Malware Devil

Monday, March 15, 2021

ESB-2021.0902 – [SUSE] slurm_20_11 and pdsh: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0902
                 Security update for slurm_20_11 and pdsh
                               15 March 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           slurm_20_11
                   pdsh
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Root Compromise                 -- Existing Account      
                   Modify Arbitrary Files          -- Remote/Unauthenticated
                   Denial of Service               -- Existing Account      
                   Access Confidential Data        -- Remote/Unauthenticated
                   Reduced Security                -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-27746 CVE-2020-27745 CVE-2020-12693
                   CVE-2019-19728 CVE-2019-19727 CVE-2019-12838
                   CVE-2019-6438 CVE-2018-10995 CVE-2018-7033
                   CVE-2017-15566 CVE-2016-10030 

Reference:         ESB-2021.0322
                   ESB-2021.0202.2
                   ESB-2020.3134

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2021/suse-su-20210773-1

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for slurm_20_11 and pdsh

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:0773-1
Rating:            important
References:        #1018371 #1065697 #1085240 #1095508 #1123304 #1140709
                   #1155784 #1159692 #1172004 #1178890 #1178891
Cross-References:  CVE-2016-10030 CVE-2017-15566 CVE-2018-10995 CVE-2018-7033
                   CVE-2019-12838 CVE-2019-19727 CVE-2019-19728 CVE-2019-6438
                   CVE-2020-12693 CVE-2020-27745 CVE-2020-27746
Affected Products:
                   SUSE Linux Enterprise Module for HPC 12
______________________________________________________________________________

An update that fixes 11 vulnerabilities, contains one feature is now available.

Description:

This update for pdsh fixes the following issues:

  o Preparing pdsh for Slurm 20.11 (jsc#ECO-2412)
  o Simplify convoluted condition.


This update for slurm fixes the following issues:


  o Fix potential buffer overflows from use of unpackmem(). CVE-2020-27745 (bsc
    #1178890)
  o Fix potential leak of the magic cookie when sent as an argument to the
    xauth command. CVE-2020-27746 (bsc#1178891)
  o Add support for openPMIx also for Leap/SLE 15.0/1 (bsc#1173805).
  o Updated to 20.02.3 which fixes CVE-2020-12693 (bsc#1172004).
  o slurm-plugins will now also require pmix not only libpmix (bsc#1164326)
  o Removed autopatch as it doesn't work for the SLE-11-SP4 build.
  o Disable %arm builds as this is no longer supported.
  o pmix searches now also for libpmix.so.2 so that there is no dependency for
    devel package (bsc#1164386)
  o Update to version 20.02.0 (jsc#SLE-8491) * Fix minor memory leak in slurmd
    on reconfig. * Fix invalid ptr reference when rolling up data in the
    database. * Change shtml2html.py to require python3 for RHEL8 support, and
    match man2html.py. * slurm.spec - override "hardening" linker flags to
    ensure RHEL8 builds in a usable manner. * Fix type mismatches in the perl
    API. * Prevent use of uninitialized slurmctld_diag_stats. * Fixed various
    Coverity issues. * Only show warning about root-less topology in daemons. *
    Fix accounting of jobs in IGNORE_JOBS reservations. * Fix issue with batch
    steps state not loading correctly when upgrading from 19.05. * Deprecate
    max_depend_depth in SchedulerParameters and move it to
    DependencyParameters. * Silence erroneous error on slurmctld upgrade when
    loading federation state. * Break infinite loop in cons_tres dealing with
    incorrect tasks per tres request resulting in slurmctld hang. * Improve
    handling of --gpus-per-task to make sure appropriate number of GPUs is
    assigned to job. * Fix seg fault on cons_res when requesting --spread-job.


  o Move to python3 for everything but SLE-11-SP4 * For SLE-11-SP4 add a
    workaround to handle a python3 script (python2.7 compliant).


* sbatch - fix segfault when no newline at the end of a burst buffer file. *
Change scancel to only check job's base state when matching -t options. * Save
job dependency list in state files. * cons_tres - allow jobs to be run on
systems with root-less topologies. * Restore pre-20.02pre1 PrologSlurmctld
synchonization behavior to avoid various race conditions, and ensure proper
batch job launch. * Add new slurmrestd command/daemon which implements the
Slurm REST API.

  o standard slurm.conf uses now also SlurmctldHost on all build targets (bsc#
    1162377)


  o start slurmdbd after mariadb (bsc#1161716)


  o Update to version 19.05.5 (jsc#SLE-8491) * Includes security fixes
    CVE-2019-19727, CVE-2019-19728, CVE-2019-12838. * Disable i586 builds as
    this is no longer supported. * Create libnss_slurm package to support user
    and group resolution thru slurmstepd.


  o Update to v18.08.9 for fixing CVE-2019-19728 (bsc#1159692). * Make Slurm
    compile on linux after sys/sysctl.h was deprecated. * Install
    slurmdbd.conf.example with 0600 permissions to encourage secure use.
    CVE-2019-19727. * srun - do not continue with job launch if --uid fails.
    CVE-2019-19728.


  o added pmix support jsc#SLE-10800


  o Use --with-shared-libslurm to build slurm binaries using libslurm.
  o Make libslurm depend on slurm-config.


  o Fix ownership of /var/spool/slurm on new installations and upgrade (bsc#
    1158696).


  o Fix permissions of slurmdbd.conf (bsc#1155784, CVE-2019-19727).
  o Fix %posttrans macro _res_update to cope with added newline (bsc#1153259).


  o Add package slurm-webdoc which sets up a web server to provide the
    documentation for the version shipped.


  o Move srun from 'slurm' to 'slurm-node': srun is required on the nodes as
    well so sbatch will work. 'slurm-node' is a requirement when 'slurm' is
    installed (bsc#1153095).


