[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 2143-1] slurm-llnl security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : slurm-llnl
Version        : 14.03.9-5+deb8u5
CVE ID         : CVE-2019-6438 CVE-2019-12838
Debian Bug     : 920997 931880


Several issue were found in Simple Linux Utility for Resource
Management (SLURM), a cluster resource management and job scheduling
system.

CVE-2019-6438

    SchedMD Slurm mishandles 32-bit systems, causing a heap overflow
    in xmalloc.

CVE-2019-12838

    SchedMD Slurm did not escape strings when importing an archive
    file into the accounting_storage/mysql backend, resulting in SQL
    injection.

For Debian 8 "Jessie", these problems have been fixed in version
14.03.9-5+deb8u5.

We recommend that you upgrade your slurm-llnl packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEQic8GuN/xDR88HkSj/HLbo2JBZ8FAl5vZVwACgkQj/HLbo2J
BZ9Uvwf/Qc/I9AJIPpur2W7oY5y2e0tl0pRjvpWETwIxYG6nkU/mQg2X3Casj4v6
jLMHuROFVSYB72cUtX3SZMNfVQyK0ZjunbJ5JNgBhFOtktkpAbyhdUbvZVu/1JlL
wA1XsJidOc44yBh17t1uglsoX87O9AO878ltbHmfByvn8sj3tQe8zWYlHzWqp62q
OtVvTRqR4sscpEvWf3mtF+wvAa8byQGQENpomyZNa2AQ9YoftH6SK8tUHZBuEXjI
/vltC5YAHBy2fyKB7ZvHldYPoXV/wElto3BEmgqa5mdIXZhhn983hQKONkkWtdy3
d4HxLy5GJPZFbyVeDgTLb4x9tFNlag==
=aQPx
-----END PGP SIGNATURE-----


Reply to: