Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in slurm
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in slurm
ID: SUSE-SU-2020:3506-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Module for HPC 15-SP2
Datum: Di, 24. November 2020, 23:44
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27746
Applikationen: slurm

Originalnachricht


SUSE Security Update: Security update for slurm
______________________________________________________________________________

Announcement ID: SUSE-SU-2020:3506-1
Rating: important
References: #1173805 #1178890 #1178891
Cross-References: CVE-2020-27745 CVE-2020-27746
Affected Products:
SUSE Linux Enterprise Module for HPC 15-SP2
______________________________________________________________________________

An update that solves two vulnerabilities and has one
errata is now available.

Description:

This update for slurm fixes the following issues:

- Updated to 20.02.6:
* CVE-2020-27745: PMIx - fix potential buffer overflows from use of
unpackmem() (bsc#1178890).
* CVE-2020-27746: X11 forwarding - fix potential leak of the magic
cookie when sent as an argument to the xauth command (bsc#1178891).
* Added support for openPMIx (bsc#1173805).


Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Module for HPC 15-SP2:

zypper in -t patch SUSE-SLE-Module-HPC-15-SP2-2020-3506=1



Package List:

- SUSE Linux Enterprise Module for HPC 15-SP2 (aarch64 x86_64):

libnss_slurm2-20.02.6-3.3.4
libnss_slurm2-debuginfo-20.02.6-3.3.4
libpmi0-20.02.6-3.3.4
libpmi0-debuginfo-20.02.6-3.3.4
libslurm35-20.02.6-3.3.4
libslurm35-debuginfo-20.02.6-3.3.4
perl-slurm-20.02.6-3.3.4
perl-slurm-debuginfo-20.02.6-3.3.4
slurm-20.02.6-3.3.4
slurm-auth-none-20.02.6-3.3.4
slurm-auth-none-debuginfo-20.02.6-3.3.4
slurm-config-20.02.6-3.3.4
slurm-config-man-20.02.6-3.3.4
slurm-debuginfo-20.02.6-3.3.4
slurm-debugsource-20.02.6-3.3.4
slurm-devel-20.02.6-3.3.4
slurm-doc-20.02.6-3.3.4
slurm-lua-20.02.6-3.3.4
slurm-lua-debuginfo-20.02.6-3.3.4
slurm-munge-20.02.6-3.3.4
slurm-munge-debuginfo-20.02.6-3.3.4
slurm-node-20.02.6-3.3.4
slurm-node-debuginfo-20.02.6-3.3.4
slurm-pam_slurm-20.02.6-3.3.4
slurm-pam_slurm-debuginfo-20.02.6-3.3.4
slurm-plugins-20.02.6-3.3.4
slurm-plugins-debuginfo-20.02.6-3.3.4
slurm-slurmdbd-20.02.6-3.3.4
slurm-slurmdbd-debuginfo-20.02.6-3.3.4
slurm-sql-20.02.6-3.3.4
slurm-sql-debuginfo-20.02.6-3.3.4
slurm-sview-20.02.6-3.3.4
slurm-sview-debuginfo-20.02.6-3.3.4
slurm-torque-20.02.6-3.3.4
slurm-torque-debuginfo-20.02.6-3.3.4
slurm-webdoc-20.02.6-3.3.4


References:

https://www.suse.com/security/cve/CVE-2020-27745.html
https://www.suse.com/security/cve/CVE-2020-27746.html
https://bugzilla.suse.com/1173805
https://bugzilla.suse.com/1178890
https://bugzilla.suse.com/1178891
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung