Логотип exploitDog
bind:CVE-2016-10030
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2016-10030

Количество 8

Количество 8

ubuntu логотип

CVE-2016-10030

около 9 лет назад

The _prolog_error function in slurmd/req.c in Slurm before 15.08.13, 16.x before 16.05.7, and 17.x before 17.02.0-pre4 has a vulnerability in how the slurmd daemon informs users of a Prolog failure on a compute node. That vulnerability could allow a user to assume control of an arbitrary file on the system. Any exploitation of this is dependent on the user being able to cause or anticipate the failure (non-zero return code) of a Prolog script that their job would run on. This issue affects all Slurm versions from 0.6.0 (September 2005) to present. Workarounds to prevent exploitation of this are to either disable your Prolog script, or modify it such that it always returns 0 ("success") and adjust it to set the node as down using scontrol instead of relying on the slurmd to handle that automatically. If you do not have a Prolog set you are unaffected by this issue.

CVSS3: 8.1
EPSS: Низкий
nvd логотип

CVE-2016-10030

около 9 лет назад

The _prolog_error function in slurmd/req.c in Slurm before 15.08.13, 16.x before 16.05.7, and 17.x before 17.02.0-pre4 has a vulnerability in how the slurmd daemon informs users of a Prolog failure on a compute node. That vulnerability could allow a user to assume control of an arbitrary file on the system. Any exploitation of this is dependent on the user being able to cause or anticipate the failure (non-zero return code) of a Prolog script that their job would run on. This issue affects all Slurm versions from 0.6.0 (September 2005) to present. Workarounds to prevent exploitation of this are to either disable your Prolog script, or modify it such that it always returns 0 ("success") and adjust it to set the node as down using scontrol instead of relying on the slurmd to handle that automatically. If you do not have a Prolog set you are unaffected by this issue.

CVSS3: 8.1
EPSS: Низкий
debian логотип

CVE-2016-10030

около 9 лет назад

The _prolog_error function in slurmd/req.c in Slurm before 15.08.13, 1 ...

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-9w2c-9wm9-hvcg

больше 3 лет назад

The _prolog_error function in slurmd/req.c in Slurm before 15.08.13, 16.x before 16.05.7, and 17.x before 17.02.0-pre4 has a vulnerability in how the slurmd daemon informs users of a Prolog failure on a compute node. That vulnerability could allow a user to assume control of an arbitrary file on the system. Any exploitation of this is dependent on the user being able to cause or anticipate the failure (non-zero return code) of a Prolog script that their job would run on. This issue affects all Slurm versions from 0.6.0 (September 2005) to present. Workarounds to prevent exploitation of this are to either disable your Prolog script, or modify it such that it always returns 0 ("success") and adjust it to set the node as down using scontrol instead of relying on the slurmd to handle that automatically. If you do not have a Prolog set you are unaffected by this issue.

CVSS3: 8.1
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0443-1

почти 6 лет назад

Security update for pdsh, slurm_18_08

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0434-1

почти 6 лет назад

Security update for pdsh, slurm_18_08

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:2607-1

больше 5 лет назад

Security update for pdsh, slurm_20_02

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0773-1

почти 5 лет назад

Security update for slurm_20_11 and pdsh

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2016-10030

The _prolog_error function in slurmd/req.c in Slurm before 15.08.13, 16.x before 16.05.7, and 17.x before 17.02.0-pre4 has a vulnerability in how the slurmd daemon informs users of a Prolog failure on a compute node. That vulnerability could allow a user to assume control of an arbitrary file on the system. Any exploitation of this is dependent on the user being able to cause or anticipate the failure (non-zero return code) of a Prolog script that their job would run on. This issue affects all Slurm versions from 0.6.0 (September 2005) to present. Workarounds to prevent exploitation of this are to either disable your Prolog script, or modify it such that it always returns 0 ("success") and adjust it to set the node as down using scontrol instead of relying on the slurmd to handle that automatically. If you do not have a Prolog set you are unaffected by this issue.

CVSS3: 8.1
1%
Низкий
около 9 лет назад
nvd логотип
CVE-2016-10030

The _prolog_error function in slurmd/req.c in Slurm before 15.08.13, 16.x before 16.05.7, and 17.x before 17.02.0-pre4 has a vulnerability in how the slurmd daemon informs users of a Prolog failure on a compute node. That vulnerability could allow a user to assume control of an arbitrary file on the system. Any exploitation of this is dependent on the user being able to cause or anticipate the failure (non-zero return code) of a Prolog script that their job would run on. This issue affects all Slurm versions from 0.6.0 (September 2005) to present. Workarounds to prevent exploitation of this are to either disable your Prolog script, or modify it such that it always returns 0 ("success") and adjust it to set the node as down using scontrol instead of relying on the slurmd to handle that automatically. If you do not have a Prolog set you are unaffected by this issue.

CVSS3: 8.1
1%
Низкий
около 9 лет назад
debian логотип
CVE-2016-10030

The _prolog_error function in slurmd/req.c in Slurm before 15.08.13, 1 ...

CVSS3: 8.1
1%
Низкий
около 9 лет назад
github логотип
GHSA-9w2c-9wm9-hvcg

The _prolog_error function in slurmd/req.c in Slurm before 15.08.13, 16.x before 16.05.7, and 17.x before 17.02.0-pre4 has a vulnerability in how the slurmd daemon informs users of a Prolog failure on a compute node. That vulnerability could allow a user to assume control of an arbitrary file on the system. Any exploitation of this is dependent on the user being able to cause or anticipate the failure (non-zero return code) of a Prolog script that their job would run on. This issue affects all Slurm versions from 0.6.0 (September 2005) to present. Workarounds to prevent exploitation of this are to either disable your Prolog script, or modify it such that it always returns 0 ("success") and adjust it to set the node as down using scontrol instead of relying on the slurmd to handle that automatically. If you do not have a Prolog set you are unaffected by this issue.

CVSS3: 8.1
1%
Низкий
больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2020:0443-1

Security update for pdsh, slurm_18_08

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:0434-1

Security update for pdsh, slurm_18_08

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:2607-1

Security update for pdsh, slurm_20_02

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:0773-1

Security update for slurm_20_11 and pdsh

почти 5 лет назад

Уязвимостей на страницу