SUSE Security Update: Security update for slurm
______________________________________________________________________________

Announcement ID:    SUSE-SU-2020:3506-1
Rating:             important
References:         #1173805 #1178890 #1178891 
Cross-References:   CVE-2020-27745 CVE-2020-27746
Affected Products:
                    SUSE Linux Enterprise Module for HPC 15-SP2
______________________________________________________________________________

   An update that solves two vulnerabilities and has one
   errata is now available.

Description:

   This update for slurm fixes the following issues:

   - Updated to 20.02.6:
     * CVE-2020-27745: PMIx - fix potential buffer overflows from use of
       unpackmem() (bsc#1178890).
     * CVE-2020-27746: X11 forwarding - fix potential leak of the magic
       cookie when sent as an argument to the xauth command (bsc#1178891).
     * Added support for openPMIx (bsc#1173805).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for HPC 15-SP2:

      zypper in -t patch SUSE-SLE-Module-HPC-15-SP2-2020-3506=1



Package List:

   - SUSE Linux Enterprise Module for HPC 15-SP2 (aarch64 x86_64):

      libnss_slurm2-20.02.6-3.3.4
      libnss_slurm2-debuginfo-20.02.6-3.3.4
      libpmi0-20.02.6-3.3.4
      libpmi0-debuginfo-20.02.6-3.3.4
      libslurm35-20.02.6-3.3.4
      libslurm35-debuginfo-20.02.6-3.3.4
      perl-slurm-20.02.6-3.3.4
      perl-slurm-debuginfo-20.02.6-3.3.4
      slurm-20.02.6-3.3.4
      slurm-auth-none-20.02.6-3.3.4
      slurm-auth-none-debuginfo-20.02.6-3.3.4
      slurm-config-20.02.6-3.3.4
      slurm-config-man-20.02.6-3.3.4
      slurm-debuginfo-20.02.6-3.3.4
      slurm-debugsource-20.02.6-3.3.4
      slurm-devel-20.02.6-3.3.4
      slurm-doc-20.02.6-3.3.4
      slurm-lua-20.02.6-3.3.4
      slurm-lua-debuginfo-20.02.6-3.3.4
      slurm-munge-20.02.6-3.3.4
      slurm-munge-debuginfo-20.02.6-3.3.4
      slurm-node-20.02.6-3.3.4
      slurm-node-debuginfo-20.02.6-3.3.4
      slurm-pam_slurm-20.02.6-3.3.4
      slurm-pam_slurm-debuginfo-20.02.6-3.3.4
      slurm-plugins-20.02.6-3.3.4
      slurm-plugins-debuginfo-20.02.6-3.3.4
      slurm-slurmdbd-20.02.6-3.3.4
      slurm-slurmdbd-debuginfo-20.02.6-3.3.4
      slurm-sql-20.02.6-3.3.4
      slurm-sql-debuginfo-20.02.6-3.3.4
      slurm-sview-20.02.6-3.3.4
      slurm-sview-debuginfo-20.02.6-3.3.4
      slurm-torque-20.02.6-3.3.4
      slurm-torque-debuginfo-20.02.6-3.3.4
      slurm-webdoc-20.02.6-3.3.4


References:

   https://www.suse.com/security/cve/CVE-2020-27745.html
   https://www.suse.com/security/cve/CVE-2020-27746.html
   https://bugzilla.suse.com/1173805
   https://bugzilla.suse.com/1178890
   https://bugzilla.suse.com/1178891

SUSE: 2020:3506-1 important: slurm

November 24, 2020
An update that solves two vulnerabilities and has one errata is now available

Summary

This update for slurm fixes the following issues: - Updated to 20.02.6: * CVE-2020-27745: PMIx - fix potential buffer overflows from use of unpackmem() (bsc#1178890). * CVE-2020-27746: X11 forwarding - fix potential leak of the magic cookie when sent as an argument to the xauth command (bsc#1178891). * Added support for openPMIx (bsc#1173805). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for HPC 15-SP2: zypper in -t patch SUSE-SLE-Module-HPC-15-SP2-2020-3506=1 Package List: - SUSE Linux Enterprise Module for HPC 15-SP2 (aarch64 x86_64): libnss_slurm2-20.02.6-3.3.4 libnss_slurm2-debuginfo-20.02.6-3.3.4 libpmi0-20.02.6-3.3.4 libpmi0-debuginfo-20.02.6-3.3.4 libslurm35-20.02.6-3.3.4 libslurm35-debuginfo-20.02.6-3.3.4 perl-slurm-20.02.6-3.3.4 perl-slurm-debuginfo-20.02.6-3.3.4 slurm-20.02.6-3.3.4 slurm-auth-none-20.02.6-3.3.4 slurm-auth-none-debuginfo-20.02.6-3.3.4 slurm-config-20.02.6-3.3.4 slurm-config-man-20.02.6-3.3.4 slurm-debuginfo-20.02.6-3.3.4 slurm-debugsource-20.02.6-3.3.4 slurm-devel-20.02.6-3.3.4 slurm-doc-20.02.6-3.3.4 slurm-lua-20.02.6-3.3.4 slurm-lua-debuginfo-20.02.6-3.3.4 slurm-munge-20.02.6-3.3.4 slurm-munge-debuginfo-20.02.6-3.3.4 slurm-node-20.02.6-3.3.4 slurm-node-debuginfo-20.02.6-3.3.4 slurm-pam_slurm-20.02.6-3.3.4 slurm-pam_slurm-debuginfo-20.02.6-3.3.4 slurm-plugins-20.02.6-3.3.4 slurm-plugins-debuginfo-20.02.6-3.3.4 slurm-slurmdbd-20.02.6-3.3.4 slurm-slurmdbd-debuginfo-20.02.6-3.3.4 slurm-sql-20.02.6-3.3.4 slurm-sql-debuginfo-20.02.6-3.3.4 slurm-sview-20.02.6-3.3.4 slurm-sview-debuginfo-20.02.6-3.3.4 slurm-torque-20.02.6-3.3.4 slurm-torque-debuginfo-20.02.6-3.3.4 slurm-webdoc-20.02.6-3.3.4

References

#1173805 #1178890 #1178891

Cross- CVE-2020-27745 CVE-2020-27746

Affected Products:

SUSE Linux Enterprise Module for HPC 15-SP2

https://www.suse.com/security/cve/CVE-2020-27745.html

https://www.suse.com/security/cve/CVE-2020-27746.html

https://bugzilla.suse.com/1173805

https://bugzilla.suse.com/1178890

https://bugzilla.suse.com/1178891

Severity
Announcement ID: SUSE-SU-2020:3506-1
Rating: important

Related News