-6438.\n\nUpdate to 18.08.04, with following highlights\n\n - Fix message sent to user to display preempted instead of\n time limit when a job is preempted.\n\n - Fix memory leak when a failure happens processing a\n nodes gres config.\n\n - Improve error message when failures happen processing a\n nodes gres config.\n\n - Don't skip jobs in scontrol hold.\n\n - Allow --cpu-bind=verbose to be used with SLURM_HINT\n environment variable.\n\n - Enhanced handling for runaway jobs\n\n - cons_res: Delay exiting cr_job_test until after\n cores/cpus are calculated and distributed.\n\n - Don't check existence of srun --prolog or --epilog\n executables when set to 'none' and SLURM_TEST_EXEC is\n used.\n\n - Add 'P' suffix support to job and step tres\n specifications.\n\n - Fix jobacct_gather/cgroup to work correctly when more\n than one task is started on a node.\n\n - salloc - set SLURM_NTASKS_PER_CORE and\n SLURM_NTASKS_PER_SOCKET in the environment if the\n corresponding command line options are used.\n\n - slurmd - fix handling of the -f flag to specify\n alternate config file locations.\n\n - Add SchedulerParameters option of\n bf_ignore_newly_avail_nodes to avoid scheduling lower\n priority jobs on resources that become available during\n the backfill scheduling cycle when bf_continue is\n enabled.\n\n - job_submit/lua: Add several slurmctld return codes and\n add user/group info\n\n - salloc/sbatch/srun - print warning if mutually exclusive\n options of\n\n --mem and --mem-per-cpu are both set.\n\nrestarting services on update only when activated\n\nadded rotation of logs\n\nAdded backported patches which harden the pam module pam_slurm_adopt.\n(BOO#1116758)\n\nMoved config man pages to a separate package: This way, they won't get\ninstalled on compute nodes.\n\nadded correct link flags for perl bindings (bsc#1108671)\n\n - perl:Switch is required by slurm torque wrappers\n\nFix Requires(pre) and Requires(post) for slurm-config and slurm-node.\nThis fixes issues with failing slurm user creation when installed\nduring initial system installation. (bsc#1109373)\n\nWhen using a remote shared StateSaveLocation, slurmctld needs to be\nstarted after remote filesystems have become available. Add\n'remote-fs.target' to the 'After=' directive in slurmctld.service\n(bsc#1103561).\n\nUpdate to 17.11.8\n\n - Fix incomplete RESPONSE_[RESOURCE|JOB_PACK]_ALLOCATION\n building path.\n\n - Do not allocate nodes that were marked down due to the\n node not responding by ResumeTimeout.\n\n - task/cray plugin - search for 'mems' cgroup information\n in the file 'cpuset.mems' then fall back to the file\n 'mems'.\n\n - Fix ipmi profile debug uninitialized variable.\n\n - PMIx: fixed the direct connect inline msg sending.\n\n - MYSQL: Fix issue not handling all fields when loading an\n archive dump.\n\n - Allow a job_submit plugin to change the admin_comment\n field during job_submit_plugin_modify().\n\n - job_submit/lua - fix access into reservation table.\n\n - MySQL - Prevent deadlock caused by archive logic locking\n reads.\n\n - Don't enforce MaxQueryTimeRange when requesting specific\n jobs.\n\n - Modify --test-only logic to properly support jobs\n submitted to more than one partition.\n\n - Prevent slurmctld from abort when attempting to set\n non-existing qos as def_qos_id.\n\n - Add new job dependency type of 'afterburstbuffer'. The\n pending job will be delayed until the first job\n completes execution and it's burst buffer stage-out is\n completed.\n\n - Reorder proctrack/task plugin load in the slurmstepd to\n match that of slurmd and avoid race condition calling\n task before proctrack can introduce.\n\n - Prevent reboot of a busy KNL node when requesting\n inactive features.\n\n - Revert to previous behavior when requesting memory per\n cpu/node introduced in 17.11.7.\n\n - Fix to reinitialize previously adjusted job members to\n their original value when validating the job memory in\n multi-partition requests.\n\n - Fix _step_signal() from always returning SLURM_SUCCESS.\n\n - Combine active and available node feature change logs on\n one line rather than one line per node for performance\n reasons.\n\n - Prevent occasionally leaking freezer cgroups.\n\n - Fix potential segfault when closing the mpi/pmi2 plugin.\n\n - Fix issues with --exclusive=[user|mcs] to work correctly\n with preemption or when job requests a specific list of\n hosts.\n\n - Make code compile with hdf5 1.10.2+\n\n - mpi/pmix: Fixed the collectives canceling.\n\n - SlurmDBD: improve error message handling on archive load\n failure.\n\n - Fix incorrect locking when deleting reservations.\n\n - Fix incorrect locking when setting up the power save\n module.\n\n - Fix setting format output length for squeue when showing\n array jobs.\n\n - Add xstrstr function.\n\n - Fix printing out of --hint options in sbatch, salloc\n --help.\n\n - Prevent possible divide by zero in\n _validate_time_limit().\n\n - Add Delegate=yes to the slurmd.service file to prevent\n systemd from interfering with the jobs' cgroup\n hierarchies.\n\n - Change the backlog argument to the listen() syscall\n within srun to 4096 to match elsewhere in the code, and\n avoid communication problems at scale.\n\n Fix race in the slurmctld backup controller which\n prevents it to clean up allocations on nodes properly\n after failing over (bsc#1084917). Handled %license in a\n backward compatible manner.\n\nAdd a 'Recommends: slurm-munge' to slurm-slurmdbd.\n\nShield comments between script snippets with a %{!?nil:...} to avoid\nthem being interpreted as scripts - in which case the update level is\npassed as argument (see chapter 'Shared libraries' in:\nhttps://en.opensuse.org/openSUSE:Packaging_scriptlet_snippets)\n(bsc#1100850).\n\nUpdate from 17.11.5 to 17.11.7\n\nFix security issue in handling of username and gid fields\nCVE-2018-10995 and bsc#1095508 what implied an update from 17.11.5 to\n17.11.7 Highlights of 17.11.6 :\n\n - CRAY - Add slurmsmwd to the contribs/cray dir\n\n - PMIX - Added the direct connect authentication.\n\n - Prevent the backup slurmctld from losing the\n active/available node features list on takeover.\n\n - Be able to force power_down of cloud node even if in\n power_save state.\n\n - Allow cloud nodes to be recognized in Slurm when booted\n out of band.\n\n - Numerous fixes - check 'NEWS' file. Highlights of\n 17.11.7 :\n\n - Notify srun and ctld when unkillable stepd exits.\n\n - Numerous fixes - check 'NEWS' file.\n\n - Fixes daemoniziation in newly introduced slurmsmwd\n daemon.\n\nRename :\n\n - remain in sync with commit messages which introduced\n that file\n\nAvoid running pretrans scripts when running in an instsys: there may\nbe not much installed, yet. pretrans code should be done in lua, this\nway, it will be executed by the rpm-internal lua interpreter and not\nbe passed to a shell which may not be around at the time this\nscriptlet is run (bsc#1090292).\n\nAdd requires for slurm-sql to the slurmdbd package.\n\nPackage READMEs for pam and pam_slurm_adopt.\n\nUse the new %%license directive for COPYING file. Fix interaction with\nsystemd: systemd expects that a daemonizing process doesn't go away\nuntil the PID file with it PID of the daemon has bee written\n(bsc#1084125).\n\nMake sure systemd services get restarted only when all packages are in\na consistent state, not in the middle of an 'update' transaction\n(bsc#1088693). Since the %postun scripts that run on update are from\nthe old package they cannot be changed - thus we work around the\nrestart breakage.\n\nfixed wrong log file location in slurmdbd.conf and fixed pid location\nfor slurmdbd and made slurm-slurmdbd depend on slurm config which\nprovides the dir /var/run/slurm (bsc#1086859).\n\nadded comment for (bsc#1085606)\n\nFix security issue in accounting_storage/mysql plugin by always\nescaping strings within the slurmdbd. CVE-2018-7033 (bsc#1085240).\n\nUpdate slurm to v17.11.5 (FATE#325451) Highlights of 17.11 :\n\n - Support for federated clusters to manage a single\n work-flow across a set of clusters.\n\n - Support for heterogeneous job allocations (various\n processor types, memory sizes, etc. by job component).\n Support for heterogeneous job steps within a single\n MPI_COMM_WORLD is not yet supported for most\n configurations.\n\n - X11 support is now fully integrated with the main Slurm\n code. Remove any X11 plugin configured in your\n plugstack.conf file to avoid errors being logged about\n conflicting options.\n\n - Added new advanced reservation flag of 'flex', which\n permits jobs requesting the reservation to begin prior\n to the reservation's start time and use resources inside\n or outside of the reservation. A typical use case is to\n prevent jobs not explicitly requesting the reservation\n from using those reserved resources rather than forcing\n jobs requesting the reservation to use those resources\n in the time frame reserved.\n\n - The sprio command has been modified to report a job's\n priority information for every partition the job has\n been submitted to.\n\n - Group ID lookup performed at job submit time to avoid\n lookup on all compute nodes. Enable with\n PrologFlags=SendGIDs configuration parameter.\n\n - Slurm commands and daemons dynamically link to\n libslurmfull.so instead of statically linking. This\n dramatically reduces the footprint of Slurm.\n\n - In switch plugin, added plugin_id symbol to plugins and\n wrapped switch_jobinfo_t with dynamic_plugin_data_t in\n interface calls in order to pass switch information\n between clusters with different switch types.\n\n - Changed default ProctrackType to cgroup.\n\n - Changed default sched_min_interval from 0 to 2\n microseconds.\n\n - Added new 'scontrol write batch_script ' command to\n fetch a job's batch script. Removed the ability to see\n the script as part of the 'scontrol -dd show job'\n command.\n\n - Add new 'billing' TRES which allows jobs to be limited\n based on the job's billable TRES calculated by the job's\n partition's TRESBillingWeights.\n\n - Regular user use of 'scontrol top' command is now\n disabled. Use the configuration parameter\n 'SchedulerParameters=enable_user_top' to enable that\n functionality. The configuration parameter\n 'SchedulerParameters=disable_user_top' will be silently\n ignored.\n\n - Change default to let pending jobs run outside of\n reservation after reservation is gone to put jobs in\n held state. Added NO_HOLD_JOBS_AFTER_END reservation\n flag to use old default. Support for PMIx v2.0 as well\n as UCX support.\n\n - Remove plugins for obsolete MPI stacks :\n\n - lam\n\n - mpich1_p4\n\n - mpich1_shmem\n\n - mvapich\n\n - Numerous fixes - check 'NEWS' file. Replaced by sed\n script.\n\nFix some rpmlint warnings.\n\nmoved config files to slurm-config package (FATE#324574).\n\nMoved slurmstepd and man page into slurm-node due to slurmd dependency\n\nMoved config files into slurm-node\n\nMoved slurmd rc scripts into slurm-node\n\nMade slurm-munge require slurm-plugins instead of slurm itself\n\n - slurm-node suggested slurm-munge, causing the whole\n slurm to be installed. The slurm-plugins seems to be a\n more base class (FATE#324574).\n\nsplit up light wight slurm-node package for deployment on nodes\n(FATE#324574).\n\nPackage so-versioned libs separately. libslurm is expected to change\nmore frequently and thus is packaged separately from libpmi.\n\nUpdated to 17.02.9 to fix CVE-2017-15566 (bsc#1065697). Changes in\n17.0.9\n\n - When resuming powered down nodes, mark DOWN nodes right\n after ResumeTimeout has been reached (previous logic\n would wait about one minute longer).\n\n - Fix sreport not showing full column name for TRES Count.\n\n - Fix slurmdb_reservations_get() giving wrong usage data\n when job's spanned reservation that was modified.\n\n - Fix sreport reservation utilization report showing bad\n data.\n\n - Show all TRES' on a reservation in sreport reservation\n utilization report by default.\n\n - Fix sacctmgr show reservation handling 'end' parameter.\n\n - Work around issue with sysmacros.h and gcc7 / glibc\n 2.25.\n\n - Fix layouts code to only allow setting a boolean.\n\n - Fix sbatch --wait to keep waiting even if a message\n timeout occurs.\n\n - CRAY - If configured with NodeFeatures=knl_cray and\n there are non-KNL nodes which include no features the\n slurmctld will abort without this patch when attemping\n strtok_r(NULL).\n\n - Fix regression in 17.02.7 which would run the\n spank_task_privileged as part of the slurmstepd instead\n of it's child process.