Package: slurm-wlm / 22.05.8-4+deb12u3

Metadata

Package Version Patches format
slurm-wlm 22.05.8-4+deb12u3 3.0 (quilt)

Patch series

view the series file
Patch File delta Description
mail path | (download)

doc/man/man1/strigger.1 | 4 2 + 2 - 0 !
1 file changed, 2 insertions(+), 2 deletions(-)

 mail command absolute pathname                       
 This patch changes the default command to /usr/bin/mail in various
  configuration files and manual pages.                            
remove google javascript | (download)

doc/html/footer.txt | 13 0 + 13 - 0 !
doc/html/header.txt | 21 0 + 21 - 0 !
2 files changed, 34 deletions(-)

 remove google custom engine queries script
 Remove javascript for the custom google engine queries, in the header
 and in the footer of each html documentation page, to avoid potential
 privacy breach.
sacctmgr increase buffer | (download)

src/sacctmgr/file_functions.c | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 increase size of sacctmgr read buffer
 This patch significantly increases the size of the buffer for reading dumps
 with sacctmgr load. Without this patch, sacctmgr is not able to handle lines
 with more than 4096 which is too small in some cases. Also removed useless
 macro definition in other related file.
pidfile path | (download)

src/common/read_config.h | 4 2 + 2 - 0 !
src/slurmdbd/read_config.h | 2 1 + 1 - 0 !
2 files changed, 3 insertions(+), 3 deletions(-)

 fix default pidfile paths
 This patch points default pidfild paths under /run
rpath | (download)

auxdir/slurm.m4 | 2 1 + 1 - 0 !
configure.ac | 2 1 + 1 - 0 !
2 files changed, 2 insertions(+), 2 deletions(-)

 fix an rpath issue
 The libdir has to match the source package name in order to host
 slurm's private shared library.
miscellanea manpages | (download)

configure.ac | 1 1 + 0 - 0 !
doc/man/Makefile.am | 2 1 + 1 - 0 !
doc/man/man1/Makefile.am | 1 0 + 1 - 0 !
doc/man/man5/slurm.conf.5 | 4 2 + 2 - 0 !
doc/man/man7/Makefile.am | 23 23 + 0 - 0 !
doc/man/man7/slurm.7 | 4 2 + 2 - 0 !
doc/man/man7/spank.7 | 2 1 + 1 - 0 !
doc/man/man8/Makefile.am | 6 2 + 4 - 0 !
8 files changed, 32 insertions(+), 11 deletions(-)

 move general info man pages to the miscellanea section (7)
 This patch moves the general information man pages slurm.1 and spank.8
 to the miscellanea section since they are not related to commands
retry getaddrinfo | (download)

src/common/util-net.c | 14 11 + 3 - 0 !
1 file changed, 11 insertions(+), 3 deletions(-)

 retry getaddrinfo five times before giving up
 This patch retry getaddrinfo five times before giving up and exiting SLURM
 deamons. This is needed on Debian systems when using ifupdown for network
 configuration with allow-hotplug interfaces (which the installer uses by
 default). This settings do not guarantee that getaddrinfo succeed after
 network-online.target is complete.
set_default_cgroup_basedir | (download)

src/common/cgroup.c | 2 2 + 0 - 0 !
1 file changed, 2 insertions(+)

 set the default cgroup basedir
 When cgroup.conf is missing slurmd fails to start even if no cgroup plugin is
 specified. This patch make slurmd behave like cgroup.conf exists and is
 empty
fix spelling error | (download)

src/plugins/accounting_storage/mysql/as_mysql_assoc.c | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 fix spelling error in the mysql plugin
 This patch fix a spelling error in the mysql plugin
force nvml | (download)

src/common/gpu.c | 6 2 + 4 - 0 !
1 file changed, 2 insertions(+), 4 deletions(-)

 force nvml configuration without autodetection
 This patch will force nvml configuration without autodetection at build
 time. This is necessary to enable the nvml contrib plugin
CVE 2023 41914 | (download)

src/common/fd.c | 81 81 + 0 - 0 !
src/common/fd.h | 9 9 + 0 - 0 !
src/common/slurm_xlator.h | 1 1 + 0 - 0 !
src/plugins/acct_gather_profile/hdf5/acct_gather_profile_hdf5.c | 177 156 + 21 - 0 !
src/plugins/job_container/tmpfs/job_container_tmpfs.c | 63 9 + 54 - 0 !
src/plugins/mpi/cray_shasta/apinfo.c | 2 1 + 1 - 0 !
src/plugins/mpi/cray_shasta/mpi_cray_shasta.c | 60 2 + 58 - 0 !
src/plugins/mpi/pmix/pmixp_client.c | 16 4 + 12 - 0 !
src/plugins/mpi/pmix/pmixp_utils.c | 171 40 + 131 - 0 !
src/plugins/mpi/pmix/pmixp_utils.h | 4 1 + 3 - 0 !
src/plugins/switch/cray_aries/iaa.c | 2 1 + 1 - 0 !
src/plugins/switch/cray_aries/switch_cray_aries.h | 1 1 + 0 - 0 !
src/plugins/switch/cray_aries/util.c | 74 2 + 72 - 0 !
src/slurmd/slurmstepd/mgr.c | 55 21 + 34 - 0 !
src/slurmd/slurmstepd/mgr.h | 12 12 + 0 - 0 !
src/slurmd/slurmstepd/slurmstepd.c | 13 12 + 1 - 0 !
16 files changed, 353 insertions(+), 388 deletions(-)

 fix cve-2023-41914
 Fix filesystem handling race conditions that could lead to an attacker
 taking control of an arbitrary file, or removing entire directories'
 contents.
CVE 2023 49933 49935 49936 49937 49938 | (download)

src/common/pack.c | 301 143 + 158 - 0 !
src/common/slurm_cred.c | 81 7 + 74 - 0 !
src/common/slurm_protocol_api.c | 8 4 + 4 - 0 !
src/common/slurm_protocol_pack.c | 10 10 + 0 - 0 !
src/common/slurm_protocol_socket.c | 3 2 + 1 - 0 !
src/plugins/cred/munge/cred_munge.c | 22 12 + 10 - 0 !
src/plugins/cred/none/cred_none.c | 3 2 + 1 - 0 !
7 files changed, 180 insertions(+), 248 deletions(-)

 fix cve-2023-49933/49935/49936/49937/49938
 Fix improper enforcement of message integrity during transmission in a
 communication channel that allows attackers to modify RPC traffic in a way that
 bypasses message hash checks. Fix a NULL pointer dereference that leads to denial of
 service. Fix a double free that allows attackers to cause a denial of service or
 possibly execute arbitrary code. Fix incorrect access control that can enable
 an attacker to modify their extended group list that is used with the sbcast
 subsystem, and open files with an unauthorized set of extended groups.
CVE 2025 4390 | (download)

src/plugins/accounting_storage/mysql/as_mysql_user.c | 10 9 + 1 - 0 !
1 file changed, 9 insertions(+), 1 deletion(-)

 [patch] fix issue where a coord could add a user with elevated
 privileges

Changelog: Fix security issue where a coordinator could add a user with
 elevated privileges. CVE-2025-43904.
Issue: 50391