SUSE: 2020:0110-1 important: slurm
Summary
This update for slurm to version 18.08.9 fixes the following issues: Security issues fixed: - CVE-2019-19728: Fixed a privilege escalation with srun, where --uid might have unintended side effects (bsc#1159692). - CVE-2019-12838: Fixed SchedMD Slurm SQL Injection issue (bnc#1140709). - CVE-2019-19727: Fixed permissions of slurmdbd.conf (bsc#1155784). Bug fixes: - Fix ownership of /var/spool/slurm on new installations and upgrade (bsc#1158696). - Fix %posttrans macro _res_update to cope with added newline (bsc#1153259). - Move srun from 'slurm' to 'slurm-node': srun is required on the nodes as well so sbatch will work. 'slurm-node' is a requirement when 'slurm' is installed (bsc#1153095). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Ent...
Read the Full AdvisoryReferences
#1140709 #1153095 #1153259 #1155784 #1158696
#1159692
Cross- CVE-2019-12838 CVE-2019-19727 CVE-2019-19728
Affected Products:
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1
SUSE Linux Enterprise Module for HPC 15-SP1
https://www.suse.com/security/cve/CVE-2019-12838.html
https://www.suse.com/security/cve/CVE-2019-19727.html
https://www.suse.com/security/cve/CVE-2019-19728.html
https://bugzilla.suse.com/1140709
https://bugzilla.suse.com/1153095
https://bugzilla.suse.com/1153259
https://bugzilla.suse.com/1155784
https://bugzilla.suse.com/1158696
https://bugzilla.suse.com/1159692