SB2021012911 - Debian update for slurm-llnl
Published: January 29, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Improper Privilege Management (CVE-ID: CVE-2019-19728)
The vulnerability allows a local user to escalate privileges.
The vulnerability exists due to Slurm executes srun --uid with incorrect privileges. A local user can escalate privileges on the system.
2) Authentication bypass using an alternate path or channel (CVE-ID: CVE-2020-12693)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to a race condition during authentication process, if Message Aggregation is enabled. A remote non-authenticated attacker can send specially crafted request to the application, bypass authentication process and execute arbitrary code on the system.
3) Buffer overflow (CVE-ID: CVE-2020-27745)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error in the PMIx MPI plugin. A local user can run a specially crafted program to trigger buffer overflow in RPC implementation and execute arbitrary code on the system with elevated privileges.
4) Race condition (CVE-ID: CVE-2020-27746)
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to a race condition in the xauth for X11 magic cookies when reading data on the /proc filesystem. A local user can exploit the race and gain unauthorized access to sensitive information.
Remediation
Install update from vendor's website.