SUSE-SU-2020:3506-1: important: Security update for slurm

sle-updates at lists.suse.com sle-updates at lists.suse.com
Tue Nov 24 13:22:58 MST 2020


   SUSE Security Update: Security update for slurm
______________________________________________________________________________

Announcement ID:    SUSE-SU-2020:3506-1
Rating:             important
References:         #1173805 #1178890 #1178891 
Cross-References:   CVE-2020-27745 CVE-2020-27746
Affected Products:
                    SUSE Linux Enterprise Module for HPC 15-SP2
______________________________________________________________________________

   An update that solves two vulnerabilities and has one
   errata is now available.

Description:

   This update for slurm fixes the following issues:

   - Updated to 20.02.6:
     * CVE-2020-27745: PMIx - fix potential buffer overflows from use of
       unpackmem() (bsc#1178890).
     * CVE-2020-27746: X11 forwarding - fix potential leak of the magic
       cookie when sent as an argument to the xauth command (bsc#1178891).
     * Added support for openPMIx (bsc#1173805).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for HPC 15-SP2:

      zypper in -t patch SUSE-SLE-Module-HPC-15-SP2-2020-3506=1



Package List:

   - SUSE Linux Enterprise Module for HPC 15-SP2 (aarch64 x86_64):

      libnss_slurm2-20.02.6-3.3.4
      libnss_slurm2-debuginfo-20.02.6-3.3.4
      libpmi0-20.02.6-3.3.4
      libpmi0-debuginfo-20.02.6-3.3.4
      libslurm35-20.02.6-3.3.4
      libslurm35-debuginfo-20.02.6-3.3.4
      perl-slurm-20.02.6-3.3.4
      perl-slurm-debuginfo-20.02.6-3.3.4
      slurm-20.02.6-3.3.4
      slurm-auth-none-20.02.6-3.3.4
      slurm-auth-none-debuginfo-20.02.6-3.3.4
      slurm-config-20.02.6-3.3.4
      slurm-config-man-20.02.6-3.3.4
      slurm-debuginfo-20.02.6-3.3.4
      slurm-debugsource-20.02.6-3.3.4
      slurm-devel-20.02.6-3.3.4
      slurm-doc-20.02.6-3.3.4
      slurm-lua-20.02.6-3.3.4
      slurm-lua-debuginfo-20.02.6-3.3.4
      slurm-munge-20.02.6-3.3.4
      slurm-munge-debuginfo-20.02.6-3.3.4
      slurm-node-20.02.6-3.3.4
      slurm-node-debuginfo-20.02.6-3.3.4
      slurm-pam_slurm-20.02.6-3.3.4
      slurm-pam_slurm-debuginfo-20.02.6-3.3.4
      slurm-plugins-20.02.6-3.3.4
      slurm-plugins-debuginfo-20.02.6-3.3.4
      slurm-slurmdbd-20.02.6-3.3.4
      slurm-slurmdbd-debuginfo-20.02.6-3.3.4
      slurm-sql-20.02.6-3.3.4
      slurm-sql-debuginfo-20.02.6-3.3.4
      slurm-sview-20.02.6-3.3.4
      slurm-sview-debuginfo-20.02.6-3.3.4
      slurm-torque-20.02.6-3.3.4
      slurm-torque-debuginfo-20.02.6-3.3.4
      slurm-webdoc-20.02.6-3.3.4


References:

   https://www.suse.com/security/cve/CVE-2020-27745.html
   https://www.suse.com/security/cve/CVE-2020-27746.html
   https://bugzilla.suse.com/1173805
   https://bugzilla.suse.com/1178890
   https://bugzilla.suse.com/1178891



More information about the sle-updates mailing list