\n\n - Fix security issue in Prolog and Epilog by always\n prepending SPANK_ to all user-set environment variables.\n CVE-2017-15566. Changes in 17.0.8 :\n\n - Add 'slurmdbd:' to the accounting plugin to notify\n message is from dbd instead of local.\n\n - mpi/mvapich - Buffer being only partially cleared. No\n failures observed.\n\n - Fix for job --switch option on dragonfly network.\n\n - In salloc with --uid option, drop supplementary groups\n before changing UID.\n\n - jobcomp/elasticsearch - strip any trailing slashes from\n JobCompLoc.\n\n - jobcomp/elasticsearch - fix memory leak when\n transferring generated buffer.\n\n - Prevent slurmstepd ABRT when parsing gres.conf CPUs.\n\n - Fix sbatch --signal to signal all MPI ranks in a step\n instead of just those on node 0.\n\n - Check multiple partition limits when scheduling a job\n that were previously only checked on submit.\n\n - Cray: Avoid running application/step Node Health Check\n on the external job step.\n\n - Optimization enhancements for partition based job\n preemption.\n\n - Address some build warnings from GCC 7.1, and one\n possible memory leak if /proc is inaccessible.\n\n - If creating/altering a core based reservation with\n scontrol/sview on a remote cluster correctly determine\n the select type.\n\n - Fix autoconf test for libcurl when clang is used.\n\n - Fix default location for\n cgroup_allowed_devices_file.conf to use correct default\n path.\n\n - Document NewName option to sacctmgr.\n\n - Reject a second PMI2_Init call within a single step to\n prevent slurmstepd from hanging.\n\n - Handle old 32bit values stored in the database for\n requested memory correctly in sacct.\n\n - Fix memory leaks in the task/cgroup plugin when\n constraining devices.\n\n - Make extremely verbose info messages debug2 messages in\n the task/cgroup plugin when constraining devices.\n\n - Fix issue that would deny the stepd access to /dev/null\n where GRES has a 'type' but no file defined.\n\n - Fix issue where the slurmstepd would fatal on job launch\n if you have no gres listed in your slurm.conf but some\n in gres.conf.\n\n - Fix validating time spec to correctly validate various\n time formats.\n\n - Make scontrol work correctly with job update timelimit\n [+|-]=.\n\n - Reduce the visibily of a number of warnings in\n _part_access_check.\n\n - Prevent segfault in sacctmgr if no association name is\n specified for an update command.\n\n - burst_buffer/cray plugin modified to work with changes\n in Cray UP05 software release.\n\n - Fix job reasons for jobs that are violating assoc\n MaxTRESPerNode limits.\n\n - Fix segfault when unpacking a 16.05 slurm_cred in a\n 17.02 daemon.\n\n - Fix setting TRES limits with case insensitive TRES\n names.\n\n - Add alias for xstrncmp() -- slurm_xstrncmp().\n\n - Fix sorting of case insensitive strings when using\n xstrcasecmp().\n\n - Gracefully handle race condition when reading /proc as\n process exits.\n\n - Avoid error on Cray duplicate setup of core\n specialization.\n\n - Skip over undefined (hidden in Slurm) nodes in pbsnodes.\n\n - Add empty hashes in perl api's slurm_load_node() for\n hidden nodes.\n\n - CRAY - Add rpath logic to work for the alpscomm libs.\n\n - Fixes for administrator extended TimeLimit (job reason &\n time limit reset).\n\n - Fix gres selection on systems running select/linear.\n\n - sview: Added window decorator for\n maximize,minimize,close buttons for all systems.\n\n - squeue: interpret negative length format specifiers as a\n request to delimit values with spaces.\n\n - Fix the torque pbsnodes wrapper script to parse a gres\n field with a type set correctly.\n\nFixed ABI version of libslurm.\n\nTrim redundant wording in descriptions.\n\nUpdated to slurm 17-02-7-1\n\n - Added python as BuildRequires\n\n - Removed sched-wiki package\n\n - Removed slurmdb-direct package\n\n - Obsoleted sched-wiki and slurmdb-direct packages\n\n - Removing Cray-specific files\n\n - Added /etc/slurm/layout.d files (new for this version)\n\n - Remove /etc/slurm/cgroup files from package\n\n - Added lib/slurm/mcs_account.so\n\n - Removed lib/slurm/jobacct_gather_aix.so\n\n - Removed lib/slurm/job_submit_cnode.so\n\nCreated slurm-sql package\n\nMoved files from slurm-plugins to slurm-torque package\n\nMoved creation of /usr/lib/tmpfiles.d/slurm.conf into slurm.spec\n\n - Removed tmpfiles.d-slurm.conf\n\nChanged /var/run path for slurm daemons to /var/run/slurm\n(FATE#324026).\n\nMade tmpfiles_create post-install macro SLE12 SP2 or greater\n\nDirectly calling systemd-tmpfiles --create for before SLE12 SP2\n\nAllows OpenSUSE Factory build as well\n\nRemoves unused .service files from project\n\nAdds /var/run/slurm to /usr/lib/tmpfiles.d for boottime creation\n\n - Patches upstream .service files to allow for\n /var/run/slurm path\n\n - Modifies slurm.conf to allow for /var/run/slurm path\n\nMove wrapper script mpiexec provided by slrum-torque to mpiexec.slurm\nto avoid conflicts. This file is normally provided by the MPI\nimplementation (bsc#1041706).\n\nReplace remaining ${RPM_BUILD_ROOT}s.\n\nImprove description.\n\nFix up changelog.\n\nSpec file: Replace 'Requires : slurm-perlapi' by 'Requires: perl-slurm\n= %{version}' (bsc#1031872).\n\nTrim redundant parts of description. Fixup RPM groups.\n\nReplace unnecessary %__ macro indirections; replace historic $RPM_*\nvariables by macros.\n\nUse %slurm_u and %slurm_g macros defined at the beginning of the spec\nfile when adding the slurm user/group for consistency.\n\nDefine these macros to daemon,root for non-systemd.\n\nFor anything newer than Leap 42.1 or SLE-12-SP1 build OpenHPC\ncompatible.\n\nUpdated to 16.05.8.1\n\n - Remove StoragePass from being printed out in the\n slurmdbd log at debug2 level.\n\n - Defer PATH search for task program until launch in\n slurmstepd.\n\n - Modify regression test1.89 to avoid leaving vestigial\n job. Also reduce logging to reduce likelyhood of Expect\n buffer overflow.\n\n - Do not PATH search for mult-prog launches if\n LaunchParamters=test_exec is enabled.\n\n - Fix for possible infinite loop in select/cons_res plugin\n when trying to satisfy a job's ntasks_per_core or socket\n specification.\n\n - If job is held for bad constraints make it so once\n updated the job doesn't go into JobAdminHeld.\n\n - sched/backfill - Fix logic to reserve resources for jobs\n that require a node reboot (i.e. to change KNL mode) in\n order to start.\n\n - When unpacking a node or front_end record from state and\n the protocol version is lower than the min version, set\n it to the min.\n\n - Remove redundant lookup for part_ptr when updating a\n reservation's nodes.\n\n - Fix memory and file descriptor leaks in slurmd daemon's\n sbcast logic.\n\n - Do not allocate specialized cores to jobs using the\n --exclusive option.\n\n - Cancel interactive job if Prolog failure with\n 'PrologFlags=contain' or 'PrologFlags=alloc' configured.\n Send new error prolog failure message to the salloc or\n srun command as needed.\n\n - Prevent possible out-of-bounds read in slurmstepd on an\n invalid #! line.\n\n - Fix check for PluginDir within slurmctld to work with\n multiple directories.\n\n - Cancel interactive jobs automatically on communication\n error to launching srun/salloc process.\n\n - Fix security issue caused by insecure file path handling\n triggered by the failure of a Prolog script. To exploit\n this a user needs to anticipate or cause the Prolog to\n fail for their job. CVE-2016-10030 (bsc#1018371).\n\nReplace group/user add macros with function calls.\n\nFix array initialzation and ensure strings are always NULL terminated\nin\n\npam_slurm.c (bsc#1007053).\n\nDisable building with netloc support: the netloc API is part of the\ndevel branch of hwloc. Since this devel branch was included\naccidentally and has been reversed since, we need to disable this for\nthe time being.\n\nConditionalized architecture specific pieces to support non-x86\narchitectures better.\n\nRemove: unneeded 'BuildRequires: python'\n\nAdd: BuildRequires: freeipmi-devel BuildRequires: libibmad-devel\nBuildRequires: libibumad-devel so they are picked up by the slurm\nbuild.\n\nEnable modifications from openHPC Project.\n\nEnable lua API package build.\n\nAdd a recommends for slurm-munge to the slurm package: This is way,\nthe munge auth method is available and slurm works out of the box.\n\nCreate /var/lib/slurm as StateSaveLocation directory. /tmp is\ndangerous.\n\nCreate slurm user/group in preinstall script.\n\nKeep %{_libdir}/libpmi* and %{_libdir}/mpi_pmi2* on SUSE.\n\nFix build with and without OHCP_BUILD define.\n\nFix build for systemd and non-systemd.\n\nUpdated to 16-05-5 - equvalent to OpenHPC 1.2.\n\n - Fix issue with resizing jobs and limits not be kept\n track of correctly.\n\n - BGQ - Remove redeclaration of job_read_lock.\n\n - BGQ - Tighter locks around structures when nodes/cables\n change state.\n\n - Make it possible to change CPUsPerTask with scontrol.\n\n - Make it so scontrol update part qos= will take away a\n partition QOS from a partition.\n\n - Backfill scheduling properly synchronized with Cray Node\n Health Check. Prior logic could result in highest\n priority job getting improperly postponed.\n\n - Make it so daemons also support\n TopologyParam=NoInAddrAny.\n\n - If scancel is operating on large number of jobs and RPC\n responses from slurmctld daemon are slow then introduce\n a delay in sending the cancel job requests from scancel\n in order to reduce load on slurmctld.\n\n - Remove redundant logic when updating a job's task count.\n\n - MySQL - Fix querying jobs with reservations when the\n id's have rolled.\n\n - Perl - Fix use of uninitialized variable in\n slurm_job_step_get_pids.\n\n - Launch batch job requsting --reboot after the boot\n completes.\n\n - Do not attempt to power down a node which has never\n responded if the slurmctld daemon restarts without\n state.\n\n - Fix for possible slurmstepd segfault on invalid user ID.\n\n - MySQL - Fix for possible race condition when archiving\n multiple clusters at the same time.\n\n - Add logic so that slurmstepd can be launched under\n valgrind.\n\n - Increase buffer size to read /proc/*/stat files.\n\n - Remove the SchedulerParameters option of\n 'assoc_limit_continue', making it the default value. Add\n option of 'assoc_limit_stop'. If 'assoc_limit_stop' is\n set and a job cannot start due to association limits,\n then do not attempt to initiate any lower priority jobs\n in that partition. Setting this can decrease system\n throughput and utlization, but avoid potentially\n starving larger jobs by preventing them from launching\n indefinitely.\n\n - Update a node's socket and cores per socket counts as\n needed after a node boot to reflect configuration\n changes which can occur on KNL processors. Note that the\n node's total core count must not change, only the\n distribution of cores across varying socket counts (KNL\n NUMA nodes treated as sockets by Slurm).\n\n - Rename partition configuration from 'Shared' to\n 'OverSubscribe'. Rename salloc, sbatch, srun option from\n '--shared' to '--oversubscribe'. The old options will\n continue to function. Output field names also changed in\n scontrol, sinfo, squeue and sview.\n\n - Add SLURM_UMASK environment variable to user job.\n\n - knl_conf: Added new configuration parameter of\n CapmcPollFreq.\n\n - Cleanup two minor Coverity warnings.\n\n - Make it so the tres units in a job's formatted string\n are converted like they are in a step.\n\n - Correct partition's MaxCPUsPerNode enforcement when\n nodes are shared by multiple partitions.\n\n - node_feature/knl_cray - Prevent slurmctld GRES errors\n for 'hbm' references.\n\n - Display thread name instead of thread id and remove\n process name in stderr logging for 'thread_id'\n LogTimeFormat.\n\n - Log IP address of bad incomming message to slurmctld.\n\n - If a user requests tasks, nodes and ntasks-per-node and\n tasks-per-node/nodes != tasks print warning and ignore\n ntasks-per-node.\n\n - Release CPU 'owner' file locks.\n\n - Update seff to fix warnings with ncpus, and list\n slurm-perlapi dependency in spec file.\n\n - Allow QOS timelimit to override partition timelimit when\n EnforcePartLimits is set to all/any.\n\n - Make it so qsub will do a 'basename' on a wrapped\n command for the output and error files.\n\n - Add logic so that slurmstepd can be launched under\n valgrind.\n\n - Increase buffer size to read /proc/*/stat files.\n\n - Prevent job stuck in configuring state if slurmctld\n daemon restarted while PrologSlurmctld is running. Also\n re-issue burst_buffer/pre-load operation as needed.