Several vulnerabilities were discovered in the Simple Linux Utility for Resource Management (SLURM), a cluster resource management and job scheduling system. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2018-7033 Incomplete sanitization of user-provided text strings could lead to SQL injection attacks against slurmdbd. CVE-2018-10995 Insecure handling of user_name and gid fields leading to improper authentication handling. For the stable distribution (stretch), these problems have been fixed in version 16.05.9-1+deb9u2. We recommend that you upgrade your slurm-llnl packages. For the detailed security status of slurm-llnl please refer to its security tracker page at: https://security-tracker.debian.org/tracker/slurm-llnl
Several vulnerabilities were discovered in the Simple Linux Utility for Resource Management (SLURM), a cluster resource management and job scheduling system. The Common Vulnerabilities and Exposures project identifies the following problems:
Incomplete sanitization of user-provided text strings could lead to SQL injection attacks against slurmdbd.
Insecure handling of user_name and gid fields leading to improper authentication handling.
For the stable distribution (stretch), these problems have been fixed in version 16.05.9-1+deb9u2.
We recommend that you upgrade your slurm-llnl packages.
For the detailed security status of slurm-llnl please refer to its security tracker page at: https://security-tracker.debian.org/tracker/slurm-llnl