  o Updated to 18.08.8 for fixing (CVE-2019-12838, bsc#1140709, jsc#SLE-7341,
    jsc#SLE-7342) * Update "xauth list" to use the same 10000ms timeout as the
    other xauth commands. * Fix issue in gres code to handle a gres cnt of 0. *
    Don't purge jobs if backfill is running. * Verify job is pending add/
    removing accrual time. * Don't abort when the job doesn't have an
    association that was removed before the job was able to make it to the
    database. * Set state_reason if select_nodes() fails job for QOS or
    Account. * Avoid seg_fault on referencing association without a valid_qos
    bitmap. * If Association/QOS is removed on a pending job set that job as
    ineligible. * When changing a jobs account/qos always make sure you remove
    the old limits. * Don't reset a FAIL_QOS or FAIL_ACCOUNT job reason until
    the qos or account changed. * Restore "sreport -T ALL" functionality. *
    Correctly typecast signals being sent through the api. * Properly
    initialize structures throughout Slurm. * Sync "numtask" squeue format
    option for jobs and steps to "numtasks". * Fix sacct -PD to avoid CA before
    start jobs. * Fix potential deadlock with backup slurmctld. * Fixed issue
    with jobs not appearing in sacct after dependency satisfied. * Fix showing
    non-eligible jobs when asking with -j and not -s. * Fix issue with backfill
    scheduler scheduling tasks of an array when not the head job. *
    accounting_storage/mysql - fix SIGABRT in the archive load logic. *
    accounting_storage/mysql - fix memory leak in the archive load logic. *
    Limit records per single SQL statement when loading archived data. * Fix
    unnecessary reloading of job submit plugins. * Allow job submit plugins to
    be turned on/off with a reconfigure. * Fix segfault when loading/unloading
    Lua job submit plugin multiple times. * Fix printing duplicate error
    messages of jobs rejected by job submit plugin. * Fix printing of job
    submit plugin messages of het jobs without pack id. * Fix memory leak in
    group_cache.c * Fix jobs stuck from FedJobLock when requeueing in a
    federation * Fix requeueing job in a federation of clusters with differing
    associations * sacctmgr - free memory before exiting in 'sacctmgr show
    runaway'. * Fix seff showing memory overflow when steps tres mem usage is
    0. * Upon archive file name collision, create new archive file instead of
    overwriting the old one to prevent lost records. * Limit archive files to
    50000 records per file so that archiving large databases will succeed. *
    Remove stray newlines in SPANK plugin error messages. * Fix archive loading
    events. * In select/cons_res: Only allocate 1 CPU per node with the
    --overcommit and --nodelist options. * Fix main scheduler from potentially
    not running through whole queue. * cons_res/job_test - prevent a job from
    overallocating a node memory. * cons_res/job_test - fix to consider a
    node's current allocated memory when testing a job's memory request. * Fix
    issue where multi-node job steps on cloud nodes wouldn't finish cleaning up
    until the end of the job (rather than the end of the step). * Fix issue
    with a 17.11 sbcast call to a 18.08 daemon. * Add new job bit_flags of
    JOB_DEPENDENT. * Make it so dependent jobs reset the AccrueTime and do not
    count against any AccrueTime limits. * Fix sacctmgr --parsable2 output for
    reservations and tres. * Prevent slurmctld from potential segfault after
    job_start_data() called for completing job. * Fix jobs getting on nodes
    with "scontrol reboot asap". * Record node reboot events to database. * Fix
    node reboot failure message getting to event table. * Don't write "(null)"
    to event table when no event reason exists. * Fix minor memory leak when
    clearing runaway jobs. * Avoid flooding slurmctld and logging when prolog
    complete RPC errors occur. * Fix GCC 9 compiler warnings. * Fix seff human
    readable memory string for values below a megabyte. * Fix dump/load of
    rejected heterogeneous jobs. * For heterogeneous jobs, do not count the
    each component against the QOS or association job limit multiple times. *
    slurmdbd - avoid reservation flag column corruption with the use of newer
    flags, instead preserve the older flag fields that we can still fit in the
    smallint field, and discard the rest. * Fix security issue in
    accounting_storage/mysql plugin on archive file loads by always escaping
    strings within the slurmdbd. CVE-2019-12838. * Fix underflow causing decay
    thread to exit. * Fix main scheduler not considering hetjobs when building
    the job queue. * Fix regression for sacct to display old jobs without a
    start time. * Fix setting correct number of gres topology bits. * Update
    hetjobs pending state reason when appropriate. * Fix accounting_storage/
    filetxt's understanding of TRES. * Set Accrue time when not enforcing
    limits. * Fix srun segfault when requesting a hetjob with test_exec or
    bcast options. * Hide multipart priorities log message behind Priority
    debug flag. * sched/backfill - Make hetjobs sensitive to bf_max_job_start.
    * Fix slurmctld segfault due to job's partition pointer NULL dereference. *
    Fix issue with OR'ed job dependencies. * Add new job's bit_flags of
    INVALID_DEPEND to prevent rebuilding a job's dependency string when it has
    at least one invalid and purged dependency. * Promote federation unsynced
    siblings log message from debug to info. * burst_buffer/cray - fix
    slurmctld SIGABRT due to illegal read/writes. * burst_buffer/cray - fix
    memory leak due to unfreed job script content. * node_features/knl_cray -
    fix script_argv use-after-free. * burst_buffer/cray - fix script_argv
    use-after-free. * Fix invalid reads of size 1 due to non null-terminated
    string reads. * Add extra debug2 logs to identify why BadConstraints reason
    is set.


  o Do not build hdf5 support where not available.


  o Add support for version updates on SLE: Update packages to a later version
    than the version supported originally on SLE will receive a version string
    in their package name.


  o added the hdf5 job data gathering plugin


  o Add backward compatibility with SLE-11 SP4


  o Update to version 18.08.05: * Add mitigation for a potential heap overflow
    on 32-bit systems in xmalloc. (CVE-2019-6438, bsc#1123304)
  o Fix fallout from 750cc23ed for CVE-2019-6438.


  o Update to 18.08.04, with following highlights * Fix message sent to user to
    display preempted instead of time limit when a job is preempted. * Fix
    memory leak when a failure happens processing a nodes gres config. *
    Improve error message when failures happen processing a nodes gres config.
    * Don't skip jobs in scontrol hold. * Allow --cpu-bind=verbose to be used
    with SLURM_HINT environment variable. * Enhanced handling for runaway jobs
    * cons_res: Delay exiting cr_job_test until after cores/cpus are calculated
    and distributed. * Don't check existence of srun --prolog or --epilog
    executables when set to "none" and SLURM_TEST_EXEC is used. * Add "P"
    suffix support to job and step tres specifications. * Fix jobacct_gather/
    cgroup to work correctly when more than one task is started on a node. *
    salloc - set SLURM_NTASKS_PER_CORE and SLURM_NTASKS_PER_SOCKET in the
    environment if the corresponding command line options are used. * slurmd -
    fix handling of the -f flag to specify alternate config file locations. *
    Add SchedulerParameters option of bf_ignore_newly_avail_nodes to avoid
    scheduling lower priority jobs on resources that become available during
    the backfill scheduling cycle when bf_continue is enabled. * job_submit/
    lua: Add several slurmctld return codes and add user/group info * salloc/
    sbatch/srun - print warning if mutually exclusive options of --mem and
    --mem-per-cpu are both set.


  o restarting services on update only when activated
  o added rotation of logs
  o Added backported patches which harden the pam module pam_slurm_adopt. (BOO#
    1116758)


  o Moved config man pages to a separate package: This way, they won't get
    installed on compute nodes.


  o added correct link flags for perl bindings (bsc#1108671) * perl:Switch is
    required by slurm torque wrappers


  o Fix Requires(pre) and Requires(post) for slurm-config and slurm-node. This
    fixes issues with failing slurm user creation when installed during initial
    system installation. (bsc#1109373)


  o When using a remote shared StateSaveLocation, slurmctld needs to be started
    after remote filesystems have become available. Add 'remote-fs.target' to
    the 'After=' directive in slurmctld.service (bsc#1103561).


  o Update to 17.11.8 * Fix incomplete RESPONSE_[RESOURCE|JOB_PACK]_ALLOCATION
    building path. * Do not allocate nodes that were marked down due to the
    node not responding by ResumeTimeout. * task/cray plugin - search for
    "mems" cgroup information in the file "cpuset.mems" then fall back to the
    file "mems". * Fix ipmi profile debug uninitialized variable. * PMIx: fixed
    the direct connect inline msg sending. * MYSQL: Fix issue not handling all
    fields when loading an archive dump. * Allow a job_submit plugin to change
    the admin_comment field during job_submit_plugin_modify(). * job_submit/lua
    - fix access into reservation table. * MySQL - Prevent deadlock caused by
    archive logic locking reads. * Don't enforce MaxQueryTimeRange when
    requesting specific jobs. * Modify --test-only logic to properly support
    jobs submitted to more than one partition. * Prevent slurmctld from abort
    when attempting to set non-existing qos as def_qos_id. * Add new job
    dependency type of "afterburstbuffer". The pending job will be delayed
    until the first job completes execution and it's burst buffer stage-out is
    completed. * Reorder proctrack/task plugin load in the slurmstepd to match
    that of slurmd and avoid race condition calling task before proctrack can
    introduce. * Prevent reboot of a busy KNL node when requesting inactive
    features. * Revert to previous behavior when requesting memory per cpu/node
    introduced in 17.11.7. * Fix to reinitialize previously adjusted job
    members to their original value when validating the job memory in
    multi-partition requests. * Fix _step_signal() from always returning
    SLURM_SUCCESS. * Combine active and available node feature change logs on
    one line rather than one line per node for performance reasons. * Prevent
    occasionally leaking freezer cgroups. * Fix potential segfault when closing
    the mpi/pmi2 plugin. * Fix issues with --exclusive=[user|mcs] to work
    correctly with preemption or when job requests a specific list of hosts. *
    Make code compile with hdf5 1.10.2+ * mpi/pmix: Fixed the collectives
    canceling. * SlurmDBD: improve error message handling on archive load
    failure. * Fix incorrect locking when deleting reservations. * Fix
    incorrect locking when setting up the power save module. * Fix setting
    format output length for squeue when showing array jobs. * Add xstrstr
    function. * Fix printing out of --hint options in sbatch, salloc --help. *
    Prevent possible divide by zero in _validate_time_limit(). * Add Delegate=
    yes to the slurmd.service file to prevent systemd from interfering with the
    jobs' cgroup hierarchies. * Change the backlog argument to the listen()
    syscall within srun to 4096 to match elsewhere in the code, and avoid
    communication problems at scale.


