Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2024:0284-1

Опубликовано: 31 янв. 2024
Источник: suse-cvrf

Описание

Security update for slurm

This update for slurm fixes the following issues:

Update to slurm 23.02.6:

Security fixes:

  • CVE-2023-49933: Prevent message extension attacks that could bypass the message hash. (bsc#1218046)
  • CVE-2023-49935: Prevent message hash bypass in slurmd which can allow an attacker to reuse root-level MUNGE tokens and escalate permissions. (bsc#1218049)
  • CVE-2023-49936: Prevent NULL pointer dereference on size_valp overflow. (bsc#1218050)
  • CVE-2023-49937: Prevent double-xfree() on error in _unpack_node_reg_resp(). (bsc#1218051)
  • CVE-2023-49938: Prevent modified sbcast RPCs from opening a file with the wrong group permissions. (bsc#1218053)

Other fixes:

  • Add missing service file for slurmrestd (bsc#1217711).
  • Fix slurm upgrading to incompatible versions (bsc#1216869).

Список пакетов

SUSE Linux Enterprise Module for HPC 15 SP5
libnss_slurm2-23.02.7-150500.5.15.1
libpmi0-23.02.7-150500.5.15.1
libslurm39-23.02.7-150500.5.15.1
perl-slurm-23.02.7-150500.5.15.1
slurm-23.02.7-150500.5.15.1
slurm-auth-none-23.02.7-150500.5.15.1
slurm-config-23.02.7-150500.5.15.1
slurm-config-man-23.02.7-150500.5.15.1
slurm-cray-23.02.7-150500.5.15.1
slurm-devel-23.02.7-150500.5.15.1
slurm-doc-23.02.7-150500.5.15.1
slurm-lua-23.02.7-150500.5.15.1
slurm-munge-23.02.7-150500.5.15.1
slurm-node-23.02.7-150500.5.15.1
slurm-pam_slurm-23.02.7-150500.5.15.1
slurm-plugin-ext-sensors-rrd-23.02.7-150500.5.15.1
slurm-plugins-23.02.7-150500.5.15.1
slurm-rest-23.02.7-150500.5.15.1
slurm-slurmdbd-23.02.7-150500.5.15.1
slurm-sql-23.02.7-150500.5.15.1
slurm-sview-23.02.7-150500.5.15.1
slurm-torque-23.02.7-150500.5.15.1
slurm-webdoc-23.02.7-150500.5.15.1
SUSE Linux Enterprise Module for Package Hub 15 SP5
libnss_slurm2-23.02.7-150500.5.15.1
libpmi0-23.02.7-150500.5.15.1
perl-slurm-23.02.7-150500.5.15.1
slurm-23.02.7-150500.5.15.1
slurm-auth-none-23.02.7-150500.5.15.1
slurm-config-23.02.7-150500.5.15.1
slurm-config-man-23.02.7-150500.5.15.1
slurm-cray-23.02.7-150500.5.15.1
slurm-devel-23.02.7-150500.5.15.1
slurm-doc-23.02.7-150500.5.15.1
slurm-hdf5-23.02.7-150500.5.15.1
slurm-lua-23.02.7-150500.5.15.1
slurm-munge-23.02.7-150500.5.15.1
slurm-node-23.02.7-150500.5.15.1
slurm-openlava-23.02.7-150500.5.15.1
slurm-pam_slurm-23.02.7-150500.5.15.1
slurm-plugins-23.02.7-150500.5.15.1
slurm-rest-23.02.7-150500.5.15.1
slurm-seff-23.02.7-150500.5.15.1
slurm-sjstat-23.02.7-150500.5.15.1
slurm-slurmdbd-23.02.7-150500.5.15.1
slurm-sql-23.02.7-150500.5.15.1
slurm-sview-23.02.7-150500.5.15.1
slurm-torque-23.02.7-150500.5.15.1
slurm-webdoc-23.02.7-150500.5.15.1
openSUSE Leap 15.5
libnss_slurm2-23.02.7-150500.5.15.1
libpmi0-23.02.7-150500.5.15.1
libslurm39-23.02.7-150500.5.15.1
perl-slurm-23.02.7-150500.5.15.1
slurm-23.02.7-150500.5.15.1
slurm-auth-none-23.02.7-150500.5.15.1
slurm-config-23.02.7-150500.5.15.1
slurm-config-man-23.02.7-150500.5.15.1
slurm-cray-23.02.7-150500.5.15.1
slurm-devel-23.02.7-150500.5.15.1
slurm-doc-23.02.7-150500.5.15.1
slurm-hdf5-23.02.7-150500.5.15.1
slurm-lua-23.02.7-150500.5.15.1
slurm-munge-23.02.7-150500.5.15.1
slurm-node-23.02.7-150500.5.15.1
slurm-openlava-23.02.7-150500.5.15.1
slurm-pam_slurm-23.02.7-150500.5.15.1
slurm-plugin-ext-sensors-rrd-23.02.7-150500.5.15.1
slurm-plugins-23.02.7-150500.5.15.1
slurm-rest-23.02.7-150500.5.15.1
slurm-seff-23.02.7-150500.5.15.1
slurm-sjstat-23.02.7-150500.5.15.1
slurm-slurmdbd-23.02.7-150500.5.15.1
slurm-sql-23.02.7-150500.5.15.1
slurm-sview-23.02.7-150500.5.15.1
slurm-testsuite-23.02.7-150500.5.15.1
slurm-torque-23.02.7-150500.5.15.1
slurm-webdoc-23.02.7-150500.5.15.1

