Debian bullseye
Source: Debian
- CVE-2021-31215→ fixed in
20.11.7+really20.11.4-2 - CVE-2022-29500→ fixed in
20.11.7+really20.11.4-2+deb11u1
Single command to patch all of these:
sudo apt-get install --only-upgrade -y slurm-wlmStackPatch is live — CVE patch ops for indie SaaS, $99 lifetime founder seat (50 only).See product
slurm-wlm CVE matrix across Linux distros23 CVEs tracked across 4 distro releases. Showing the 23 most-recent fix records.
Each row links to the full per-CVE cross-distro view. Sorted most-recent first.
Source: Debian
20.11.7+really20.11.4-220.11.7+really20.11.4-2+deb11u1Single command to patch all of these:
sudo apt-get install --only-upgrade -y slurm-wlmSource: Debian
20.11.7+really20.11.4-221.08.8.2-121.08.8.2-122.05.8-4+deb12u122.05.8-4+deb12u222.05.8-4+deb12u222.05.8-4+deb12u222.05.8-4+deb12u2Single command to patch all of these:
sudo apt-get install --only-upgrade -y slurm-wlmSource: Debian
20.11.7+really20.11.4-221.08.8.2-121.08.8.2-123.02.6-123.11.3-123.11.3-123.11.3-123.11.3-1Single command to patch all of these:
sudo apt-get install --only-upgrade -y slurm-wlmSource: Ubuntu USN
17.11.2-1ubuntu0.1~esm5USN-8197-1Single command to patch all of these:
sudo apt-get install --only-upgrade -y slurm-wlmslurm-wlm patched?5-second check on your actual server. The quickscan reads your installed slurm-wlm version and matches against the same 23-CVE catalog above.
curl https://mindsparkstack.com/scan.sh | bash
We use essential cookies to run the site. With your consent we also load analytics + ads cookies. See our Cookie Policy and Privacy Policy.