Fix race in the slurmctld backup controller which prevents it to clean up
allocations on nodes properly after failing over (bsc#1084917).

  o Handled %license in a backward compatible manner.


  o Add a 'Recommends: slurm-munge' to slurm-slurmdbd.


  o Shield comments between script snippets with a %{!nil:...} to avoid them
    being interpreted as scripts - in which case the update level is passed as
    argument (see chapter 'Shared libraries' in:
    https://en.opensuse.org/openSUSE:Packaging_scriptlet_snippets) (bsc#
    1100850).


  o Update from 17.11.5 to 17.11.7
  o Fix security issue in handling of username and gid fields CVE-2018-10995
    and bsc#1095508 what implied an update from 17.11.5 to 17.11.7 Highlights
    of 17.11.6:
    * CRAY - Add slurmsmwd to the contribs/cray dir * PMIX - Added the direct
    connect authentication. * Prevent the backup slurmctld from losing the
    active/available node features list on takeover. * Be able to force
    power_down of cloud node even if in power_save state. * Allow cloud nodes
    to be recognized in Slurm when booted out of band. * Numerous fixes - check
    'NEWS' file. Highlights of 17.11.7:
    * Notify srun and ctld when unkillable stepd exits. * Numerous fixes -
    check 'NEWS' file. * Fixes daemoniziation in newly introduced slurmsmwd
    daemon.
  o Rename: * remain in sync with commit messages which introduced that file


  o Avoid running pretrans scripts when running in an instsys: there may be not
    much installed, yet. pretrans code should be done in lua, this way, it will
    be executed by the rpm-internal lua interpreter and not be passed to a
    shell which may not be around at the time this scriptlet is run (bsc#
    1090292).


  o Add requires for slurm-sql to the slurmdbd package.


  o Package READMEs for pam and pam_slurm_adopt.
  o Use the new %%license directive for COPYING file. Fix interaction with
    systemd: systemd expects that a daemonizing process doesn't go away until
    the PID file with it PID of the daemon has bee written (bsc#1084125).


  o Make sure systemd services get restarted only when all packages are in a
    consistent state, not in the middle of an 'update' transaction (bsc#
    1088693). Since the %postun scripts that run on update are from the old
    package they cannot be changed - thus we work around the restart breakage.


  o fixed wrong log file location in slurmdbd.conf and fixed pid location for
    slurmdbd and made slurm-slurmdbd depend on slurm config which provides the
    dir /var/run/slurm (bsc#1086859).


  o added comment for (bsc#1085606)


  o Fix security issue in accounting_storage/mysql plugin by always escaping
    strings within the slurmdbd. CVE-2018-7033 (bsc#1085240).
  o Update slurm to v17.11.5 (FATE#325451) Highlights of 17.11: * Support for
    federated clusters to manage a single work-flow across a set of clusters. *
    Support for heterogeneous job allocations (various processor types, memory
    sizes, etc. by job component). Support for heterogeneous job steps within a
    single MPI_COMM_WORLD is not yet supported for most configurations. * X11
    support is now fully integrated with the main Slurm code. Remove any X11
    plugin configured in your plugstack.conf file to avoid errors being logged
    about conflicting options. * Added new advanced reservation flag of "flex",
    which permits jobs requesting the reservation to begin prior to the
    reservation's start time and use resources inside or outside of the
    reservation. A typical use case is to prevent jobs not explicitly
    requesting the reservation from using those reserved resources rather than
    forcing jobs requesting the reservation to use those resources in the time
    frame reserved. * The sprio command has been modified to report a job's
    priority information for every partition the job has been submitted to. *
    Group ID lookup performed at job submit time to avoid lookup on all compute
    nodes. Enable with PrologFlags=SendGIDs configuration parameter. * Slurm
    commands and daemons dynamically link to libslurmfull.so instead of
    statically linking. This dramatically reduces the footprint of Slurm. * In
    switch plugin, added plugin_id symbol to plugins and wrapped
    switch_jobinfo_t with dynamic_plugin_data_t in interface calls in order to
    pass switch information between clusters with different switch types. *
    Changed default ProctrackType to cgroup. * Changed default
    sched_min_interval from 0 to 2 microseconds. * Added new 'scontrol write
    batch_script ' command to fetch a job's batch script. Removed the ability
    to see the script as part of the 'scontrol -dd show job' command. * Add new
    "billing" TRES which allows jobs to be limited based on the job's billable
    TRES calculated by the job's partition's TRESBillingWeights. * Regular user
    use of "scontrol top" command is now disabled. Use the configuration
    parameter "SchedulerParameters=enable_user_top" to enable that
    functionality. The configuration parameter "SchedulerParameters=
    disable_user_top" will be silently ignored. * Change default to let pending
    jobs run outside of reservation after reservation is gone to put jobs in
    held state. Added NO_HOLD_JOBS_AFTER_END reservation flag to use old
    default. Support for PMIx v2.0 as well as UCX support. * Remove plugins for
    obsolete MPI stacks:
    - lam - mpich1_p4 - mpich1_shmem - mvapich * Numerous fixes - check 'NEWS'
    file. Replaced by sed script.
  o Fix some rpmlint warnings.


  o moved config files to slurm-config package (FATE#324574).


  o Moved slurmstepd and man page into slurm-node due to slurmd dependency
  o Moved config files into slurm-node
  o Moved slurmd rc scripts into slurm-node
  o Made slurm-munge require slurm-plugins instead of slurm itself - slurm-node
    suggested slurm-munge, causing the whole slurm to be installed. The
    slurm-plugins seems to be a more base class (FATE#324574).


  o split up light wight slurm-node package for deployment on nodes (FATE#
    324574).


  o Package so-versioned libs separately. libslurm is expected to change more
    frequently and thus is packaged separately from libpmi.


  o Updated to 17.02.9 to fix CVE-2017-15566 (bsc#1065697). Changes in 17.0.9 *
    When resuming powered down nodes, mark DOWN nodes right after ResumeTimeout
    has been reached (previous logic would wait about one minute longer). * Fix
    sreport not showing full column name for TRES Count. * Fix
    slurmdb_reservations_get() giving wrong usage data when job's spanned
    reservation that was modified. * Fix sreport reservation utilization report
    showing bad data. * Show all TRES' on a reservation in sreport reservation
    utilization report by default. * Fix sacctmgr show reservation handling
    "end" parameter. * Work around issue with sysmacros.h and gcc7 / glibc
    2.25. * Fix layouts code to only allow setting a boolean. * Fix sbatch
    --wait to keep waiting even if a message timeout occurs. * CRAY - If
    configured with NodeFeatures=knl_cray and there are non-KNL nodes which
    include no features the slurmctld will abort without this patch when
    attemping strtok_r(NULL). * Fix regression in 17.02.7 which would run the
    spank_task_privileged as part of the slurmstepd instead of it's child
    process. * Fix security issue in Prolog and Epilog by always prepending
    SPANK_ to all user-set environment variables. CVE-2017-15566. Changes in
    17.0.8:
    * Add 'slurmdbd:' to the accounting plugin to notify message is from dbd
    instead of local. * mpi/mvapich - Buffer being only partially cleared. No
    failures observed. * Fix for job --switch option on dragonfly network. * In
    salloc with --uid option, drop supplementary groups before changing UID. *
    jobcomp/elasticsearch - strip any trailing slashes from JobCompLoc. *
    jobcomp/elasticsearch - fix memory leak when transferring generated buffer.
    * Prevent slurmstepd ABRT when parsing gres.conf CPUs. * Fix sbatch
    --signal to signal all MPI ranks in a step instead of just those on node 0.
    * Check multiple partition limits when scheduling a job that were
    previously only checked on submit. * Cray: Avoid running application/step
    Node Health Check on the external job step. * Optimization enhancements for
    partition based job preemption. * Address some build warnings from GCC 7.1,
    and one possible memory leak if /proc is inaccessible. * If creating/
    altering a core based reservation with scontrol/sview on a remote cluster
    correctly determine the select type. * Fix autoconf test for libcurl when
    clang is used. * Fix default location for cgroup_allowed_devices_file.conf
    to use correct default path. * Document NewName option to sacctmgr. *
    Reject a second PMI2_Init call within a single step to prevent slurmstepd
    from hanging. * Handle old 32bit values stored in the database for
    requested memory correctly in sacct. * Fix memory leaks in the task/cgroup
    plugin when constraining devices. * Make extremely verbose info messages
    debug2 messages in the task/cgroup plugin when constraining devices. * Fix
    issue that would deny the stepd access to /dev/null where GRES has a 'type'
    but no file defined. * Fix issue where the slurmstepd would fatal on job
    launch if you have no gres listed in your slurm.conf but some in gres.conf.
    * Fix validating time spec to correctly validate various time formats. *
    Make scontrol work correctly with job update timelimit [+|-]=. * Reduce the
    visibily of a number of warnings in _part_access_check. * Prevent segfault
    in sacctmgr if no association name is specified for an update command. *
    burst_buffer/cray plugin modified to work with changes in Cray UP05
    software release. * Fix job reasons for jobs that are violating assoc
    MaxTRESPerNode limits. * Fix segfault when unpacking a 16.05 slurm_cred in
    a 17.02 daemon. * Fix setting TRES limits with case insensitive TRES names.
    * Add alias for xstrncmp() -- slurm_xstrncmp(). * Fix sorting of case
    insensitive strings when using xstrcasecmp(). * Gracefully handle race
    condition when reading /proc as process exits. * Avoid error on Cray
    duplicate setup of core specialization. * Skip over undefined (hidden in
    Slurm) nodes in pbsnodes. * Add empty hashes in perl api's slurm_load_node
    () for hidden nodes. * CRAY - Add rpath logic to work for the alpscomm
    libs. * Fixes for administrator extended TimeLimit (job reason & time limit
    reset). * Fix gres selection on systems running select/linear. * sview:
    Added window decorator for maximize,minimize,close buttons for all systems.
    * squeue: interpret negative length format specifiers as a request to
    delimit values with spaces. * Fix the torque pbsnodes wrapper script to
    parse a gres field with a type set correctly.
  o Fixed ABI version of libslurm.


