QID 174796

Date Published: 2021-04-19

QID 174796: SUSE Enterprise Linux Security update for slurm_20_11 and pdsh (SUSE-SU-2021:0773-1)

This update for pdsh fixes the following issues:

- Preparing pdsh for Slurm 20.11 (jsc#ECO-2412)
- Simplify convoluted condition.

This update for slurm fixes the following issues:

- Fix potential buffer overflows from use of unpackmem(). CVE-2020-27745
(bsc#1178890)
- Fix potential leak of the magic cookie when sent as an argument to the
xauth command. CVE-2020-27746 (bsc#1178891)
- Add support for openPMIx also for Leap/SLE 15.0/1 (bsc#1173805).
- Updated to 20.02.3 which fixes CVE-2020-12693 (bsc#1172004).
- slurm-plugins will now also require pmix not only libpmix (bsc#1164326)
- Removed autopatch as it doesn't work for the SLE-11-SP4 build.
- Disable %arm builds as this is no longer supported.
- pmix searches now also for libpmix.so.2 so that there is no dependency
for devel package (bsc#1164386)
- Update to version 20.02.0 (jsc#SLE-8491)
* Fix minor memory leak in slurmd on reconfig.
* Fix invalid ptr reference when rolling up data in the database.
* Change shtml2html.py to require python3 for RHEL8 support, and match
man2html.py.
* slurm.spec - override "hardening" linker flags to ensure RHEL8 builds
in a usable manner.
* Fix type mismatches in the perl API.
* Prevent use of uninitialized slurmctld_diag_stats.
* Fixed various Coverity issues.
* Only show warning about root-less topology in daemons.
* Fix accounting of jobs in IGNORE_JOBS reservations.
* Fix issue with batch steps state not loading correctly when upgrading
from 19.05.
* Deprecate max_depend_depth in SchedulerParameters and move it to
DependencyParameters.
* Silence erroneous error on slurmctld upgrade when loading federation
state.
* Break infinite loop in cons_tres dealing with incorrect tasks per tres
request resulting in slurmctld hang.
* Improve handling of --gpus-per-task to make sure appropriate number of
GPUs is assigned to job.
* Fix seg fault on cons_res when requesting --spread-job.

- Move to python3 for everything but SLE-11-SP4
* For SLE-11-SP4 add a workaround to handle a python3 script (python2.7
compliant).

* sbatch - fix segfault when no newline at the end of a burst buffer
file.
* Change scancel to only check job's base state when matching -t options.
* Save job dependency list in state files.
* cons_tres - allow jobs to be run on systems with root-less topologies.
* Restore pre-20.02pre1 PrologSlurmctld synchonization behavior to avoid
various race conditions, and ensure proper batch job launch.
* Add new slurmrestd command/daemon which implements the Slurm REST API.

- standard slurm.conf uses now also SlurmctldHost on all build targets
(bsc#1162377)

- start slurmdbd after mariadb (bsc#1161716)

- Update to version 19.05.5 (jsc#SLE-8491)
* Includes security fixes CVE-2019-19727, CVE-2019-19728, CVE-2019-12838.
* Disable i586 builds as this is no longer supported.
* Create libnss_slurm package to support user and group resolution thru
slurmstepd.

- Update to v18.08.9 for fixing CVE-2019-19728 (bsc#1159692).
* Make Slurm compile on linux after sys/sysctl.h was deprecated.
* Install slurmdbd.conf.example with 0600 permissions to encourage
secure use. CVE-2019-19727.
* srun - do not continue with job launch if --uid fails. CVE-2019-19728.

- added pmix support jsc#SLE-10800

- Use --with-shared-libslurm to build slurm binaries using libslurm.
- Make libslurm depend on slurm-config.

- Fix ownership of /var/spool/slurm on new installations and upgrade
(bsc#1158696).

- Fi[...]

Successful exploitation allows attacker to compromise the system.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.6 severity.
  • Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: https://lists.suse.com/pipermail/sle-security-updates/2021-March/008484.html to address this issue and obtain further details.
    Software Advisories
    Advisory ID Software Component Link
    SUSE-SU-2021:0773-1 SUSE Enterprise Linux URL Logo lists.suse.com/pipermail/sle-security-updates/2021-March/008484.html