SB2021012911 - Debian update for slurm-llnl



SB2021012911 - Debian update for slurm-llnl

Published: January 29, 2021

Security Bulletin ID SB2021012911
Severity
High
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 25% Low 75%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Improper Privilege Management (CVE-ID: CVE-2019-19728)

The vulnerability allows a local user to escalate privileges.

The vulnerability exists due to Slurm executes srun --uid with incorrect privileges. A local user can escalate privileges on the system.


2) Authentication bypass using an alternate path or channel (CVE-ID: CVE-2020-12693)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to a race condition during authentication process, if Message Aggregation is enabled. A remote non-authenticated attacker can send specially crafted request to the application, bypass authentication process and execute arbitrary code on the system.



3) Buffer overflow (CVE-ID: CVE-2020-27745)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in the PMIx MPI plugin. A local user can run a specially crafted program to trigger buffer overflow in RPC implementation and execute arbitrary code on the system with elevated privileges.


4) Race condition (CVE-ID: CVE-2020-27746)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to a race condition in the xauth for X11 magic cookies when reading data on the /proc filesystem. A local user can exploit the race and gain unauthorized access to sensitive information.


Remediation

Install update from vendor's website.