SUSE Security Update: Security update for slurm ______________________________________________________________________________ Announcement ID: SUSE-SU-2020:2602-1 Rating: moderate References: #1172004 Cross-References: CVE-2019-19727 CVE-2020-12693 Affected Products: SUSE Linux Enterprise Module for HPC 15-SP1 SUSE Linux Enterprise High Performance Computing 15-LTSS SUSE Linux Enterprise High Performance Computing 15-ESPOS ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for slurm fixes the following issues: - Fix Authentication Bypass when Message Aggregation is enabled CVE-2020-12693 This fixes and issue where authentication could be bypassed via an alternate path or channel when message Aggregation was enabled. A race condition allowed a user to launch a process as an arbitrary user. Add: Fix-Authentication-Bypass-when-Message-Aggregation-is-enabled-CVE-2020-1269 3.patch (CVE-2020-12693, bsc#1172004). - Remove unneeded build dependency to postgresql-devel. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for HPC 15-SP1: zypper in -t patch SUSE-SLE-Module-HPC-15-SP1-2020-2602=1 - SUSE Linux Enterprise High Performance Computing 15-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-2020-2602=1 - SUSE Linux Enterprise High Performance Computing 15-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-2020-2602=1 Package List: - SUSE Linux Enterprise Module for HPC 15-SP1 (aarch64 x86_64): libslurm32-17.11.13-6.31.1 libslurm32-debuginfo-17.11.13-6.31.1 - SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64): libpmi0-17.11.13-6.31.1 libpmi0-debuginfo-17.11.13-6.31.1 libslurm32-17.11.13-6.31.1 libslurm32-debuginfo-17.11.13-6.31.1 perl-slurm-17.11.13-6.31.1 perl-slurm-debuginfo-17.11.13-6.31.1 slurm-17.11.13-6.31.1 slurm-auth-none-17.11.13-6.31.1 slurm-auth-none-debuginfo-17.11.13-6.31.1 slurm-config-17.11.13-6.31.1 slurm-debuginfo-17.11.13-6.31.1 slurm-debugsource-17.11.13-6.31.1 slurm-devel-17.11.13-6.31.1 slurm-doc-17.11.13-6.31.1 slurm-lua-17.11.13-6.31.1 slurm-lua-debuginfo-17.11.13-6.31.1 slurm-munge-17.11.13-6.31.1 slurm-munge-debuginfo-17.11.13-6.31.1 slurm-node-17.11.13-6.31.1 slurm-node-debuginfo-17.11.13-6.31.1 slurm-pam_slurm-17.11.13-6.31.1 slurm-pam_slurm-debuginfo-17.11.13-6.31.1 slurm-plugins-17.11.13-6.31.1 slurm-plugins-debuginfo-17.11.13-6.31.1 slurm-slurmdbd-17.11.13-6.31.1 slurm-slurmdbd-debuginfo-17.11.13-6.31.1 slurm-sql-17.11.13-6.31.1 slurm-sql-debuginfo-17.11.13-6.31.1 slurm-torque-17.11.13-6.31.1 slurm-torque-debuginfo-17.11.13-6.31.1 - SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64): libpmi0-17.11.13-6.31.1 libpmi0-debuginfo-17.11.13-6.31.1 libslurm32-17.11.13-6.31.1 libslurm32-debuginfo-17.11.13-6.31.1 perl-slurm-17.11.13-6.31.1 perl-slurm-debuginfo-17.11.13-6.31.1 slurm-17.11.13-6.31.1 slurm-auth-none-17.11.13-6.31.1 slurm-auth-none-debuginfo-17.11.13-6.31.1 slurm-config-17.11.13-6.31.1 slurm-debuginfo-17.11.13-6.31.1 slurm-debugsource-17.11.13-6.31.1 slurm-devel-17.11.13-6.31.1 slurm-doc-17.11.13-6.31.1 slurm-lua-17.11.13-6.31.1 slurm-lua-debuginfo-17.11.13-6.31.1 slurm-munge-17.11.13-6.31.1 slurm-munge-debuginfo-17.11.13-6.31.1 slurm-node-17.11.13-6.31.1 slurm-node-debuginfo-17.11.13-6.31.1 slurm-pam_slurm-17.11.13-6.31.1 slurm-pam_slurm-debuginfo-17.11.13-6.31.1 slurm-plugins-17.11.13-6.31.1 slurm-plugins-debuginfo-17.11.13-6.31.1 slurm-slurmdbd-17.11.13-6.31.1 slurm-slurmdbd-debuginfo-17.11.13-6.31.1 slurm-sql-17.11.13-6.31.1 slurm-sql-debuginfo-17.11.13-6.31.1 slurm-torque-17.11.13-6.31.1 slurm-torque-debuginfo-17.11.13-6.31.1 References: https://www.suse.com/security/cve/CVE-2019-19727.html https://www.suse.com/security/cve/CVE-2020-12693.html https://bugzilla.suse.com/1172004 _______________________________________________ sle-security-updates mailing list sle-security-updates@lists.suse.com https://lists.suse.com/mailman/listinfo/sle-security-updates