SUSE-SU-2020:3506-1: important: Security update for slurm
    sle-updates at lists.suse.com 
    sle-updates at lists.suse.com
       
    Tue Nov 24 13:22:58 MST 2020
    
    
  
   SUSE Security Update: Security update for slurm
______________________________________________________________________________
Announcement ID:    SUSE-SU-2020:3506-1
Rating:             important
References:         #1173805 #1178890 #1178891 
Cross-References:   CVE-2020-27745 CVE-2020-27746
Affected Products:
                    SUSE Linux Enterprise Module for HPC 15-SP2
______________________________________________________________________________
   An update that solves two vulnerabilities and has one
   errata is now available.
Description:
   This update for slurm fixes the following issues:
   - Updated to 20.02.6:
     * CVE-2020-27745: PMIx - fix potential buffer overflows from use of
       unpackmem() (bsc#1178890).
     * CVE-2020-27746: X11 forwarding - fix potential leak of the magic
       cookie when sent as an argument to the xauth command (bsc#1178891).
     * Added support for openPMIx (bsc#1173805).
Patch Instructions:
   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".
   Alternatively you can run the command listed for your product:
   - SUSE Linux Enterprise Module for HPC 15-SP2:
      zypper in -t patch SUSE-SLE-Module-HPC-15-SP2-2020-3506=1
Package List:
   - SUSE Linux Enterprise Module for HPC 15-SP2 (aarch64 x86_64):
      libnss_slurm2-20.02.6-3.3.4
      libnss_slurm2-debuginfo-20.02.6-3.3.4
      libpmi0-20.02.6-3.3.4
      libpmi0-debuginfo-20.02.6-3.3.4
      libslurm35-20.02.6-3.3.4
      libslurm35-debuginfo-20.02.6-3.3.4
      perl-slurm-20.02.6-3.3.4
      perl-slurm-debuginfo-20.02.6-3.3.4
      slurm-20.02.6-3.3.4
      slurm-auth-none-20.02.6-3.3.4
      slurm-auth-none-debuginfo-20.02.6-3.3.4
      slurm-config-20.02.6-3.3.4
      slurm-config-man-20.02.6-3.3.4
      slurm-debuginfo-20.02.6-3.3.4
      slurm-debugsource-20.02.6-3.3.4
      slurm-devel-20.02.6-3.3.4
      slurm-doc-20.02.6-3.3.4
      slurm-lua-20.02.6-3.3.4
      slurm-lua-debuginfo-20.02.6-3.3.4
      slurm-munge-20.02.6-3.3.4
      slurm-munge-debuginfo-20.02.6-3.3.4
      slurm-node-20.02.6-3.3.4
      slurm-node-debuginfo-20.02.6-3.3.4
      slurm-pam_slurm-20.02.6-3.3.4
      slurm-pam_slurm-debuginfo-20.02.6-3.3.4
      slurm-plugins-20.02.6-3.3.4
      slurm-plugins-debuginfo-20.02.6-3.3.4
      slurm-slurmdbd-20.02.6-3.3.4
      slurm-slurmdbd-debuginfo-20.02.6-3.3.4
      slurm-sql-20.02.6-3.3.4
      slurm-sql-debuginfo-20.02.6-3.3.4
      slurm-sview-20.02.6-3.3.4
      slurm-sview-debuginfo-20.02.6-3.3.4
      slurm-torque-20.02.6-3.3.4
      slurm-torque-debuginfo-20.02.6-3.3.4
      slurm-webdoc-20.02.6-3.3.4
References:
   https://www.suse.com/security/cve/CVE-2020-27745.html
   https://www.suse.com/security/cve/CVE-2020-27746.html
   https://bugzilla.suse.com/1173805
   https://bugzilla.suse.com/1178890
   https://bugzilla.suse.com/1178891
    
    
More information about the sle-updates
mailing list