A slurm-llnl security update has been released for Debian GNU/Linux 10 (Buster) to fix a SQL injection in the MySQL backend
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4572-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
November 18, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : slurm-llnl
CVE ID : CVE-2019-12838
It was discovered in the Simple Linux Utility for Resource Management
(SLURM), a cluster resource management and job scheduling system did
not escape strings when importing an archive file into the
accounting_storage/mysql backend, resulting in SQL injection.
For the stable distribution (buster), this problem has been fixed in
version 18.08.5.2-1+deb10u1.
We recommend that you upgrade your slurm-llnl packages.
For the detailed security status of slurm-llnl please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/slurm-llnl
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/