  o Trim redundant wording in descriptions.


  o Updated to slurm 17-02-7-1 * Added python as BuildRequires * Removed
    sched-wiki package * Removed slurmdb-direct package * Obsoleted sched-wiki
    and slurmdb-direct packages * Removing Cray-specific files * Added /etc/
    slurm/layout.d files (new for this version) * Remove /etc/slurm/cgroup
    files from package * Added lib/slurm/mcs_account.so * Removed lib/slurm/
    jobacct_gather_aix.so * Removed lib/slurm/job_submit_cnode.so
  o Created slurm-sql package
  o Moved files from slurm-plugins to slurm-torque package
  o Moved creation of /usr/lib/tmpfiles.d/slurm.conf into slurm.spec * Removed
    tmpfiles.d-slurm.conf
  o Changed /var/run path for slurm daemons to /var/run/slurm (FATE#324026).


  o Made tmpfiles_create post-install macro SLE12 SP2 or greater
  o Directly calling systemd-tmpfiles --create for before SLE12 SP2


  o Allows OpenSUSE Factory build as well
  o Removes unused .service files from project
  o Adds /var/run/slurm to /usr/lib/tmpfiles.d for boottime creation * Patches
    upstream .service files to allow for /var/run/slurm path * Modifies
    slurm.conf to allow for /var/run/slurm path


  o Move wrapper script mpiexec provided by slrum-torque to mpiexec.slurm to
    avoid conflicts. This file is normally provided by the MPI implementation
    (bsc#1041706).


  o Replace remaining ${RPM_BUILD_ROOT}s.
  o Improve description.
  o Fix up changelog.


  o Spec file: Replace "Requires : slurm-perlapi" by "Requires: perl-slurm = %
    {version}" (bsc#1031872).


  o Trim redundant parts of description. Fixup RPM groups.
  o Replace unnecessary %__ macro indirections; replace historic $RPM_*
    variables by macros.


  o Use %slurm_u and %slurm_g macros defined at the beginning of the spec file
    when adding the slurm user/group for consistency.
  o Define these macros to daemon,root for non-systemd.
  o For anything newer than Leap 42.1 or SLE-12-SP1 build OpenHPC compatible.


  o Updated to 16.05.8.1 * Remove StoragePass from being printed out in the
    slurmdbd log at debug2 level. * Defer PATH search for task program until
    launch in slurmstepd. * Modify regression test1.89 to avoid leaving
    vestigial job. Also reduce logging to reduce likelyhood of Expect buffer
    overflow. * Do not PATH search for mult-prog launches if LaunchParamters=
    test_exec is enabled. * Fix for possible infinite loop in select/cons_res
    plugin when trying to satisfy a job's ntasks_per_core or socket
    specification. * If job is held for bad constraints make it so once updated
    the job doesn't go into JobAdminHeld. * sched/backfill - Fix logic to
    reserve resources for jobs that require a node reboot (i.e. to change KNL
    mode) in order to start. * When unpacking a node or front_end record from
    state and the protocol version is lower than the min version, set it to the
    min. * Remove redundant lookup for part_ptr when updating a reservation's
    nodes. * Fix memory and file descriptor leaks in slurmd daemon's sbcast
    logic. * Do not allocate specialized cores to jobs using the --exclusive
    option. * Cancel interactive job if Prolog failure with "PrologFlags=
    contain" or "PrologFlags=alloc" configured. Send new error prolog failure
    message to the salloc or srun command as needed. * Prevent possible
    out-of-bounds read in slurmstepd on an invalid #! line. * Fix check for
    PluginDir within slurmctld to work with multiple directories. * Cancel
    interactive jobs automatically on communication error to launching srun/
    salloc process. * Fix security issue caused by insecure file path handling
    triggered by the failure of a Prolog script. To exploit this a user needs
    to anticipate or cause the Prolog to fail for their job. CVE-2016-10030
    (bsc#1018371).
  o Replace group/user add macros with function calls.
  o Fix array initialzation and ensure strings are always NULL terminated in
  o pam_slurm.c (bsc#1007053).
  o Disable building with netloc support: the netloc API is part of the devel
    branch of hwloc. Since this devel branch was included accidentally and has
    been reversed since, we need to disable this for the time being.
  o Conditionalized architecture specific pieces to support non-x86
    architectures better.


  o Remove: unneeded 'BuildRequires: python'
  o Add: BuildRequires: freeipmi-devel BuildRequires: libibmad-devel
    BuildRequires: libibumad-devel so they are picked up by the slurm build.
  o Enable modifications from openHPC Project.
  o Enable lua API package build.
  o Add a recommends for slurm-munge to the slurm package: This is way, the
    munge auth method is available and slurm works out of the box.
  o Create /var/lib/slurm as StateSaveLocation directory. /tmp is dangerous.


  o Create slurm user/group in preinstall script.


  o Keep %{_libdir}/libpmi* and %{_libdir}/mpi_pmi2* on SUSE.


  o Fix build with and without OHCP_BUILD define.
  o Fix build for systemd and non-systemd.