\n\n - Move test for job wait reason value of\n BurstBufferResources and BurstBufferStageIn later in the\n scheduling logic.\n\n - Document which srun options apply to only job, only\n step, or job and step allocations.\n\n - Use more compatible function to get thread name (>=\n 2.6.11).\n\n - Make it so the extern step uses a reverse tree when\n cleaning up.\n\n - If extern step doesn't get added into the proctrack\n plugin make sure the sleep is killed.\n\n - Add web links to Slurm Diamond Collectors (from Harvard\n University) and collectd (from EDF).\n\n - Add job_submit plugin for the 'reboot' field.\n\n - Make some more Slurm constants (INFINITE, NO_VAL64,\n etc.) available to job_submit/lua plugins.\n\n - Send in a -1 for a taskid into spank_task_post_fork for\n the extern_step.\n\n - MYSQL - Sightly better logic if a job completion comes\n in with an end time of 0.\n\n - task/cgroup plugin is configured with\n ConstrainRAMSpace=yes, then set soft memory limit to\n allocated memory limit (previously no soft limit was\n set).\n\n - Streamline when schedule() is called when running with\n message aggregation on batch script completes.\n\n - Fix incorrect casting when [un]packing derived_ec on\n slurmdb_job_rec_t.\n\n - Document that persistent burst buffers can not be\n created or destroyed using the salloc or srun --bb\n options.\n\n - Add support for setting the SLURM_JOB_ACCOUNT,\n SLURM_JOB_QOS and SLURM_JOB_RESERVAION environment\n variables are set for the salloc command. Document the\n same environment variables for the salloc, sbatch and\n srun commands in their man pages.\n\n - Fix issue where sacctmgr load cluster.cfg wouldn't load\n associations that had a partition in them.\n\n - Don't return the extern step from sstat by default.\n\n - In sstat print 'extern' instead of 4294967295 for the\n extern step.\n\n - Make advanced reservations work properly with core\n specialization.\n\n - slurmstepd modified to pre-load all relevant plugins at\n startup to avoid the possibility of modified plugins\n later resulting in inconsistent API or data structures\n and a failure of slurmstepd.\n\n - Export functions from parse_time.c in libslurm.so.\n\n - Export unit convert functions from slurm_protocol_api.c\n in libslurm.so.\n\n - Fix scancel to allow multiple steps from a job to be\n cancelled at once.\n\n - Update and expand upgrade guide (in Quick Start\n Administrator web page).\n\n - burst_buffer/cray: Requeue, but do not hold a job which\n fails the pre_run operation.\n\n - Insure reported expected job start time is not in the\n past for pending jobs.\n\n - Add support for PMIx v2. Required for FATE#316379.\n\nSetting 'download_files' service to mode='localonly' and adding source\ntarball. (Required for Factory).\n\nversion 15.08.7.1\n\n - Remove the 1024-character limit on lines in batch\n scripts. task/affinity: Disable core-level task binding\n if more CPUs required than available cores.\n\n - Preemption/gang scheduling: If a job is suspended at\n slurmctld restart or reconfiguration time, then leave it\n suspended rather than resume+suspend.\n\n - Don't use lower weight nodes for job allocation when\n topology/tree used.\n\n - Don't allow user specified reservation names to disrupt\n the normal reservation sequeuece numbering scheme.\n\n - Avoid hard-link/copy of script/environment files for job\n arrays. Use the master job record file for all tasks of\n the job array. NOTE: Job arrays submitted to Slurm\n version 15.08.6 or later will fail if the slurmctld\n daemon is downgraded to an earlier version of Slurm.\n\n - In slurmctld log file, log duplicate job ID found by\n slurmd. Previously was being logged as prolog/epilog\n failure.\n\n - If a job is requeued while in the process of being\n launch, remove it's job ID from slurmd's record of\n active jobs in order to avoid generating a duplicate job\n ID error when launched for the second time (which would\n drain the node).\n\n - Cleanup messages when handling job script and\n environment variables in older directory structure\n formats.\n\n - Prevent triggering gang scheduling within a partition if\n configured with PreemptType=partition_prio and\n PreemptMode=suspend,gang.\n\n - Decrease parallelism in job cancel request to prevent\n denial of service when cancelling huge numbers of jobs.\n\n - If all ephemeral ports are in use, try using other port\n numbers.\n\n - Prevent 'scontrol update job' from updating jobs that\n have already finished.\n\n - Show requested TRES in 'squeue -O tres' when job is\n pending.\n\n - Backfill scheduler: Test association and QOS node limits\n before reserving resources for pending job.\n\n - Many bug fixes.\n\nUse source services to download package.\n\nFix code for new API of hwloc-2.0.\n\npackage netloc_to_topology where avialable.\n\nPackage documentation.\n\nversion 15.08.3\n\n - Many new features and bug fixes. See NEWS file\n\nupdate files list accordingly\n\nfix wrong end of line in some files\n\nversion 14.11.8\n\n - Many bug fixes. See NEWS file\n\nupdate files list accordingly\n\nadd missing systemd requirements\n\nadd missing rclink\n\nversion 14.03.9\n\n - Many bug fixes. See NEWS file\n\nadd systemd support\n\nversion 14.03.6\n\n - Added support for native Slurm operation on Cray systems\n (without ALPS).\n\n - Added partition configuration parameters AllowAccounts,\n AllowQOS, DenyAccounts and DenyQOS to provide greater\n control over use.\n\n - Added the ability to perform load based scheduling.\n Allocating resources to jobs on the nodes with the\n largest number if idle CPUs.\n\n - Added support for reserving cores on a compute node for\n system services (core specialization)\n\n - Add mechanism for job_submit plugin to generate error\n message for srun, salloc or sbatch to stderr.\n\n - Support for Postgres database has long since been out of\n date and problematic, so it has been removed entirely.\n If you would like to use it the code still exists in <=\n 2.6, but will not be included in this and future\n versions of the code.\n\n - Added new structures and support for both server and\n cluster resources.\n\n - Significant performance improvements, especially with\n respect to job array support.\n\nupdate files list\n\nupdate to version 2.6.7\n\n - Support for job arrays, which increases performance and\n ease of use for sets of similar jobs.\n\n - Job profiling capability added to record a wide variety\n of job characteristics for each task on a user\n configurable periodic basis. Data currently available\n includes CPU use, memory use, energy use, Infiniband\n network use, Lustre file system use, etc.\n\n - Support for MPICH2 using PMI2 communications interface\n with much greater scalability.\n\n - Prolog and epilog support for advanced reservations.\n\n - Much faster throughput for job step execution with\n --exclusive option. The srun process is notified when\n resources become available rather than periodic polling.\n\n - Support improved for Intel MIC (Many Integrated Core)\n processor.\n\n - Advanced reservations with hostname and core counts now\n supports asymmetric reservations (e.g. specific\n different core count for each node).\n\n - External sensor plugin infrastructure added to record\n power consumption, temperature, etc.\n\n - Improved performance for high-throughput computing.\n\n - MapReduce+ support (launches ~1000x faster, runs ~10x\n faster).\n\n - Added 'MaxCPUsPerNode' partition configuration\n parameter. This can be especially useful to schedule\n GPUs. For example a node can be associated with two\n Slurm partitions (e.g. 'cpu' and 'gpu') and the\n partition/queue 'cpu' could be limited to only a subset\n of the node's CPUs, insuring that one or more CPUs would\n be available to jobs in the 'gpu' partition/queue.\n\nversion 2.5.7\n\n - Fix for linking to the select/cray plugin to not give\n warning about undefined variable.\n\n - Add missing symbols to the xlator.h\n\n - Avoid placing pending jobs in AdminHold state due to\n backfill scheduler interactions with advanced\n reservation.\n\n - Accounting - make average by task not cpu.\n\n - POE - Correct logic to support poe option '-euidevice\n sn_all' and '-euidevice sn_single'.\n\n - Accounting - Fix minor initialization error.\n\n - POE - Correct logic to support srun network instances\n count with POE.\n\n - POE - With the srun --launch-cmd option, report proper\n task count when the --cpus-per-task option is used\n without the\n\n --ntasks option.\n\n - POE - Fix logic binding tasks to CPUs.\n\n - sview - Fix race condition where new information could\n of slipped past the node tab and we didn't notice.\n\n - Accounting - Fix an invalid memory read when slurmctld\n sends data about start job to slurmdbd.\n\n - If a prolog or epilog failure occurs, drain the node\n rather than setting it down and killing all of its jobs.\n\n - Priority/multifactor - Avoid underflow in half-life\n calculation.\n\n - POE - pack missing variable to allow fanout (more than\n 32 nodes)\n\n - Prevent clearing reason field for pending jobs. This bug\n was introduced in v2.5.5 (see 'Reject job at submit time\n ...').\n\n - BGQ - Fix issue with preemption on sub-block jobs where\n a job would kill all preemptable jobs on the midplane\n instead of just the ones it needed to.\n\n - switch/nrt - Validate dynamic window allocation size.\n\n - BGQ - When --geo is requested do not impose the default\n conn_types.\n\n - RebootNode logic - Defers (rather than forgets) reboot\n request with job running on the node within a\n reservation.\n\n - switch/nrt - Correct network_id use logic. Correct\n support for user sn_all and sn_single options.\n\n - sched/backfill - Modify logic to reduce overhead under\n heavy load.\n\n - Fix job step allocation with --exclusive and --hostlist\n option.\n\n - Select/cons_res - Fix bug resulting in error of\n 'cons_res: sync loop not progressing, holding job #'\n\n - checkpoint/blcr - Reset max_nodes from zero to NO_VAL on\n job restart.\n\n - launch/poe - Fix for hostlist file support with repeated\n host names.\n\n - priority/multifactor2 - Prevent possible divide by zero.\n\n -- srun - Don't check for executable if --test-only flag\n is used.\n\n - energy - On a single node only use the last task for\n gathering energy. Since we don't currently track energy\n usage per task (only per step). Otherwise we get double\n the energy.\n\nversion 2.5.4\n\n - Support for Intel® Many Integrated Core (MIC)\n processors.\n\n - User control over CPU frequency of each job step.\n\n - Recording power usage information for each job.\n\n - Advanced reservation of cores rather than whole nodes.\n\n - Integration with IBM's Parallel Environment including\n POE (Parallel Operating Environment) and NRT (Network\n Resource Table) API.\n\n - Highly optimized throughput for serial jobs in a new\n 'select/serial' plugin.\n\n - CPU load is information available\n\n - Configurable number of CPUs available to jobs in each\n SLURM partition, which provides a mechanism to reserve\n CPUs for use with GPUs.