SUSE-SU-2018:0987-1: moderate: Security update for slurm
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Thu Apr 19 16:07:11 MDT 2018
SUSE Security Update: Security update for slurm
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:0987-1
Rating: moderate
References: #1084125 #1085240 #1088693
Cross-References: CVE-2018-7033
Affected Products:
SUSE Linux Enterprise Module for HPC 12
______________________________________________________________________________
An update that solves one vulnerability and has two fixes
is now available.
Description:
This update for slurm fixes the following issues:
- Fix interaction with systemd: systemd expects that a daemonizing process
doesn't go away until the PID file with it PID of the daemon has bee
written (bsc#1084125).
- Make sure systemd services get restarted only when all packages are in a
consistent state, not in the middle
of an 'update' transaction (bsc#1088693). Since the %postun scripts that
run on update are from the old package they cannot be changed - thus we
work around the restart breakage.
- CVE-2018-7033: Fixed security issue in accounting_storage/mysql plugin
by always escaping strings within the slurmdbd (bsc#1085240).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Module for HPC 12:
zypper in -t patch SUSE-SLE-Module-HPC-12-2018-664=1
Package List:
- SUSE Linux Enterprise Module for HPC 12 (aarch64 x86_64):
libpmi0-17.02.10-6.16.1
libpmi0-debuginfo-17.02.10-6.16.1
libslurm31-17.02.10-6.16.1
libslurm31-debuginfo-17.02.10-6.16.1
perl-slurm-17.02.10-6.16.1
perl-slurm-debuginfo-17.02.10-6.16.1
slurm-17.02.10-6.16.1
slurm-auth-none-17.02.10-6.16.1
slurm-auth-none-debuginfo-17.02.10-6.16.1
slurm-debuginfo-17.02.10-6.16.1
slurm-debugsource-17.02.10-6.16.1
slurm-devel-17.02.10-6.16.1
slurm-doc-17.02.10-6.16.1
slurm-lua-17.02.10-6.16.1
slurm-lua-debuginfo-17.02.10-6.16.1
slurm-munge-17.02.10-6.16.1
slurm-munge-debuginfo-17.02.10-6.16.1
slurm-pam_slurm-17.02.10-6.16.1
slurm-pam_slurm-debuginfo-17.02.10-6.16.1
slurm-plugins-17.02.10-6.16.1
slurm-plugins-debuginfo-17.02.10-6.16.1
slurm-sched-wiki-17.02.10-6.16.1
slurm-slurmdb-direct-17.02.10-6.16.1
slurm-slurmdbd-17.02.10-6.16.1
slurm-slurmdbd-debuginfo-17.02.10-6.16.1
slurm-sql-17.02.10-6.16.1
slurm-sql-debuginfo-17.02.10-6.16.1
slurm-torque-17.02.10-6.16.1
slurm-torque-debuginfo-17.02.10-6.16.1
References:
https://www.suse.com/security/cve/CVE-2018-7033.html
https://bugzilla.suse.com/1084125
https://bugzilla.suse.com/1085240
https://bugzilla.suse.com/1088693
More information about the sle-updates
mailing list