  o Updated to 16-05-5 - equvalent to OpenHPC 1.2. * Fix issue with resizing
    jobs and limits not be kept track of correctly. * BGQ - Remove
    redeclaration of job_read_lock. * BGQ - Tighter locks around structures
    when nodes/cables change state. * Make it possible to change CPUsPerTask
    with scontrol. * Make it so scontrol update part qos= will take away a
    partition QOS from a partition. * Backfill scheduling properly synchronized
    with Cray Node Health Check. Prior logic could result in highest priority
    job getting improperly postponed. * Make it so daemons also support
    TopologyParam=NoInAddrAny. * If scancel is operating on large number of
    jobs and RPC responses from slurmctld daemon are slow then introduce a
    delay in sending the cancel job requests from scancel in order to reduce
    load on slurmctld. * Remove redundant logic when updating a job's task
    count. * MySQL - Fix querying jobs with reservations when the id's have
    rolled. * Perl - Fix use of uninitialized variable in
    slurm_job_step_get_pids. * Launch batch job requsting --reboot after the
    boot completes. * Do not attempt to power down a node which has never
    responded if the slurmctld daemon restarts without state. * Fix for
    possible slurmstepd segfault on invalid user ID. * MySQL - Fix for possible
    race condition when archiving multiple clusters at the same time. * Add
    logic so that slurmstepd can be launched under valgrind. * Increase buffer
    size to read /proc/*/stat files. * Remove the SchedulerParameters option of
    "assoc_limit_continue", making it the default value. Add option of
    "assoc_limit_stop". If "assoc_limit_stop" is set and a job cannot start due
    to association limits, then do not attempt to initiate any lower priority
    jobs in that partition. Setting this can decrease system throughput and
    utlization, but avoid potentially starving larger jobs by preventing them
    from launching indefinitely. * Update a node's socket and cores per socket
    counts as needed after a node boot to reflect configuration changes which
    can occur on KNL processors. Note that the node's total core count must not
    change, only the distribution of cores across varying socket counts (KNL
    NUMA nodes treated as sockets by Slurm). * Rename partition configuration
    from "Shared" to "OverSubscribe". Rename salloc, sbatch, srun option from
    "--shared" to "--oversubscribe". The old options will continue to function.
    Output field names also changed in scontrol, sinfo, squeue and sview. * Add
    SLURM_UMASK environment variable to user job. * knl_conf: Added new
    configuration parameter of CapmcPollFreq. * Cleanup two minor Coverity
    warnings. * Make it so the tres units in a job's formatted string are
    converted like they are in a step. * Correct partition's MaxCPUsPerNode
    enforcement when nodes are shared by multiple partitions. * node_feature/
    knl_cray - Prevent slurmctld GRES errors for "hbm" references. * Display
    thread name instead of thread id and remove process name in stderr logging
    for "thread_id" LogTimeFormat. * Log IP address of bad incomming message to
    slurmctld. * If a user requests tasks, nodes and ntasks-per-node and
    tasks-per-node/nodes != tasks print warning and ignore ntasks-per-node. *
    Release CPU "owner" file locks. * Update seff to fix warnings with ncpus,
    and list slurm-perlapi dependency in spec file. * Allow QOS timelimit to
    override partition timelimit when EnforcePartLimits is set to all/any. *
    Make it so qsub will do a "basename" on a wrapped command for the output
    and error files. * Add logic so that slurmstepd can be launched under
    valgrind. * Increase buffer size to read /proc/*/stat files. * Prevent job
    stuck in configuring state if slurmctld daemon restarted while
    PrologSlurmctld is running. Also re-issue burst_buffer/pre-load operation
    as needed. * Move test for job wait reason value of BurstBufferResources
    and BurstBufferStageIn later in the scheduling logic. * Document which srun
    options apply to only job, only step, or job and step allocations. * Use
    more compatible function to get thread name (>= 2.6.11). * Make it so the
    extern step uses a reverse tree when cleaning up. * If extern step doesn't
    get added into the proctrack plugin make sure the sleep is killed. * Add
    web links to Slurm Diamond Collectors (from Harvard University) and
    collectd (from EDF). * Add job_submit plugin for the "reboot" field. * Make
    some more Slurm constants (INFINITE, NO_VAL64, etc.) available to
    job_submit/lua plugins. * Send in a -1 for a taskid into
    spank_task_post_fork for the extern_step. * MYSQL - Sightly better logic if
    a job completion comes in with an end time of 0. * task/cgroup plugin is
    configured with ConstrainRAMSpace=yes, then set soft memory limit to
    allocated memory limit (previously no soft limit was set). * Streamline
    when schedule() is called when running with message aggregation on batch
    script completes. * Fix incorrect casting when [un]packing derived_ec on
    slurmdb_job_rec_t. * Document that persistent burst buffers can not be
    created or destroyed using the salloc or srun --bb options. * Add support
    for setting the SLURM_JOB_ACCOUNT, SLURM_JOB_QOS and SLURM_JOB_RESERVAION
    environment variables are set for the salloc command. Document the same
    environment variables for the salloc, sbatch and srun commands in their man
    pages. * Fix issue where sacctmgr load cluster.cfg wouldn't load
    associations that had a partition in them. * Don't return the extern step
    from sstat by default. * In sstat print 'extern' instead of 4294967295 for
    the extern step. * Make advanced reservations work properly with core
    specialization. * slurmstepd modified to pre-load all relevant plugins at
    startup to avoid the possibility of modified plugins later resulting in
    inconsistent API or data structures and a failure of slurmstepd. * Export
    functions from parse_time.c in libslurm.so. * Export unit convert functions
    from slurm_protocol_api.c in libslurm.so. * Fix scancel to allow multiple
    steps from a job to be cancelled at once. * Update and expand upgrade guide
    (in Quick Start Administrator web page). * burst_buffer/cray: Requeue, but
    do not hold a job which fails the pre_run operation. * Insure reported
    expected job start time is not in the past for pending jobs. * Add support
    for PMIx v2. Required for FATE#316379.


  o Setting 'download_files' service to mode='localonly' and adding source
    tarball. (Required for Factory).


  o version 15.08.7.1 * Remove the 1024-character limit on lines in batch
    scripts. task/affinity: Disable core-level task binding if more CPUs
    required than available cores. * Preemption/gang scheduling: If a job is
    suspended at slurmctld restart or reconfiguration time, then leave it
    suspended rather than resume+suspend. * Don't use lower weight nodes for
    job allocation when topology/tree used. * Don't allow user specified
    reservation names to disrupt the normal reservation sequeuece numbering
    scheme. * Avoid hard-link/copy of script/environment files for job arrays.
    Use the master job record file for all tasks of the job array. NOTE: Job
    arrays submitted to Slurm version 15.08.6 or later will fail if the
    slurmctld daemon is downgraded to an earlier version of Slurm. * In
    slurmctld log file, log duplicate job ID found by slurmd. Previously was
    being logged as prolog/epilog failure. * If a job is requeued while in the
    process of being launch, remove it's job ID from slurmd's record of active
    jobs in order to avoid generating a duplicate job ID error when launched
    for the second time (which would drain the node). * Cleanup messages when
    handling job script and environment variables in older directory structure
    formats. * Prevent triggering gang scheduling within a partition if
    configured with PreemptType=partition_prio and PreemptMode=suspend,gang. *
    Decrease parallelism in job cancel request to prevent denial of service
    when cancelling huge numbers of jobs. * If all ephemeral ports are in use,
    try using other port numbers. * Prevent "scontrol update job" from updating
    jobs that have already finished. * Show requested TRES in "squeue -O tres"
    when job is pending. * Backfill scheduler: Test association and QOS node
    limits before reserving resources for pending job. * Many bug fixes.
  o Use source services to download package.
  o Fix code for new API of hwloc-2.0.
  o package netloc_to_topology where avialable.
  o Package documentation.


  o version 15.08.3 * Many new features and bug fixes. See NEWS file
  o update files list accordingly
  o fix wrong end of line in some files


  o version 14.11.8 * Many bug fixes. See NEWS file
  o update files list accordingly


  o add missing systemd requirements
  o add missing rclink


  o version 14.03.9 * Many bug fixes. See NEWS file
  o add systemd support


  o version 14.03.6 * Added support for native Slurm operation on Cray systems
    (without ALPS). * Added partition configuration parameters AllowAccounts,
    AllowQOS, DenyAccounts and DenyQOS to provide greater control over use. *
    Added the ability to perform load based scheduling. Allocating resources to
    jobs on the nodes with the largest number if idle CPUs. * Added support for
    reserving cores on a compute node for system services (core specialization)
    * Add mechanism for job_submit plugin to generate error message for srun,
    salloc or sbatch to stderr. * Support for Postgres database has long since
    been out of date and problematic, so it has been removed entirely. If you
    would like to use it the code still exists in 

Read More

The post ESB-2021.0902 – [SUSE] slurm_20_11 and pdsh: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/03/15/esb-2021-0902-suse-slurm_20_11-and-pdsh-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0902-suse-slurm_20_11-and-pdsh-multiple-vulnerabilities

ESB-2021.0901 – [Linux][SUSE] s390-tools: Denial of service – Existing account

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0901
                      Security update for s390-tools
                               15 March 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           s390-tools
Publisher:         SUSE
Operating System:  SUSE
                   Linux variants
Impact/Access:     Denial of Service -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-25316  

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2021/suse-su-20210777-1
   https://www.suse.com/support/update/announcement/2021/suse-su-20210776-1

Comment: This bulletin contains two (2) SUSE security advisories.
         
