openSUSE Security Update : slurm (openSUSE-2019-521)

medium Nessus Plugin ID 123219

Language:

New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for slurm to version 17.11.7 fixes the following issues :

This security issue was fixed :

- CVE-2018-10995: Ensure correct handling of user names and group ids (bsc#1095508).

These non-security issues were fixed :

- CRAY - Add slurmsmwd to the contribs/cray dir

- PMIX - Added the direct connect authentication.

- Prevent the backup slurmctld from losing the active/available node features list on takeover.

- Be able to force power_down of cloud node even if in power_save state.

- Allow cloud nodes to be recognized in Slurm when booted out of band.

- Notify srun and ctld when unkillable stepd exits.

- Fixes daemoniziation in newly introduced slurmsmwd daemon.

The following tracked packaging changes are included :

- avoid postun error in libpmi0 (bsc#1100850) This update was imported from the SUSE:SLE-15:Update update project.

Solution

Update the affected slurm packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1095508

https://bugzilla.opensuse.org/show_bug.cgi?id=1100850

Plugin Details

Severity: Medium

ID: 123219

File Name: openSUSE-2019-521.nasl

Version: 1.4

Type: local

Agent: unix

Published: 3/27/2019

Updated: 1/19/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:o:novell:opensuse:15.0:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:libpmi0:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:libpmi0-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:libslurm32:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:libslurm32-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:perl-slurm:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:perl-slurm-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-auth-none:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-auth-none-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-config:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-debugsource:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-lua:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-lua-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-munge:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-munge-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-node:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-node-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-openlava:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-pam_slurm:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-pam_slurm-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-plugins:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-plugins-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-seff:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-sjstat:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-slurmdbd:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-slurmdbd-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-sql:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-sql-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-sview:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-sview-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-torque:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:slurm-torque-debuginfo:*:*:*:*:*:*:*

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 3/23/2019

Vulnerability Publication Date: 5/30/2018

Reference Information

CVE: CVE-2018-10995