\n\nremore runlevel 4 from init script thanks to patch1\n\nfix self obsoletion of slurm-munge package\n\nuse fdupes to remove duplicates\n\nspec file reformaing\n\nput perl macro in a better within install section\n\nenable numa on x86_64 arch only\n\nadd numa and hwloc support\n\nfix perl module files list\n\nuse perl_process_packlist macro for the perl files cleanup\n\nfix some summaries length\n\nadd cgoups directory and example the cgroup.release_common file\n\nspec file cleanup\n\nfirst package\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1018371\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065697\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085240\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1095508\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1123304\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140709\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1155784\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159692\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172004\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1178890\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1178891\");\n script_set_attribute(attribute:\"see_also\", value:\"https://en.opensuse.org/openSUSE:Packaging_scriptlet_snippets\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2016-10030/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2017-15566/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-10995/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-7033/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-12838/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-19727/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-19728/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-6438/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12693/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-27745/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-27746/\");\n # https://www.suse.com/support/update/announcement/2021/suse-su-20210773-1\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?18cd535c\");\n script_set_attribute(attribute:\"solution\", value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for HPC 12 :\n\nzypper in -t patch SUSE-SLE-Module-HPC-12-2021-773=1\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2016-10030\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-27745\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/01/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/03/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/03/15\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libnss_slurm2_20_11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libnss_slurm2_20_11-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpmi0_20_11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpmi0_20_11-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libslurm36\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libslurm36-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-dshgroup\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-dshgroup-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-genders\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-genders-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-machines\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-machines-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-netgroup\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-netgroup-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-slurm_18_08\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-slurm_18_08-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-slurm_20_02\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-slurm_20_02-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-slurm_20_11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh-slurm_20_11-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh_slurm_18_08-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh_slurm_20_02-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:pdsh_slurm_20_11-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-slurm_20_11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-slurm_20_11-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-auth-none\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-auth-none-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-config\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-config-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-lua\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-lua-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-munge\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-munge-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-node\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-node-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-pam_slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-pam_slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-plugins-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-slurmdbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-slurmdbd-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-sql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-sql-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-sview\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-sview-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-torque\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-torque-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm_20_11-webdoc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"x86_64\") audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(0)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP0\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libnss_slurm2_20_11-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libnss_slurm2_20_11-debuginfo-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libpmi0_20_11-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libpmi0_20_11-debuginfo-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libslurm36-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libslurm36-debuginfo-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-2.34-7.32.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-debuginfo-2.34-7.32.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-debugsource-2.34-7.32.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-dshgroup-2.34-7.32.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-dshgroup-debuginfo-2.34-7.32.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-genders-2.34-7.32.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-genders-debuginfo-2.34-7.32.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-machines-2.34-7.32.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-machines-debuginfo-2.34-7.32.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-netgroup-2.34-7.32.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-netgroup-debuginfo-2.34-7.32.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-slurm-2.34-7.32.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-slurm-debuginfo-2.34-7.32.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-slurm_18_08-2.34-7.32.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-slurm_18_08-debuginfo-2.34-7.32.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-slurm_20_02-2.34-7.32.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-slurm_20_02-debuginfo-2.34-7.32.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-slurm_20_11-2.34-7.32.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh-slurm_20_11-debuginfo-2.34-7.32.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh_slurm_18_08-debugsource-2.34-7.32.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh_slurm_20_02-debugsource-2.34-7.32.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"pdsh_slurm_20_11-debugsource-2.34-7.32.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"perl-slurm_20_11-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"perl-slurm_20_11-debuginfo-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-auth-none-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-auth-none-debuginfo-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-config-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-config-man-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-debuginfo-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-debugsource-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-devel-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-doc-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-lua-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-lua-debuginfo-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-munge-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-munge-debuginfo-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-node-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-node-debuginfo-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-pam_slurm-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-pam_slurm-debuginfo-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-plugins-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-plugins-debuginfo-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-slurmdbd-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-slurmdbd-debuginfo-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-sql-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-sql-debuginfo-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-sview-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-sview-debuginfo-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-torque-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-torque-debuginfo-20.11.4-3.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm_20_11-webdoc-20.11.4-3.5.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"slurm_20_11 / pdsh\");\n}\n", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-06-16T15:27:53", "description": "Several issue were found in Simple Linux Utility for Resource Management (SLURM), a cluster resource management and job scheduling system.\n\nCVE-2019-6438\n\nSchedMD Slurm mishandles 32-bit systems, causing a heap overflow in xmalloc.\n\nCVE-2019-12838\n\nSchedMD Slurm did not escape strings when importing an archive file into the accounting_storage/mysql backend, resulting in SQL injection.\n\nFor Debian 8 'Jessie', these problems have been fixed in version 14.03.9-5+deb8u5.\n\nWe recommend that you upgrade your slurm-llnl packages.\n\nNOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-03-18T00:00:00", "type": "nessus", "title": "Debian DLA-2143-1 : slurm-llnl security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-12838", "CVE-2019-6438"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:libpam-slurm", "p-cpe:/a:debian:debian_linux:libpmi0", "p-cpe:/a:debian:debian_linux:libpmi0-dev", "p-cpe:/a:debian:debian_linux:libslurm-dev", "p-cpe:/a:debian:debian_linux:libslurm-perl", "p-cpe:/a:debian:debian_linux:libslurm27", "p-cpe:/a:debian:debian_linux:libslurmdb-dev", "p-cpe:/a:debian:debian_linux:libslurmdb-perl", "p-cpe:/a:debian:debian_linux:libslurmdb27", "p-cpe:/a:debian:debian_linux:slurm-client", "p-cpe:/a:debian:debian_linux:slurm-llnl", "p-cpe:/a:debian:debian_linux:slurm-llnl-slurmdbd", "p-cpe:/a:debian:debian_linux:slurm-wlm", "p-cpe:/a:debian:debian_linux:slurm-wlm-basic-plugins", "p-cpe:/a:debian:debian_linux:slurm-wlm-basic-plugins-dev", "p-cpe:/a:debian:debian_linux:slurm-wlm-doc", "p-cpe:/a:debian:debian_linux:slurm-wlm-torque", "p-cpe:/a:debian:debian_linux:slurmctld", "p-cpe:/a:debian:debian_linux:slurmd", "p-cpe:/a:debian:debian_linux:slurmdbd", "p-cpe:/a:debian:debian_linux:sview", "cpe:/o:debian:debian_linux:8.0"], "id": "DEBIAN_DLA-2143.NASL", "href": "https://www.tenable.com/plugins/nessus/134630", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-2143-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(134630);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2019-12838\", \"CVE-2019-6438\");\n\n script_name(english:\"Debian DLA-2143-1 : slurm-llnl security update\");\n script_summary(english:\"Checks dpkg output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several issue were found in Simple Linux Utility for Resource\nManagement (SLURM), a cluster resource management and job scheduling\nsystem.\n\nCVE-2019-6438\n\nSchedMD Slurm mishandles 32-bit systems, causing a heap overflow in\nxmalloc.\n\nCVE-2019-12838\n\nSchedMD Slurm did not escape strings when importing an archive file\ninto the accounting_storage/mysql backend, resulting in SQL injection.\n\nFor Debian 8 'Jessie', these problems have been fixed in version\n14.03.9-5+deb8u5.\n\nWe recommend that you upgrade your slurm-llnl packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2020/03/msg00016.