Описание

An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. There is Improper Enforcement of Message Integrity During Transmission in a Communication Channel. This allows attackers to modify RPC traffic in a way that bypasses message hash checks. The fixed versions are 22.05.11, 23.02.7, and 23.11.1.


Затронутые продукты
SUSE Linux Enterprise Module for HPC 15 SP5:libnss_slurm2-23.02.7-150500.5.15.1
SUSE Linux Enterprise Module for HPC 15 SP5:libpmi0-23.02.7-150500.5.15.1
SUSE Linux Enterprise Module for HPC 15 SP5:libslurm39-23.02.7-150500.5.15.1
SUSE Linux Enterprise Module for HPC 15 SP5:perl-slurm-23.02.7-150500.5.15.1

Ссылки

Описание

An issue was discovered in SchedMD Slurm 23.02.x and 23.11.x. There is Incorrect Access Control because of a slurmd Message Integrity Bypass. An attacker can reuse root-level authentication tokens during interaction with the slurmd process. This bypasses the RPC message hashes that protect against undesired MUNGE credential reuse. The fixed versions are 23.02.7 and 23.11.1.


Затронутые продукты
SUSE Linux Enterprise Module for HPC 15 SP5:libnss_slurm2-23.02.7-150500.5.15.1
SUSE Linux Enterprise Module for HPC 15 SP5:libpmi0-23.02.7-150500.5.15.1
SUSE Linux Enterprise Module for HPC 15 SP5:libslurm39-23.02.7-150500.5.15.1
SUSE Linux Enterprise Module for HPC 15 SP5:perl-slurm-23.02.7-150500.5.15.1

Ссылки

Описание

An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. A NULL pointer dereference leads to denial of service. The fixed versions are 22.05.11, 23.02.7, and 23.11.1.


Затронутые продукты
SUSE Linux Enterprise Module for HPC 15 SP5:libnss_slurm2-23.02.7-150500.5.15.1
SUSE Linux Enterprise Module for HPC 15 SP5:libpmi0-23.02.7-150500.5.15.1
SUSE Linux Enterprise Module for HPC 15 SP5:libslurm39-23.02.7-150500.5.15.1
SUSE Linux Enterprise Module for HPC 15 SP5:perl-slurm-23.02.7-150500.5.15.1

Ссылки

Описание

An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. Because of a double free, attackers can cause a denial of service or possibly execute arbitrary code. The fixed versions are 22.05.11, 23.02.7, and 23.11.1.


Затронутые продукты
SUSE Linux Enterprise Module for HPC 15 SP5:libnss_slurm2-23.02.7-150500.5.15.1
SUSE Linux Enterprise Module for HPC 15 SP5:libpmi0-23.02.7-150500.5.15.1
SUSE Linux Enterprise Module for HPC 15 SP5:libslurm39-23.02.7-150500.5.15.1
SUSE Linux Enterprise Module for HPC 15 SP5:perl-slurm-23.02.7-150500.5.15.1

Ссылки

Описание

An issue was discovered in SchedMD Slurm 22.05.x and 23.02.x. There is Incorrect Access Control: an attacker can modified their extended group list that is used with the sbcast subsystem, and open files with an unauthorized set of extended groups. The fixed versions are 22.05.11 and 23.02.7.


Затронутые продукты
SUSE Linux Enterprise Module for HPC 15 SP5:libnss_slurm2-23.02.7-150500.5.15.1
SUSE Linux Enterprise Module for HPC 15 SP5:libpmi0-23.02.7-150500.5.15.1
SUSE Linux Enterprise Module for HPC 15 SP5:libslurm39-23.02.7-150500.5.15.1
SUSE Linux Enterprise Module for HPC 15 SP5:perl-slurm-23.02.7-150500.5.15.1

Ссылки