         This advisory references vulnerabilities in products which run on 
         platforms other than SUSE. It is recommended that administrators 
         running s390-tools check for an updated version of the software for
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for s390-tools

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:0777-1
Rating:            important
References:        #1176574 #1182777 #1182876 #1183040
Cross-References:  CVE-2021-25316
Affected Products:
                   SUSE Linux Enterprise Module for Basesystem 15-SP2
______________________________________________________________________________

An update that solves one vulnerability and has three fixes is now available.

Description:

This update for s390-tools fixes the following issues:

  o Fixed an issue where IPL was not working when bootloader was installed on a
    SCSI disk with 4k physical blocksize without using a devicemapper target
    (bsc#1183041).
  o CVE-2021-25316: Do not use predictable temporary file names (bsc#1182777).
  o Made the name of the temporary configuration file in /tmp/ unpredictable
    (bsc#1182876).
  o Changing the scheduler from "deadline" to the newly created "mq-deadline"
    scheduler (bsc#1176574)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Module for Basesystem 15-SP2:
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2021-777=1

Package List:

  o SUSE Linux Enterprise Module for Basesystem 15-SP2 (s390x):
       osasnmpd-2.11.0-9.20.1
       osasnmpd-debuginfo-2.11.0-9.20.1
       s390-tools-2.11.0-9.20.1
       s390-tools-debuginfo-2.11.0-9.20.1
       s390-tools-debugsource-2.11.0-9.20.1
       s390-tools-hmcdrvfs-2.11.0-9.20.1
       s390-tools-hmcdrvfs-debuginfo-2.11.0-9.20.1
       s390-tools-zdsfs-2.11.0-9.20.1
       s390-tools-zdsfs-debuginfo-2.11.0-9.20.1


References:

  o https://www.suse.com/security/cve/CVE-2021-25316.html
  o https://bugzilla.suse.com/1176574
  o https://bugzilla.suse.com/1182777
  o https://bugzilla.suse.com/1182876
  o https://bugzilla.suse.com/1183040


- --------------------------------------------------------------------------------


SUSE Security Update: Security update for s390-tools

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:0776-1
Rating:            important
References:        #1182777 #1182876 #1183041
Cross-References:  CVE-2021-25316
Affected Products:
                   SUSE Linux Enterprise Server 12-SP5
______________________________________________________________________________

An update that solves one vulnerability and has two fixes is now available.

Description:

This update for s390-tools fixes the following issues:

  o Fixed an issue where IPL was not working when bootloader was installed on a
    SCSI disk with 4k physical blocksize without using a devicemapper target
    (bsc#1183041).
  o CVE-2021-25316: Do not use predictable temporary file names (bsc#1182777).
  o Made the name of the temporary configuration file in /tmp/ unpredictable
    (bsc#1182876).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Server 12-SP5:
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-776=1

Package List:

  o SUSE Linux Enterprise Server 12-SP5 (s390x):
       osasnmpd-2.1.0-18.29.1
       osasnmpd-debuginfo-2.1.0-18.29.1
       s390-tools-2.1.0-18.29.1
       s390-tools-debuginfo-2.1.0-18.29.1
       s390-tools-debugsource-2.1.0-18.29.1
       s390-tools-hmcdrvfs-2.1.0-18.29.1
       s390-tools-hmcdrvfs-debuginfo-2.1.0-18.29.1
       s390-tools-zdsfs-2.1.0-18.29.1
       s390-tools-zdsfs-debuginfo-2.1.0-18.29.1


References:

  o https://www.suse.com/security/cve/CVE-2021-25316.html
  o https://bugzilla.suse.com/1182777
  o https://bugzilla.suse.com/1182876
  o https://bugzilla.suse.com/1183041

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=WsqA
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0901 – [Linux][SUSE] s390-tools: Denial of service – Existing account appeared first on Malware Devil.



https://malwaredevil.com/2021/03/15/esb-2021-0901-linuxsuse-s390-tools-denial-of-service-existing-account/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0901-linuxsuse-s390-tools-denial-of-service-existing-account

ESB-2021.0900 – [SUSE] python: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0900
                        Security update for python
                               15 March 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           python
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Provide Misleading Information -- Remote with User Interaction
                   Reduced Security               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-23336  

Reference:         ESB-2021.0666
                   ESB-2021.0650

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2021/suse-su-20210768-1

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for python

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:0768-1
Rating:            moderate
References:        #1182379
Cross-References:  CVE-2021-23336
Affected Products:
                   SUSE Manager Server 4.0
                   SUSE Manager Retail Branch Server 4.0
                   SUSE Manager Proxy 4.0
                   SUSE Linux Enterprise Server for SAP 15-SP1
                   SUSE Linux Enterprise Server for SAP 15
                   SUSE Linux Enterprise Server 15-SP1-LTSS
                   SUSE Linux Enterprise Server 15-SP1-BCL
                   SUSE Linux Enterprise Server 15-LTSS
                   SUSE Linux Enterprise Module for Python2 15-SP3
                   SUSE Linux Enterprise Module for Python2 15-SP2
                   SUSE Linux Enterprise Module for Desktop Applications 15-SP3
                   SUSE Linux Enterprise Module for Desktop Applications 15-SP2
                   SUSE Linux Enterprise Module for Basesystem 15-SP3
                   SUSE Linux Enterprise Module for Basesystem 15-SP2
                   SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
                   SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS
                   SUSE Linux Enterprise High Performance Computing 15-LTSS
                   SUSE Linux Enterprise High Performance Computing 15-ESPOS
                   SUSE Enterprise Storage 6
                   SUSE CaaS Platform 4.0
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for python fixes the following issues:

  o python27 was upgraded to 2.7.18
  o CVE-2021-23336: Fixed a potential web cache poisoning by using a semicolon
    in query parameters use of semicolon as a query string separator (bsc#
    1182379).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Manager Server 4.0:
    zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-768=1
  o SUSE Manager Retail Branch Server 4.0:
    zypper in -t patch
    SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-768=1
  o SUSE Manager Proxy 4.0:
    zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-768=1
  o SUSE Linux Enterprise Server for SAP 15-SP1:
    zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2021-768=1
  o SUSE Linux Enterprise Server for SAP 15:
    zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2021-768=1
  o SUSE Linux Enterprise Server 15-SP1-LTSS:
    zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-768=1
  o SUSE Linux Enterprise Server 15-SP1-BCL:
    zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2021-768=1
  o SUSE Linux Enterprise Server 15-LTSS:
    zypper in -t patch SUSE-SLE-Product-SLES-15-2021-768=1
  o SUSE Linux Enterprise Module for Python2 15-SP3:
    zypper in -t patch SUSE-SLE-Module-Python2-15-SP3-2021-768=1
  o SUSE Linux Enterprise Module for Python2 15-SP2:
    zypper in -t patch SUSE-SLE-Module-Python2-15-SP2-2021-768=1
  o SUSE Linux Enterprise Module for Desktop Applications 15-SP3:
    zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-768=1
  o SUSE Linux Enterprise Module for Desktop Applications 15-SP2:
    zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-768=1
  o SUSE Linux Enterprise Module for Basesystem 15-SP3:
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2021-768=1
  o SUSE Linux Enterprise Module for Basesystem 15-SP2:
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2021-768=1
  o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:
    zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-768=1
  o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:
    zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-768=1
  o SUSE Linux Enterprise High Performance Computing 15-LTSS:
    zypper in -t patch SUSE-SLE-Product-HPC-15-2021-768=1
  o SUSE Linux Enterprise High Performance Computing 15-ESPOS:
    zypper in -t patch SUSE-SLE-Product-HPC-15-2021-768=1
  o SUSE Enterprise Storage 6:
    zypper in -t patch SUSE-Storage-6-2021-768=1
  o SUSE CaaS Platform 4.0:
    To install this update, use the SUSE CaaS Platform 'skuba' tool. I will
    inform you if it detects new updates and let you then trigger updating of
    the complete cluster in a controlled way.