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/slurm-llnl\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libpam-slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libpmi0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libpmi0-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libslurm-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libslurm-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libslurm27\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libslurmdb-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libslurmdb-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libslurmdb27\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurm-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurm-llnl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurm-llnl-slurmdbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurm-wlm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurm-wlm-basic-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurm-wlm-basic-plugins-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurm-wlm-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurm-wlm-torque\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurmctld\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurmd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurmdbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:sview\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/01/31\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/03/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/03/18\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"libpam-slurm\", reference:\"14.03.9-5+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libpmi0\", reference:\"14.03.9-5+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libpmi0-dev\", reference:\"14.03.9-5+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libslurm-dev\", reference:\"14.03.9-5+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libslurm-perl\", reference:\"14.03.9-5+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libslurm27\", reference:\"14.03.9-5+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libslurmdb-dev\", reference:\"14.03.9-5+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libslurmdb-perl\", reference:\"14.03.9-5+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libslurmdb27\", reference:\"14.03.9-5+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"slurm-client\", reference:\"14.03.9-5+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"slurm-llnl\", reference:\"14.03.9-5+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"slurm-llnl-slurmdbd\", reference:\"14.03.9-5+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"slurm-wlm\", reference:\"14.03.9-5+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"slurm-wlm-basic-plugins\", reference:\"14.03.9-5+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"slurm-wlm-basic-plugins-dev\", reference:\"14.03.9-5+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"slurm-wlm-doc\", reference:\"14.03.9-5+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"slurm-wlm-torque\", reference:\"14.03.9-5+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"slurmctld\", reference:\"14.03.9-5+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"slurmd\", reference:\"14.03.9-5+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"slurmdbd\", reference:\"14.03.9-5+deb8u5\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"sview\", reference:\"14.03.9-5+deb8u5\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-06-16T17:01:12", "description": "This update for slurm fixes the following issues :\n\nSecurity issue fixed :\n\nCVE-2019-6438: Fixed a heap overflow on 32-bit systems in xmalloc (bsc#1123304).\n\nCVE-2019-12838: Fixed an SQL injection (bsc#1140709).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-11-27T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : slurm (SUSE-SU-2019:3080-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-12838", "CVE-2019-6438"], "modified": "2019-12-09T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:libpmi0", "p-cpe:/a:novell:suse_linux:libpmi0-debuginfo", "p-cpe:/a:novell:suse_linux:libslurm31", "p-cpe:/a:novell:suse_linux:libslurm31-debuginfo", "p-cpe:/a:novell:suse_linux:perl-slurm", "p-cpe:/a:novell:suse_linux:perl-slurm-debuginfo", "p-cpe:/a:novell:suse_linux:slurm", "p-cpe:/a:novell:suse_linux:slurm-auth-none", "p-cpe:/a:novell:suse_linux:slurm-auth-none-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-config", "p-cpe:/a:novell:suse_linux:slurm-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-debugsource", "p-cpe:/a:novell:suse_linux:slurm-devel", "p-cpe:/a:novell:suse_linux:slurm-doc", "p-cpe:/a:novell:suse_linux:slurm-lua", "p-cpe:/a:novell:suse_linux:slurm-lua-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-munge", "p-cpe:/a:novell:suse_linux:slurm-munge-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-pam_slurm", "p-cpe:/a:novell:suse_linux:slurm-pam_slurm-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-plugins", "p-cpe:/a:novell:suse_linux:slurm-plugins-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-sched-wiki", "p-cpe:/a:novell:suse_linux:slurm-slurmdb-direct", "p-cpe:/a:novell:suse_linux:slurm-slurmdbd", "p-cpe:/a:novell:suse_linux:slurm-slurmdbd-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-sql", "p-cpe:/a:novell:suse_linux:slurm-sql-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-torque", "p-cpe:/a:novell:suse_linux:slurm-torque-debuginfo", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2019-3080-1.NASL", "href": "https://www.tenable.com/plugins/nessus/131391", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2019:3080-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(131391);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2019/12/09\");\n\n script_cve_id(\"CVE-2019-12838\", \"CVE-2019-6438\");\n\n script_name(english:\"SUSE SLES12 Security Update : slurm (SUSE-SU-2019:3080-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for slurm fixes the following issues :\n\nSecurity issue fixed :\n\nCVE-2019-6438: Fixed a heap overflow on 32-bit systems in xmalloc\n(bsc#1123304).\n\nCVE-2019-12838: Fixed an SQL injection (bsc#1140709).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1123304\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1140709\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-12838/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-6438/\"\n );\n # https://www.suse.com/support/update/announcement/2019/suse-su-20193080-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7de8a60d\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for HPC 12:zypper in -t patch\nSUSE-SLE-Module-HPC-12-2019-3080=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpmi0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpmi0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libslurm31\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libslurm31-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-auth-none\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-auth-none-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-config\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-lua\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-lua-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-munge\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-munge-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-pam_slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-pam_slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-plugins-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sched-wiki\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-slurmdb-direct\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-slurmdbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-slurmdbd-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sql-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-torque\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-torque-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/01/31\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/11/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/11/27\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"x86_64\") audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(0)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP0\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libpmi0-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libpmi0-debuginfo-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libslurm31-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libslurm31-debuginfo-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"perl-slurm-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"perl-slurm-debuginfo-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-auth-none-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-auth-none-debuginfo-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-config-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-debuginfo-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-debugsource-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-devel-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-doc-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-lua-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-lua-debuginfo-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-munge-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-munge-debuginfo-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-pam_slurm-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-pam_slurm-debuginfo-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-plugins-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-plugins-debuginfo-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-sched-wiki-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-slurmdb-direct-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-slurmdbd-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-slurmdbd-debuginfo-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-sql-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-sql-debuginfo-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-torque-17.02.11-6.33.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-torque-debuginfo-17.02.11-6.33.1\")) flag++;\n\n\nif (flag)\n{\n set_kb_item(name:'www/0/SQLi', value:TRUE);\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"slurm\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-05-15T14:02:13", "description": "This update for slurm fixes the following issues :\n\nFix Authentication Bypass when Message Aggregation is enabled CVE-2020-12693 This fixes and issue where authentication could be bypassed via an alternate path or channel when message Aggregation was enabled. A race condition allowed a user to launch a process as an arbitrary user. Add :\n\nFix-Authentication-Bypass-when-Message-Aggregation-is-enabled-CVE-2020\n-1269 3.patch (CVE-2020-12693, bsc#1172004).\n\nRemove unneeded build dependency to postgresql-devel.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 8.1, "vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-09-11T00:00:00", "type": "nessus", "title": "SUSE SLES15 Security Update : slurm (SUSE-SU-2020:2602-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19727", "CVE-2020-1269", "CVE-2020-12693"], "modified": "2022-05-12T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:libslurm32", "p-cpe:/a:novell:suse_linux:libslurm32-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2020-2602-1.NASL", "href": "https://www.tenable.com/plugins/nessus/140515", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2602-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(140515);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/12\");\n\n script_cve_id(\"CVE-2019-19727\", \"CVE-2020-1269\", \"CVE-2020-12693\");\n\n script_name(english:\"SUSE SLES15 Security Update : slurm (SUSE-SU-2020:2602-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"This update for slurm fixes the following issues :\n\nFix Authentication Bypass when Message Aggregation is enabled\nCVE-2020-12693 This fixes and issue where authentication could be\nbypassed via an alternate path or channel when message Aggregation was\nenabled. A race condition allowed a user to launch a process as an\narbitrary user. Add :\n\nFix-Authentication-Bypass-when-Message-Aggregation-is-enabled-CVE-2020\n-1269 3.patch (CVE-2020-12693, bsc#1172004).\n\nRemove unneeded build dependency to postgresql-devel.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172004\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-19727/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12693/\");\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202602-1\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?b1d76250\");\n script_set_attribute(attribute:\"solution\", value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for HPC 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Module-HPC-15-SP1-2020-2602=1\n\nSUSE Linux Enterprise High Performance Computing 15-LTSS :\n\nzypper in -t patch SUSE-SLE-Product-HPC-15-2020-2602=1\n\nSUSE Linux Enterprise High Performance Computing 15-ESPOS :\n\nzypper in -t patch SUSE-SLE-Product-HPC-15-2020-2602=1\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-1269\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-12693\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/01/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libslurm32\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libslurm32-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"x86_64\") audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libslurm32-17.11.13-6.