SUSE-SU-2018:0987-1: moderate: Security update for slurm

sle-updates at lists.suse.com sle-updates at lists.suse.com
Thu Apr 19 16:07:11 MDT 2018


   SUSE Security Update: Security update for slurm
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:0987-1
Rating:             moderate
References:         #1084125 #1085240 #1088693 
Cross-References:   CVE-2018-7033
Affected Products:
                    SUSE Linux Enterprise Module for HPC 12
______________________________________________________________________________

   An update that solves one vulnerability and has two fixes
   is now available.

Description:

   This update for slurm fixes the following issues:

   - Fix interaction with systemd: systemd expects that a daemonizing process
     doesn't go away until the PID file with it PID of the daemon has bee
     written (bsc#1084125).

   - Make sure systemd services get restarted only when all packages are in a
     consistent state, not in the middle
     of an 'update' transaction (bsc#1088693). Since the %postun scripts that
      run on update are from the old package they cannot be changed - thus we
      work around the restart breakage.

   - CVE-2018-7033: Fixed security issue in accounting_storage/mysql plugin
     by always escaping strings within the slurmdbd (bsc#1085240).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for HPC 12:

      zypper in -t patch SUSE-SLE-Module-HPC-12-2018-664=1



Package List:

   - SUSE Linux Enterprise Module for HPC 12 (aarch64 x86_64):

      libpmi0-17.02.10-6.16.1
      libpmi0-debuginfo-17.02.10-6.16.1
      libslurm31-17.02.10-6.16.1
      libslurm31-debuginfo-17.02.10-6.16.1
      perl-slurm-17.02.10-6.16.1
      perl-slurm-debuginfo-17.02.10-6.16.1
      slurm-17.02.10-6.16.1
      slurm-auth-none-17.02.10-6.16.1
      slurm-auth-none-debuginfo-17.02.10-6.16.1
      slurm-debuginfo-17.02.10-6.16.1
      slurm-debugsource-17.02.10-6.16.1
      slurm-devel-17.02.10-6.16.1
      slurm-doc-17.02.10-6.16.1
      slurm-lua-17.02.10-6.16.1
      slurm-lua-debuginfo-17.02.10-6.16.1
      slurm-munge-17.02.10-6.16.1
      slurm-munge-debuginfo-17.02.10-6.16.1
      slurm-pam_slurm-17.02.10-6.16.1
      slurm-pam_slurm-debuginfo-17.02.10-6.16.1
      slurm-plugins-17.02.10-6.16.1
      slurm-plugins-debuginfo-17.02.10-6.16.1
      slurm-sched-wiki-17.02.10-6.16.1
      slurm-slurmdb-direct-17.02.10-6.16.1
      slurm-slurmdbd-17.02.10-6.16.1
      slurm-slurmdbd-debuginfo-17.02.10-6.16.1
      slurm-sql-17.02.10-6.16.1
      slurm-sql-debuginfo-17.02.10-6.16.1
      slurm-torque-17.02.10-6.16.1
      slurm-torque-debuginfo-17.02.10-6.16.1


References:

   https://www.suse.com/security/cve/CVE-2018-7033.html
   https://bugzilla.suse.com/1084125
   https://bugzilla.suse.com/1085240
   https://bugzilla.suse.com/1088693



More information about the sle-updates mailing list