Package List:

  o SUSE Manager Server 4.0 (ppc64le s390x x86_64):
       libpython2_7-1_0-2.7.18-7.55.1
       libpython2_7-1_0-debuginfo-2.7.18-7.55.1
       python-2.7.18-7.55.1
       python-base-2.7.18-7.55.1
       python-base-debuginfo-2.7.18-7.55.1
       python-base-debugsource-2.7.18-7.55.1
       python-curses-2.7.18-7.55.1
       python-curses-debuginfo-2.7.18-7.55.1
       python-debuginfo-2.7.18-7.55.1
       python-debugsource-2.7.18-7.55.1
       python-devel-2.7.18-7.55.1
       python-gdbm-2.7.18-7.55.1
       python-gdbm-debuginfo-2.7.18-7.55.1
       python-tk-2.7.18-7.55.1
       python-tk-debuginfo-2.7.18-7.55.1
       python-xml-2.7.18-7.55.1
       python-xml-debuginfo-2.7.18-7.55.1
  o SUSE Manager Retail Branch Server 4.0 (x86_64):
       libpython2_7-1_0-2.7.18-7.55.1
       libpython2_7-1_0-debuginfo-2.7.18-7.55.1
       python-2.7.18-7.55.1
       python-base-2.7.18-7.55.1
       python-base-debuginfo-2.7.18-7.55.1
       python-base-debugsource-2.7.18-7.55.1
       python-curses-2.7.18-7.55.1
       python-curses-debuginfo-2.7.18-7.55.1
       python-debuginfo-2.7.18-7.55.1
       python-debugsource-2.7.18-7.55.1
       python-devel-2.7.18-7.55.1
       python-gdbm-2.7.18-7.55.1
       python-gdbm-debuginfo-2.7.18-7.55.1
       python-tk-2.7.18-7.55.1
       python-tk-debuginfo-2.7.18-7.55.1
       python-xml-2.7.18-7.55.1
       python-xml-debuginfo-2.7.18-7.55.1
  o SUSE Manager Proxy 4.0 (x86_64):
       libpython2_7-1_0-2.7.18-7.55.1
       libpython2_7-1_0-debuginfo-2.7.18-7.55.1
       python-2.7.18-7.55.1
       python-base-2.7.18-7.55.1
       python-base-debuginfo-2.7.18-7.55.1
       python-base-debugsource-2.7.18-7.55.1
       python-curses-2.7.18-7.55.1
       python-curses-debuginfo-2.7.18-7.55.1
       python-debuginfo-2.7.18-7.55.1
       python-debugsource-2.7.18-7.55.1
       python-devel-2.7.18-7.55.1
       python-gdbm-2.7.18-7.55.1
       python-gdbm-debuginfo-2.7.18-7.55.1
       python-tk-2.7.18-7.55.1
       python-tk-debuginfo-2.7.18-7.55.1
       python-xml-2.7.18-7.55.1
       python-xml-debuginfo-2.7.18-7.55.1
  o SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64):
       libpython2_7-1_0-2.7.18-7.55.1
       libpython2_7-1_0-debuginfo-2.7.18-7.55.1
       python-2.7.18-7.55.1
       python-base-2.7.18-7.55.1
       python-base-debuginfo-2.7.18-7.55.1
       python-base-debugsource-2.7.18-7.55.1
       python-curses-2.7.18-7.55.1
       python-curses-debuginfo-2.7.18-7.55.1
       python-debuginfo-2.7.18-7.55.1
       python-debugsource-2.7.18-7.55.1
       python-devel-2.7.18-7.55.1
       python-gdbm-2.7.18-7.55.1
       python-gdbm-debuginfo-2.7.18-7.55.1
       python-tk-2.7.18-7.55.1
       python-tk-debuginfo-2.7.18-7.55.1
       python-xml-2.7.18-7.55.1
       python-xml-debuginfo-2.7.18-7.55.1
  o SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64):
       libpython2_7-1_0-2.7.18-7.55.1
       libpython2_7-1_0-debuginfo-2.7.18-7.55.1
       python-2.7.18-7.55.1
       python-base-2.7.18-7.55.1
       python-base-debuginfo-2.7.18-7.55.1
       python-base-debugsource-2.7.18-7.55.1
       python-curses-2.7.18-7.55.1
       python-curses-debuginfo-2.7.18-7.55.1
       python-debuginfo-2.7.18-7.55.1
       python-debugsource-2.7.18-7.55.1
       python-devel-2.7.18-7.55.1
       python-gdbm-2.7.18-7.55.1
       python-gdbm-debuginfo-2.7.18-7.55.1
       python-tk-2.7.18-7.55.1
       python-tk-debuginfo-2.7.18-7.55.1
       python-xml-2.7.18-7.55.1
       python-xml-debuginfo-2.7.18-7.55.1
  o SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64):
       libpython2_7-1_0-2.7.18-7.55.1
       libpython2_7-1_0-debuginfo-2.7.18-7.55.1
       python-2.7.18-7.55.1
       python-base-2.7.18-7.55.1
       python-base-debuginfo-2.7.18-7.55.1
       python-base-debugsource-2.7.18-7.55.1
       python-curses-2.7.18-7.55.1
       python-curses-debuginfo-2.7.18-7.55.1
       python-debuginfo-2.7.18-7.55.1
       python-debugsource-2.7.18-7.55.1
       python-devel-2.7.18-7.55.1
       python-gdbm-2.7.18-7.55.1
       python-gdbm-debuginfo-2.7.18-7.55.1
       python-tk-2.7.18-7.55.1
       python-tk-debuginfo-2.7.18-7.55.1
       python-xml-2.7.18-7.55.1
       python-xml-debuginfo-2.7.18-7.55.1
  o SUSE Linux Enterprise Server 15-SP1-BCL (x86_64):
       libpython2_7-1_0-2.7.18-7.55.1
       libpython2_7-1_0-debuginfo-2.7.18-7.55.1
       python-2.7.18-7.55.1
       python-base-2.7.18-7.55.1
       python-base-debuginfo-2.7.18-7.55.1
       python-base-debugsource-2.7.18-7.55.1
       python-curses-2.7.18-7.55.1
       python-curses-debuginfo-2.7.18-7.55.1
       python-debuginfo-2.7.18-7.55.1
       python-debugsource-2.7.18-7.55.1
       python-devel-2.7.18-7.55.1
       python-gdbm-2.7.18-7.55.1
       python-gdbm-debuginfo-2.7.18-7.55.1
       python-tk-2.7.18-7.55.1
       python-tk-debuginfo-2.7.18-7.55.1
       python-xml-2.7.18-7.55.1
       python-xml-debuginfo-2.7.18-7.55.1
  o SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x):
       libpython2_7-1_0-2.7.18-7.55.1
       libpython2_7-1_0-debuginfo-2.7.18-7.55.1
       python-2.7.18-7.55.1
       python-base-2.7.18-7.55.1
       python-base-debuginfo-2.7.18-7.55.1
       python-base-debugsource-2.7.18-7.55.1
       python-curses-2.7.18-7.55.1
       python-curses-debuginfo-2.7.18-7.55.1
       python-debuginfo-2.7.18-7.55.1
       python-debugsource-2.7.18-7.55.1
       python-devel-2.7.18-7.55.1
       python-gdbm-2.7.18-7.55.1
       python-gdbm-debuginfo-2.7.18-7.55.1
       python-tk-2.7.18-7.55.1
       python-tk-debuginfo-2.7.18-7.55.1
       python-xml-2.7.18-7.55.1
       python-xml-debuginfo-2.7.18-7.55.1
  o SUSE Linux Enterprise Module for Python2 15-SP3 (aarch64 ppc64le s390x
    x86_64):
       python-base-debuginfo-2.7.18-7.55.1
       python-base-debugsource-2.7.18-7.55.1
       python-curses-2.7.18-7.55.1
       python-curses-debuginfo-2.7.18-7.55.1
       python-debuginfo-2.7.18-7.55.1
       python-debugsource-2.7.18-7.55.1
       python-devel-2.7.18-7.55.1
       python-gdbm-2.7.18-7.55.1
       python-gdbm-debuginfo-2.7.18-7.55.1
       python-xml-2.7.18-7.55.1
       python-xml-debuginfo-2.7.18-7.55.1
  o SUSE Linux Enterprise Module for Python2 15-SP2 (aarch64 ppc64le s390x
    x86_64):
       python-base-debuginfo-2.7.18-7.55.1
       python-base-debugsource-2.7.18-7.55.1