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libslurm32-debuginfo-17.11.13-6.31.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"slurm\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-05-15T14:03:22", "description": "This update for slurm fixes the following issues :\n\nFix Authentication Bypass when Message Aggregation is enabled CVE-2020-12693 This fixes and issue where authentication could be bypassed via an alternate path or channel when message Aggregation was enabled. A race condition allowed a user to launch a process as an arbitrary user. Add :\n\nFix-Authentication-Bypass-when-Message-Aggregation-is-enabled-CVE-2020\n-1269 3.patch (CVE-2020-12693, bsc#1172004).\n\nRemove unneeded build dependency to postgresql-devel.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 8.1, "vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-09-11T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : slurm (SUSE-SU-2020:2601-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19727", "CVE-2020-1269", "CVE-2020-12693"], "modified": "2022-05-12T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:libpmi0", "p-cpe:/a:novell:suse_linux:libpmi0-debuginfo", "p-cpe:/a:novell:suse_linux:libslurm31", "p-cpe:/a:novell:suse_linux:libslurm31-debuginfo", "p-cpe:/a:novell:suse_linux:perl-slurm", "p-cpe:/a:novell:suse_linux:perl-slurm-debuginfo", "p-cpe:/a:novell:suse_linux:slurm", "p-cpe:/a:novell:suse_linux:slurm-auth-none", "p-cpe:/a:novell:suse_linux:slurm-auth-none-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-config", "p-cpe:/a:novell:suse_linux:slurm-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-debugsource", "p-cpe:/a:novell:suse_linux:slurm-devel", "p-cpe:/a:novell:suse_linux:slurm-doc", "p-cpe:/a:novell:suse_linux:slurm-lua", "p-cpe:/a:novell:suse_linux:slurm-lua-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-munge", "p-cpe:/a:novell:suse_linux:slurm-munge-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-pam_slurm", "p-cpe:/a:novell:suse_linux:slurm-pam_slurm-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-plugins", "p-cpe:/a:novell:suse_linux:slurm-plugins-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-sched-wiki", "p-cpe:/a:novell:suse_linux:slurm-slurmdb-direct", "p-cpe:/a:novell:suse_linux:slurm-slurmdbd", "p-cpe:/a:novell:suse_linux:slurm-slurmdbd-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-sql", "p-cpe:/a:novell:suse_linux:slurm-sql-debuginfo", "p-cpe:/a:novell:suse_linux:slurm-torque", "p-cpe:/a:novell:suse_linux:slurm-torque-debuginfo", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2020-2601-1.NASL", "href": "https://www.tenable.com/plugins/nessus/140514", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2601-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(140514);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/12\");\n\n script_cve_id(\"CVE-2019-19727\", \"CVE-2020-1269\", \"CVE-2020-12693\");\n\n script_name(english:\"SUSE SLES12 Security Update : slurm (SUSE-SU-2020:2601-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"This update for slurm fixes the following issues :\n\nFix Authentication Bypass when Message Aggregation is enabled\nCVE-2020-12693 This fixes and issue where authentication could be\nbypassed via an alternate path or channel when message Aggregation was\nenabled. A race condition allowed a user to launch a process as an\narbitrary user. Add :\n\nFix-Authentication-Bypass-when-Message-Aggregation-is-enabled-CVE-2020\n-1269 3.patch (CVE-2020-12693, bsc#1172004).\n\nRemove unneeded build dependency to postgresql-devel.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172004\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-19727/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12693/\");\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202601-1\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?f0323721\");\n script_set_attribute(attribute:\"solution\", value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for HPC 12 :\n\nzypper in -t patch SUSE-SLE-Module-HPC-12-2020-2601=1\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-1269\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-12693\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/01/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpmi0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libpmi0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libslurm31\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libslurm31-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-auth-none\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-auth-none-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-config\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-lua\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-lua-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-munge\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-munge-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-pam_slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-pam_slurm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-plugins-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sched-wiki\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-slurmdb-direct\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-slurmdbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-slurmdbd-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-sql-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-torque\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:slurm-torque-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"x86_64\") audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(0)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP0\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libpmi0-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libpmi0-debuginfo-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libslurm31-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libslurm31-debuginfo-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"perl-slurm-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"perl-slurm-debuginfo-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-auth-none-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-auth-none-debuginfo-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-config-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-debuginfo-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-debugsource-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-devel-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-doc-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-lua-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-lua-debuginfo-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-munge-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-munge-debuginfo-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-pam_slurm-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-pam_slurm-debuginfo-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-plugins-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-plugins-debuginfo-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-sched-wiki-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-slurmdb-direct-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-slurmdbd-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-slurmdbd-debuginfo-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-sql-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-sql-debuginfo-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-torque-17.02.11-6.44.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"slurm-torque-debuginfo-17.02.11-6.44.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"slurm\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-06-16T14:51:11", "description": "Multiple security issues were discovered in the Simple Linux Utility for Resource Management (SLURM), a cluster resource management and job scheduling system, which could result in denial of service, information disclosure or privilege escalation.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2021-01-28T00:00:00", "type": "nessus", "title": "Debian DSA-4841-1 : slurm-llnl - security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19728", "CVE-2020-12693", "CVE-2020-27745", "CVE-2020-27746"], "modified": "2021-02-01T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:slurm-llnl", "cpe:/o:debian:debian_linux:10.0"], "id": "DEBIAN_DSA-4841.NASL", "href": "https://www.tenable.com/plugins/nessus/145523", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-4841. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(145523);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/02/01\");\n\n script_cve_id(\"CVE-2019-19728\", \"CVE-2020-12693\", \"CVE-2020-27745\", \"CVE-2020-27746\");\n script_xref(name:\"DSA\", value:\"4841\");\n\n script_name(english:\"Debian DSA-4841-1 : slurm-llnl - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Multiple security issues were discovered in the Simple Linux Utility\nfor Resource Management (SLURM), a cluster resource management and job\nscheduling system, which could result in denial of service,\ninformation disclosure or privilege escalation.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/source-package/slurm-llnl\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/buster/slurm-llnl\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2021/dsa-4841\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Upgrade the slurm-llnl packages.\n\nFor the stable distribution (buster), these problems have been fixed\nin version 18.08.5.2-1+deb10u2.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurm-llnl\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:10.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/01/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/01/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/01/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"10.0\", prefix:\"libpam-slurm\", reference:\"18.08.5.2-1+deb10u2\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libpmi0\", reference:\"18.08.5.2-1+deb10u2\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libpmi0-dev\", reference:\"18.08.5.2-1+deb10u2\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libpmi2-0\", reference:\"18.08.5.2-1+deb10u2\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libpmi2-0-dev\", reference:\"18.08.5.2-1+deb10u2\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libslurm-dev\", reference:\"18.08.5.2-1+deb10u2\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libslurm-perl\", reference:\"18.08.5.2-1+deb10u2\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libslurm33\", reference:\"18.08.5.2-1+deb10u2\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libslurmdb-dev\", reference:\"18.08.5.2-1+deb10u2\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libslurmdb-perl\", reference:\"18.08.5.2-1+deb10u2\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libslurmdb33\", reference:\"18.08.5.2-1+deb10u2\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"slurm-client\", reference:\"18.08.5.2-1+deb10u2\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"slurm-client-emulator\", reference:\"18.08.5.2-1+deb10u2\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"slurm-wlm\", reference:\"18.08.5.2-1+deb10u2\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"slurm-wlm-basic-plugins\", reference:\"18.08.5.2-1+deb10u2\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"slurm-wlm-basic-plugins-dev\", reference:\"18.08.5.2-1+deb10u2\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"slurm-wlm-doc\", reference:\"18.08.5.2-1+deb10u2\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"slurm-wlm-emulator\", reference:\"18.08.5.2-1+deb10u2\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"slurm-wlm-torque\", reference:\"18.08.5.2-1+deb10u2\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"slurmctld\", reference:\"18.08.5.2-1+deb10u2\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"slurmd\", reference:\"18.08.5.2-1+deb10u2\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"slurmdbd\", reference:\"18.08.5.2-1+deb10u2\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"sview\", reference:\"18.08.5.2-1+deb10u2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-06-15T18:16:17", "description": "The remote Debian 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-2886 advisory.