Package        : slurm-llnl
Version        : 2.3.4-2+deb7u1
CVE ID         : CVE-2016-10030
Debian Bug     : 850491

With this vulnerability arbitrary files can be overwritten on nodes
running jobs provided that the user can run a job that is able to
trigger a failure of a Prolog script.

For Debian 7 "Wheezy", these problems have been fixed in version
2.3.4-2+deb7u1.

We recommend that you upgrade your slurm-llnl packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-- 
Raphaël Hertzog ◈ Debian Developer

Support Debian LTS: https://www.freexian.com/lts/debian/
Learn to master Debian: https://debian-handbook.info/get/

Debian LTS: DLA-921-1: slurm-llnl security update

April 27, 2017
With this vulnerability arbitrary files can be overwritten on nodes running jobs provided that the user can run a job that is able to trigger a failure of a Prolog script

Summary


With this vulnerability arbitrary files can be overwritten on nodes
running jobs provided that the user can run a job that is able to
trigger a failure of a Prolog script.

For Debian 7 "Wheezy", these problems have been fixed in version
2.3.4-2+deb7u1.

We recommend that you upgrade your slurm-llnl packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

--
Raphaël Hertzog ◈ Debian Developer

Support Debian LTS: https://www.freexian.com/lts/debian/
Learn to master Debian: https://debian-handbook.info/get/


Severity
Package        : slurm-llnl
Version : 2.3.4-2+deb7u1
CVE ID : CVE-2016-10030
Debian Bug : 850491

Related News