SUSE-SU-2017:3311-1: moderate: Security update for slurm
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Thu Dec 14 13:08:51 MST 2017
SUSE Security Update: Security update for slurm
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3311-1
Rating: moderate
References: #1007053 #1031872 #1041706 #1065697 #1067580
Cross-References: CVE-2017-15566
Affected Products:
SUSE Linux Enterprise Module for HPC 12
______________________________________________________________________________
An update that solves one vulnerability and has four fixes
is now available.
Description:
This update for slurm fixes the following issues:
Slurm was updated to 17.02.9 to fix a security bug, bringing new features
and bugfixes (fate#323998 bsc#1067580).
Security issue fixed:
* CVE-2017-15566: Fix security issue in Prolog and Epilog by always
prepending SPANK_ to all user-set environment variables. (bsc#1065697)
Changes in 17.02.9:
* When resuming powered down nodes, mark DOWN nodes right after
ResumeTimeout has been reached (previous logic would wait about one
minute longer).
* Fix sreport not showing full column name for TRES Count.
* Fix slurmdb_reservations_get() giving wrong usage data when job's
spanned reservation that was modified.
* Fix sreport reservation utilization report showing bad data.
* Show all TRES' on a reservation in sreport reservation utilization
report by default.
* Fix sacctmgr show reservation handling "end" parameter.
* Work around issue with sysmacros.h and gcc7 / glibc 2.25.
* Fix layouts code to only allow setting a boolean.
* Fix sbatch --wait to keep waiting even if a message timeout occurs.
* CRAY - If configured with NodeFeatures=knl_cray and there are non-KNL
nodes which include no features the slurmctld will abort without this
patch when attemping strtok_r(NULL).
* Fix regression in 17.02.7 which would run the spank_task_privileged
as part of the slurmstepd instead of it's child process.
Changes in 17.02.8:
* Add 'slurmdbd:' to the accounting plugin to notify message is from
dbd instead of local.
* mpi/mvapich - Buffer being only partially cleared. No failures
observed.
* Fix for job --switch option on dragonfly network.
* In salloc with --uid option, drop supplementary groups before
changing UID.
* jobcomp/elasticsearch - strip any trailing slashes from JobCompLoc.
* jobcomp/elasticsearch - fix memory leak when transferring generated
buffer.
* Prevent slurmstepd ABRT when parsing gres.conf CPUs.
* Fix sbatch --signal to signal all MPI ranks in a step instead of just
those
on node 0.
* Check multiple partition limits when scheduling a job that were
previously
only checked on submit.
* Cray: Avoid running application/step Node Health Check on the
external job step.
* Optimization enhancements for partition based job preemption.
* Address some build warnings from GCC 7.1, and one possible memory
leak if /proc is inaccessible.
* If creating/altering a core based reservation with scontrol/sview on
a remote cluster correctly determine the select type.
* Fix autoconf test for libcurl when clang is used.
* Fix default location for cgroup_allowed_devices_file.conf to use
correct default path.
* Document NewName option to sacctmgr.
* Reject a second PMI2_Init call within a single step to prevent
slurmstepd from hanging.
* Handle old 32bit values stored in the database for requested memory
correctly in sacct.
* Fix memory leaks in the task/cgroup plugin when constraining devices.
* Make extremely verbose info messages debug2 messages in the
task/cgroup plugin when constraining devices.
* Fix issue that would deny the stepd access to /dev/null where GRES
has a 'type' but no file defined.
* Fix issue where the slurmstepd would fatal on job launch if you have
no gres listed in your slurm.conf but some in gres.conf.
* Fix validating time spec to correctly validate various time formats.
* Make scontrol work correctly with job update timelimit [+|-]=.
* Reduce the visibily of a number of warnings in _part_access_check.
* Prevent segfault in sacctmgr if no association name is specified for
an update command.
* burst_buffer/cray plugin modified to work with changes in Cray UP05
software release.
* Fix job reasons for jobs that are violating assoc MaxTRESPerNode
limits.
* Fix segfault when unpacking a 16.05 slurm_cred in a 17.02 daemon.
* Fix setting TRES limits with case insensitive TRES names.
* Add alias for xstrncmp() -- slurm_xstrncmp().
* Fix sorting of case insensitive strings when using xstrcasecmp().
* Gracefully handle race condition when reading /proc as process exits.
* Avoid error on Cray duplicate setup of core specialization.
* Skip over undefined (hidden in Slurm) nodes in pbsnodes.
* Add empty hashes in perl api's slurm_load_node() for hidden nodes.
* CRAY - Add rpath logic to work for the alpscomm libs.
* Fixes for administrator extended TimeLimit (job reason & time limit
reset).
* Fix gres selection on systems running select/linear.
* sview: Added window decorator for maximize,minimize,close buttons for
all systems.
* squeue: interpret negative length format specifiers as a request to
delimit values with spaces.
* Fix the torque pbsnodes wrapper script to parse a gres field with a
type set correctly.
This update also contains pdsh rebuilt against the new libslurm version.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Module for HPC 12:
zypper in -t patch SUSE-SLE-Module-HPC-12-2017-2072=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Module for HPC 12 (aarch64 x86_64):
libpmi0-17.02.9-6.10.1
libpmi0-debuginfo-17.02.9-6.10.1
libslurm29-16.05.8.1-6.1
libslurm29-debuginfo-16.05.8.1-6.1
libslurm31-17.02.9-6.10.1
libslurm31-debuginfo-17.02.9-6.10.1
pdsh-2.33-7.5.17
pdsh-debuginfo-2.33-7.5.17
pdsh-debugsource-2.33-7.5.17
perl-slurm-17.02.9-6.10.1
perl-slurm-debuginfo-17.02.9-6.10.1
slurm-17.02.9-6.10.1
slurm-auth-none-17.02.9-6.10.1
slurm-auth-none-debuginfo-17.02.9-6.10.1
slurm-debuginfo-17.02.9-6.10.1
slurm-debugsource-17.02.9-6.10.1
slurm-devel-17.02.9-6.10.1
slurm-doc-17.02.9-6.10.1
slurm-lua-17.02.9-6.10.1
slurm-lua-debuginfo-17.02.9-6.10.1
slurm-munge-17.02.9-6.10.1
slurm-munge-debuginfo-17.02.9-6.10.1
slurm-pam_slurm-17.02.9-6.10.1
slurm-pam_slurm-debuginfo-17.02.9-6.10.1
slurm-plugins-17.02.9-6.10.1
slurm-plugins-debuginfo-17.02.9-6.10.1
slurm-sched-wiki-17.02.9-6.10.1
slurm-slurmdb-direct-17.02.9-6.10.1
slurm-slurmdbd-17.02.9-6.10.1
slurm-slurmdbd-debuginfo-17.02.9-6.10.1
slurm-sql-17.02.9-6.10.1
slurm-sql-debuginfo-17.02.9-6.10.1
slurm-torque-17.02.9-6.10.1
slurm-torque-debuginfo-17.02.9-6.10.1
References:
https://www.suse.com/security/cve/CVE-2017-15566.html
https://bugzilla.suse.com/1007053
https://bugzilla.suse.com/1031872
https://bugzilla.suse.com/1041706
https://bugzilla.suse.com/1065697
https://bugzilla.suse.com/1067580
More information about the sle-security-updates
mailing list