\n\n - SchedMD Slurm 17.11.x, 18.08.0 through 18.08.7, and 19.05.0 allows SQL Injection. (CVE-2019-12838)\n\n - Slurm 19.05.x before 19.05.7 and 20.02.x before 20.02.3, in the rare case where Message Aggregation is enabled, allows Authentication Bypass via an Alternate Path or Channel. A race condition allows a user to launch a process as an arbitrary user. (CVE-2020-12693)\n\n - Slurm before 19.05.8 and 20.x before 20.02.6 has an RPC Buffer Overflow in the PMIx MPI plugin.\n (CVE-2020-27745)\n\n - SchedMD Slurm before 20.02.7 and 20.03.x through 20.11.x before 20.11.7 allows remote code execution as SlurmUser because use of a PrologSlurmctld or EpilogSlurmctld script leads to environment mishandling.\n (CVE-2021-31215)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2022-01-17T00:00:00", "type": "nessus", "title": "Debian DLA-2886-1 : slurm-llnl - LTS security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-12838", "CVE-2020-12693", "CVE-2020-27745", "CVE-2021-31215"], "modified": "2022-01-17T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:libpam-slurm", "p-cpe:/a:debian:debian_linux:libpmi0", "p-cpe:/a:debian:debian_linux:libpmi0-dbg", "p-cpe:/a:debian:debian_linux:libpmi0-dev", "p-cpe:/a:debian:debian_linux:libpmi2-0", "p-cpe:/a:debian:debian_linux:libpmi2-0-dbg", "p-cpe:/a:debian:debian_linux:libpmi2-0-dev", "p-cpe:/a:debian:debian_linux:libslurm-dev", "p-cpe:/a:debian:debian_linux:libslurm-perl", "p-cpe:/a:debian:debian_linux:libslurm30", "p-cpe:/a:debian:debian_linux:libslurm30-dbg", "p-cpe:/a:debian:debian_linux:libslurmdb-dev", "p-cpe:/a:debian:debian_linux:libslurmdb-perl", "p-cpe:/a:debian:debian_linux:libslurmdb30", "p-cpe:/a:debian:debian_linux:libslurmdb30-dbg", "p-cpe:/a:debian:debian_linux:slurm-client", "p-cpe:/a:debian:debian_linux:slurm-client-dbg", "p-cpe:/a:debian:debian_linux:slurm-client-emulator", "p-cpe:/a:debian:debian_linux:slurm-llnl", "p-cpe:/a:debian:debian_linux:slurm-llnl-slurmdbd", "p-cpe:/a:debian:debian_linux:slurm-wlm", "p-cpe:/a:debian:debian_linux:slurm-wlm-basic-plugins", "p-cpe:/a:debian:debian_linux:slurm-wlm-basic-plugins-dbg", "p-cpe:/a:debian:debian_linux:slurm-wlm-basic-plugins-dev", "p-cpe:/a:debian:debian_linux:slurm-wlm-doc", "p-cpe:/a:debian:debian_linux:slurm-wlm-emulator", "p-cpe:/a:debian:debian_linux:slurm-wlm-torque", "p-cpe:/a:debian:debian_linux:slurmctld", "p-cpe:/a:debian:debian_linux:slurmctld-dbg", "p-cpe:/a:debian:debian_linux:slurmd", "p-cpe:/a:debian:debian_linux:slurmd-dbg", "p-cpe:/a:debian:debian_linux:slurmdbd", "p-cpe:/a:debian:debian_linux:slurmdbd-dbg", "p-cpe:/a:debian:debian_linux:sview", "cpe:/o:debian:debian_linux:9.0"], "id": "DEBIAN_DLA-2886.NASL", "href": "https://www.tenable.com/plugins/nessus/156773", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory dla-2886. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(156773);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/01/17\");\n\n script_cve_id(\n \"CVE-2019-12838\",\n \"CVE-2020-12693\",\n \"CVE-2020-27745\",\n \"CVE-2021-31215\"\n );\n\n script_name(english:\"Debian DLA-2886-1 : slurm-llnl - LTS security update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Debian host is missing one or more security-related updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Debian 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the\ndla-2886 advisory.\n\n - SchedMD Slurm 17.11.x, 18.08.0 through 18.08.7, and 19.05.0 allows SQL Injection. (CVE-2019-12838)\n\n - Slurm 19.05.x before 19.05.7 and 20.02.x before 20.02.3, in the rare case where Message Aggregation is\n enabled, allows Authentication Bypass via an Alternate Path or Channel. A race condition allows a user to\n launch a process as an arbitrary user. (CVE-2020-12693)\n\n - Slurm before 19.05.8 and 20.x before 20.02.6 has an RPC Buffer Overflow in the PMIx MPI plugin.\n (CVE-2020-27745)\n\n - SchedMD Slurm before 20.02.7 and 20.03.x through 20.11.x before 20.11.7 allows remote code execution as\n SlurmUser because use of a PrologSlurmctld or EpilogSlurmctld script leads to environment mishandling.\n (CVE-2021-31215)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931880\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/source-package/slurm-llnl\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.debian.org/lts/security/2022/dla-2886\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2019-12838\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2020-12693\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2020-27745\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-31215\");\n script_set_attribute(attribute:\"see_also\", value:\"https://packages.debian.org/source/stretch/slurm-llnl\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade the slurm-llnl packages.\n\nFor Debian 9 stretch, these problems have been fixed in version 16.05.9-1+deb9u5.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-12838\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/07/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/01/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/01/17\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libpam-slurm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libpmi0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libpmi0-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libpmi0-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libpmi2-0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libpmi2-0-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libpmi2-0-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libslurm-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libslurm-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libslurm30\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libslurm30-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libslurmdb-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libslurmdb-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libslurmdb30\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libslurmdb30-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurm-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurm-client-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurm-client-emulator\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurm-llnl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurm-llnl-slurmdbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurm-wlm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurm-wlm-basic-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurm-wlm-basic-plugins-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurm-wlm-basic-plugins-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurm-wlm-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurm-wlm-emulator\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurm-wlm-torque\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurmctld\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurmctld-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurmd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurmd-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurmdbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:slurmdbd-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:sview\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:9.0\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Debian Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('audit.inc');\ninclude('debian_package.inc');\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar release = get_kb_item('Host/Debian/release');\nif ( isnull(release) ) audit(AUDIT_OS_NOT, 'Debian');\nvar release = chomp(release);\nif (! preg(pattern:\"^(9)\\.[0-9]+\", string:release)) audit(AUDIT_OS_NOT, 'Debian 9.0', 'Debian ' + release);\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Debian', cpu);\n\nvar pkgs = [\n {'release': '9.0', 'prefix': 'libpam-slurm', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'libpmi0', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'libpmi0-dbg', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'libpmi0-dev', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'libpmi2-0', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'libpmi2-0-dbg', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'libpmi2-0-dev', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'libslurm-dev', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'libslurm-perl', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'libslurm30', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'libslurm30-dbg', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'libslurmdb-dev', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'libslurmdb-perl', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'libslurmdb30', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'libslurmdb30-dbg', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'slurm-client', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'slurm-client-dbg', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'slurm-client-emulator', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'slurm-llnl', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'slurm-llnl-slurmdbd', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'slurm-wlm', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'slurm-wlm-basic-plugins', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'slurm-wlm-basic-plugins-dbg', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'slurm-wlm-basic-plugins-dev', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'slurm-wlm-doc', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'slurm-wlm-emulator', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'slurm-wlm-torque', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'slurmctld', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'slurmctld-dbg', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'slurmd', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'slurmd-dbg', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'slurmdbd', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'slurmdbd-dbg', 'reference': '16.05.9-1+deb9u5'},\n {'release': '9.0', 'prefix': 'sview', 'reference': '16.05.9-1+deb9u5'}\n];\n\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var release = NULL;\n var prefix = NULL;\n var reference = NULL;\n if (!empty_or_null(package_array['release'])) release = package_array['release'];\n if (!empty_or_null(package_array['prefix'])) prefix = package_array['prefix'];\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (release && prefix && reference) {\n if (deb_check(release:release, prefix:prefix, reference:reference)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : deb_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = deb_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'libpam-slurm / libpmi0 / libpmi0-dbg / libpmi0-dev / libpmi2-0 / etc');\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "fedora": [{"lastseen": "2021-07-28T14:46:51", "description": "Slurm is an open source, fault-tolerant, and highly scalable cluster management and job scheduling system for Linux clusters. Components include machine status, partition management, job management, scheduling and accounting modules. ", "cvss3": {"exploitabilityScore": 1.6, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.5, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-01-12T01:45:12", "type": "fedora", "title": "[SECURITY] Fedora 31 Update: slurm-19.05.5-1.fc31", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.0, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-19727", "CVE-2019-19728"], "modified": "2020-01-12T01:45:12", "id": "FEDORA:66F9660A7ADE", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/YAPFSND34HTVAED65GYK43VY56MSBKDI/", "cvss": {"score": 6.0, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2022-04-06T21:47:11", "description": "Slurm is an open source, fault-tolerant, and highly scalable cluster management and job scheduling system for Linux clusters. Components include machine status, partition management, job management, scheduling and accounting modules. ", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-07-24T00:59:15", "type": "fedora", "title": "[SECURITY] Fedora 30 Update: slurm-18.08.8-1.fc30", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-12838"], "modified": "2019-07-24T00:59:15", "id": "FEDORA:6ED61610986B", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/AQ6EV3OWKGMTBWCSXZGS4MYADUBLVXSQ/", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-04-06T21:47:11", "description": "Slurm is an open source, fault-tolerant, and highly scalable cluster management and job scheduling system for Linux clusters. Components include machine status, partition management, job management, scheduling and accounting modules. ", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-07-24T01:50:06", "type": "fedora", "title": "[SECURITY] Fedora 29 Update: slurm-18.08.8-1.fc29", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-12838", "CVE-2019-6438"], "modified": "2019-07-24T01:50:06", "id": "FEDORA:0DE5E660D95A", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/2O47F72FWMYLEGF35QGNYY5VS33SUQS5/", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "debiancve": [{"lastseen": "2021-12-14T17:52:47", "description": "SchedMD Slurm before 18.08.9 and 19.x before 19.05.5 has weak slurmdbd.conf permissions.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.5, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2020-01-13T19:15:00", "type": "debiancve", "title": "CVE-2019-19727", "bulletinFamily": "info", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-19727"], "modified": "2020-01-13T19:15:00", "id": "DEBIANCVE:CVE-2019-19727", "href": "https://security-tracker.debian.org/tracker/CVE-2019-19727", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-12-14T17:52:47", "description": "SchedMD Slurm before 18.08.9 and 19.x before 19.05.5 executes srun --uid with incorrect privileges.", "cvss3": {"exploitabilityScore": 1.6, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.5, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-01-13T19:15:00", "type": "debiancve", "title": "CVE-2019-19728", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.0, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-19728"], "modified": "2020-01-13T19:15:00", "id": "DEBIANCVE:CVE-2019-19728", "href": "https://security-tracker.debian.org/tracker/CVE-2019-19728", "cvss": {"score": 6.0, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2022-04-06T23:38:57", "description": "SchedMD Slurm 17.11.x, 18.08.0 through 18.08.7, and 19.05.0 allows SQL Injection.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-07-11T13:15:00", "type": "debiancve", "title": "CVE-2019-12838", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-12838"], "modified": "2019-07-11T13:15:00", "id": "DEBIANCVE:CVE-2019-12838", "href": "https://security-tracker.debian.org/tracker/CVE-2019-12838", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "ubuntucve": [{"lastseen": "2021-11-22T21:27:42", "description": "SchedMD Slurm before 18.08.9 and 19.x before 19.05.5 has weak slurmdbd.conf\npermissions.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.5, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2020-01-13T00:00:00", "type": "ubuntucve", "title": "CVE-2019-19727", "bulletinFamily": "info", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-19727"], "modified": "2020-01-13T00:00:00", "id": "UB:CVE-2019-19727", "href": "https://ubuntu.com/security/CVE-2019-19727", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-11-22T21:27:42", "description": "SchedMD Slurm before 18.08.9 and 19.x before 19.05.5 executes srun --uid\nwith incorrect privileges.", "cvss3": {"exploitabilityScore": 1.6, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.5, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-01-13T00:00:00", "type": "ubuntucve", "title": "CVE-2019-19728", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.0, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-19728"], "modified": "2020-01-13T00:00:00", "id": "UB:CVE-2019-19728", "href": "https://ubuntu.com/security/CVE-2019-19728", "cvss": {"score": 6.0, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2021-11-22T21:30:36", "description": "SchedMD Slurm 17.11.x, 18.08.0 through 18.08.7, and 19.05.0 allows SQL\nInjection.\n\n#### Bugs\n\n * <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931880>\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2019-07-11T00:00:00", "type": "ubuntucve", "title": "CVE-2019-12838", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-12838"], "modified": "2019-07-11T00:00:00", "id": "UB:CVE-2019-12838", "href": "https://ubuntu.com/security/CVE-2019-12838", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "cve": [{"lastseen": "2022-03-23T22:18:48", "description": "SchedMD Slurm before 18.08.9 and 19.x before 19.05.5 has weak slurmdbd.conf permissions.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-01-13T19:15:00", "type": "cve", "title": "CVE-2019-19727", "cwe": ["CWE-732"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-19727"], "modified": "2020-01-23T13:38:00", "cpe": ["cpe:/o:opensuse:leap:15.1"], "id": "CVE-2019-19727", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-19727", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T22:18:49", "description": "SchedMD Slurm before 18.08.9 and 19.x before 19.05.5 executes srun --uid with incorrect privileges.", "cvss3": {"exploitabilityScore": 1.6, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-01-13T19:15:00", "type": "cve", "title": "CVE-2019-19728", "cwe": ["CWE-269"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.0, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-19728"], "modified": "2021-01-28T16:47:00", "cpe": ["cpe:/o:opensuse:leap:15.1", "cpe:/o:debian:debian_linux:10.0"], "id": "CVE-2019-19728", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-19728", "cvss": {"score": 6.0, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"]}, {"lastseen": "2022-04-06T21:31:29", "description": "SchedMD Slurm 17.11.x, 18.08.0 through 18.08.7, and 19.05.0 allows SQL Injection.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-07-11T13:15:00", "type": "cve", "title": "CVE-2019-12838", "cwe": ["CWE-89"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-12838"], "modified": "2022-04-06T18:08:00", "cpe": ["cpe:/o:debian:debian_linux:9.0", "cpe:/a:schedmd:slurm:18.08.7", "cpe:/o:debian:debian_linux:10.0", "cpe:/o:fedoraproject:fedora:29", "cpe:/o:opensuse:leap:15.1", "cpe:/o:fedoraproject:fedora:30", "cpe:/a:schedmd:slurm:17.11.13.2", "cpe:/o:debian:debian_linux:8.0", "cpe:/a:schedmd:slurm:19.05.0", "cpe:/o:opensuse:leap:15.0"], "id": "CVE-2019-12838", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12838", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:schedmd:slurm:17.11.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:a:schedmd:slurm:19.05.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe:2.3:a:schedmd:slurm:18.08.7:*:*:*:*:*:*:*"]}], "debian": [{"lastseen": "2022-04-07T13:29:18", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4572-1 security@debian.org\nhttps://www.debian.org/security/ Moritz Muehlenhoff\nNovember 18, 2019 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : slurm-llnl\nCVE ID : CVE-2019-12838\n\nIt was discovered in the Simple Linux Utility for Resource Management\n(SLURM), a cluster resource management and job scheduling system did\nnot escape strings when importing an archive file into the\naccounting_storage/mysql backend, resulting in SQL injection.\n\nFor the stable distribution (buster), this problem has been fixed in\nversion 18.08.5.2-1+deb10u1.\n\nWe recommend that you upgrade your slurm-llnl packages.\n\nFor the detailed security status of slurm-llnl please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/slurm-llnl\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-11-18T22:03:28", "type": "debian", "title": "[SECURITY] [DSA 4572-1] slurm-llnl security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-12838"], "modified": "2019-11-18T22:03:28", "id": "DEBIAN:DSA-4572-1:F0C65", "href": "https://lists.debian.org/debian-security-announce/2019/msg00224.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-04-07T14:21:59", "description": "Package : slurm-llnl\nVersion : 14.03.9-5+deb8u5\nCVE ID : CVE-2019-6438 CVE-2019-12838\nDebian Bug : 920997 931880\n\n\nSeveral issue were found in Simple Linux Utility for Resource\nManagement (SLURM), a cluster resource management and job scheduling\nsystem.\n\nCVE-2019-6438\n\n SchedMD Slurm mishandles 32-bit systems, causing a heap overflow\n in xmalloc.\n\nCVE-2019-12838\n\n SchedMD Slurm did not escape strings when importing an archive\n file into the accounting_storage/mysql backend, resulting in SQL\n injection.\n\nFor Debian 8 "Jessie", these problems have been fixed in version\n14.03.9-5+deb8u5.\n\nWe recommend that you upgrade your slurm-llnl packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-03-16T12:08:02", "type": "debian", "title": "[SECURITY] [DLA 2143-1] slurm-llnl security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-12838", "CVE-2019-6438"], "modified": "2020-03-16T12:08:02", "id": "DEBIAN:DLA-2143-1:29A41", "href": "https://lists.debian.org/debian-lts-announce/2020/03/msg00016.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-02-16T11:27:48", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4841-1 security@debian.org\nhttps://www.debian.org/security/ Moritz Muehlenhoff\nJanuary 27, 2021 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : slurm-llnl\nCVE ID : CVE-2019-19728 CVE-2020-12693 CVE-2020-27745 CVE-2020-27746\n\nMultiple security issues were discovered in the Simple Linux Utility for\nResource Management (SLURM), a cluster resource management and job\nscheduling system, which could result in denial of service, information\ndisclosure or privilege escalation.\n\nFor the stable distribution (buster), these problems have been fixed in\nversion 18.08.5.2-1+deb10u2.\n\nWe recommend that you upgrade your slurm-llnl packages.\n\nFor the detailed security status of slurm-llnl please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/slurm-llnl\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-01-27T18:44:16", "type": "debian", "title": "[SECURITY] [DSA 4841-1] slurm-llnl security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-19728", "CVE-2020-12693", "CVE-2020-27745", "CVE-2020-27746"], "modified": "2021-01-27T18:44:16", "id": "DEBIAN:DSA-4841-1:98E0B", "href": "https://lists.debian.org/debian-security-announce/2021/msg00022.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-06-27T06:20:41", "description": "- -------------------------------------------------------------------------\nDebian LTS Advisory DLA-2886-1 debian-lts@lists.debian.org\nhttps://www.debian.org/lts/security/ Sylvain Beucler\nJanuary 17, 2022 https://wiki.debian.org/LTS\n- -------------------------------------------------------------------------\n\nPackage : slurm-llnl\nVersion : 16.05.9-1+deb9u5\nCVE ID : CVE-2019-12838 CVE-2020-12693 CVE-2020-27745 CVE-2021-31215\nDebian Bug : 931880 961406 974721 988439\n\nMultiple security issues were discovered in the Simple Linux Utility\nfor Resource Management (SLURM), a cluster resource management and job\nscheduling system, which could result in denial of service,\ninformation disclosure or privilege escalation.\n\nCVE-2019-12838\n\n SchedMD Slurm allows SQL Injection.\n\nCVE-2020-12693\n\n In the rare case where Message Aggregation is enabled, Slurm\n allows Authentication Bypass via an Alternate Path or Channel. A\n race condition allows a user to launch a process as an arbitrary\n user.\n\nCVE-2020-27745\n\n RPC Buffer Overflow in the PMIx MPI plugin.\n\nCVE-2021-31215\n\n SchedMD Slurm allows remote code execution as SlurmUser because\n use of a PrologSlurmctld or EpilogSlurmctld script leads to\n environment mishandling.\n\nFor Debian 9 stretch, these problems have been fixed in version\n16.05.9-1+deb9u5.\n\nWe recommend that you upgrade your slurm-llnl packages.\n\nFor the detailed security status of slurm-llnl please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/slurm-llnl\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-01-17T18:26:55", "type": "debian", "title": "[SECURITY] [DLA 2886-1] slurm-llnl security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-12838", "CVE-2020-12693", "CVE-2020-27745", "CVE-2021-31215"], "modified": "2022-01-17T18:26:55", "id": "DEBIAN:DLA-2886-1:15075", "href": "https://lists.debian.org/debian-lts-announce/2022/01/msg00011.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "redhatcve": [{"lastseen": "2022-05-21T01:15:14", "description": "SchedMD Slurm 17.11.x, 18.08.0 through 18.08.7, and 19.05.0 allows SQL Injection.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-05-20T22:58:35", "type": "redhatcve", "title": "CVE-2019-12838", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-12838"], "modified": "2022-05-20T22:58:35", "id": "RH:CVE-2019-12838", "href": "https://access.redhat.com/security/cve/cve-2019-12838", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}]}