       python-curses-2.7.18-7.55.1
       python-curses-debuginfo-2.7.18-7.55.1
       python-debuginfo-2.7.18-7.55.1
       python-debugsource-2.7.18-7.55.1
       python-devel-2.7.18-7.55.1
       python-gdbm-2.7.18-7.55.1
       python-gdbm-debuginfo-2.7.18-7.55.1
       python-xml-2.7.18-7.55.1
       python-xml-debuginfo-2.7.18-7.55.1
  o SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (aarch64
    ppc64le s390x x86_64):
       python-debuginfo-2.7.18-7.55.1
       python-debugsource-2.7.18-7.55.1
       python-tk-2.7.18-7.55.1
       python-tk-debuginfo-2.7.18-7.55.1
  o SUSE Linux Enterprise Module for Desktop Applications 15-SP2 (aarch64
    ppc64le s390x x86_64):
       python-debuginfo-2.7.18-7.55.1
       python-debugsource-2.7.18-7.55.1
       python-tk-2.7.18-7.55.1
       python-tk-debuginfo-2.7.18-7.55.1
  o SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x
    x86_64):
       libpython2_7-1_0-2.7.18-7.55.1
       libpython2_7-1_0-debuginfo-2.7.18-7.55.1
       python-2.7.18-7.55.1
       python-base-2.7.18-7.55.1
       python-base-debuginfo-2.7.18-7.55.1
       python-base-debugsource-2.7.18-7.55.1
       python-debuginfo-2.7.18-7.55.1
       python-debugsource-2.7.18-7.55.1
  o SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x
    x86_64):
       libpython2_7-1_0-2.7.18-7.55.1
       libpython2_7-1_0-debuginfo-2.7.18-7.55.1
       python-2.7.18-7.55.1
       python-base-2.7.18-7.55.1
       python-base-debuginfo-2.7.18-7.55.1
       python-base-debugsource-2.7.18-7.55.1
       python-debuginfo-2.7.18-7.55.1
       python-debugsource-2.7.18-7.55.1
  o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64
    x86_64):
       libpython2_7-1_0-2.7.18-7.55.1
       libpython2_7-1_0-debuginfo-2.7.18-7.55.1
       python-2.7.18-7.55.1
       python-base-2.7.18-7.55.1
       python-base-debuginfo-2.7.18-7.55.1
       python-base-debugsource-2.7.18-7.55.1
       python-curses-2.7.18-7.55.1
       python-curses-debuginfo-2.7.18-7.55.1
       python-debuginfo-2.7.18-7.55.1
       python-debugsource-2.7.18-7.55.1
       python-devel-2.7.18-7.55.1
       python-gdbm-2.7.18-7.55.1
       python-gdbm-debuginfo-2.7.18-7.55.1
       python-tk-2.7.18-7.55.1
       python-tk-debuginfo-2.7.18-7.55.1
       python-xml-2.7.18-7.55.1
       python-xml-debuginfo-2.7.18-7.55.1
  o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64
    x86_64):
       libpython2_7-1_0-2.7.18-7.55.1
       libpython2_7-1_0-debuginfo-2.7.18-7.55.1
       python-2.7.18-7.55.1
       python-base-2.7.18-7.55.1
       python-base-debuginfo-2.7.18-7.55.1
       python-base-debugsource-2.7.18-7.55.1
       python-curses-2.7.18-7.55.1
       python-curses-debuginfo-2.7.18-7.55.1
       python-debuginfo-2.7.18-7.55.1
       python-debugsource-2.7.18-7.55.1
       python-devel-2.7.18-7.55.1
       python-gdbm-2.7.18-7.55.1
       python-gdbm-debuginfo-2.7.18-7.55.1
       python-tk-2.7.18-7.55.1
       python-tk-debuginfo-2.7.18-7.55.1
       python-xml-2.7.18-7.55.1
       python-xml-debuginfo-2.7.18-7.55.1
  o SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64):
       libpython2_7-1_0-2.7.18-7.55.1
       libpython2_7-1_0-debuginfo-2.7.18-7.55.1
       python-2.7.18-7.55.1
       python-base-2.7.18-7.55.1
       python-base-debuginfo-2.7.18-7.55.1
       python-base-debugsource-2.7.18-7.55.1
       python-curses-2.7.18-7.55.1
       python-curses-debuginfo-2.7.18-7.55.1
       python-debuginfo-2.7.18-7.55.1
       python-debugsource-2.7.18-7.55.1
       python-devel-2.7.18-7.55.1
       python-gdbm-2.7.18-7.55.1
       python-gdbm-debuginfo-2.7.18-7.55.1
       python-tk-2.7.18-7.55.1
       python-tk-debuginfo-2.7.18-7.55.1
       python-xml-2.7.18-7.55.1
       python-xml-debuginfo-2.7.18-7.55.1
  o SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64):
       libpython2_7-1_0-2.7.18-7.55.1
       libpython2_7-1_0-debuginfo-2.7.18-7.55.1
       python-2.7.18-7.55.1
       python-base-2.7.18-7.55.1
       python-base-debuginfo-2.7.18-7.55.1
       python-base-debugsource-2.7.18-7.55.1
       python-curses-2.7.18-7.55.1
       python-curses-debuginfo-2.7.18-7.55.1
       python-debuginfo-2.7.18-7.55.1
       python-debugsource-2.7.18-7.55.1
       python-devel-2.7.18-7.55.1
       python-gdbm-2.7.18-7.55.1
       python-gdbm-debuginfo-2.7.18-7.55.1
       python-tk-2.7.18-7.55.1
       python-tk-debuginfo-2.7.18-7.55.1
       python-xml-2.7.18-7.55.1
       python-xml-debuginfo-2.7.18-7.55.1
  o SUSE Enterprise Storage 6 (aarch64 x86_64):
       libpython2_7-1_0-2.7.18-7.55.1
       libpython2_7-1_0-debuginfo-2.7.18-7.55.1
       python-2.7.18-7.55.1
       python-base-2.7.18-7.55.1
       python-base-debuginfo-2.7.18-7.55.1
       python-base-debugsource-2.7.18-7.55.1
       python-curses-2.7.18-7.55.1
       python-curses-debuginfo-2.7.18-7.55.1
       python-debuginfo-2.7.18-7.55.1
       python-debugsource-2.7.18-7.55.1
       python-devel-2.7.18-7.55.1
       python-gdbm-2.7.18-7.55.1
       python-gdbm-debuginfo-2.7.18-7.55.1
       python-tk-2.7.18-7.55.1
       python-tk-debuginfo-2.7.18-7.55.1
       python-xml-2.7.18-7.55.1
       python-xml-debuginfo-2.7.18-7.55.1
  o SUSE CaaS Platform 4.0 (x86_64):
       libpython2_7-1_0-2.7.18-7.55.1
       libpython2_7-1_0-debuginfo-2.7.18-7.55.1
       python-2.7.18-7.55.1
       python-base-2.7.18-7.55.1
       python-base-debuginfo-2.7.18-7.55.1
       python-base-debugsource-2.7.18-7.55.1
       python-curses-2.7.18-7.55.1
       python-curses-debuginfo-2.7.18-7.55.1
       python-debuginfo-2.7.18-7.55.1
       python-debugsource-2.7.18-7.55.1
       python-devel-2.7.18-7.55.1
       python-gdbm-2.7.18-7.55.1
       python-gdbm-debuginfo-2.7.18-7.55.1
       python-tk-2.7.18-7.55.1
       python-tk-debuginfo-2.7.18-7.55.1
       python-xml-2.7.18-7.55.1
       python-xml-debuginfo-2.7.18-7.55.1


References:

  o https://www.suse.com/security/cve/CVE-2021-23336.html
  o https://bugzilla.suse.com/1182379

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYE7gLuNLKJtyKPYoAQjQPhAAhD12P4yiPO4K1KvutpgYEq4zte+VqI+R
10y3hjLuuOQfPMZ/OhHX2RMRR76Q8SS5Wn2515NqoEi1f7+cxImv6k1bAoKAi6Tq
0gJ29N1tB53D5+mHHEqFsP+p2qPvFgWoJ9rgkH7SrdGM2STW3wDPXinZXm7l05y1
Glz3tbgT6mcMXeKjGO8lP9Wi0btnmsv8s5NgUo3B7SruPhXJ5R+VIwd2gIuFENI9
T6YI/YFTS/ubgXELiVEv3djAAlCBUIG+dESU2UnRB9pv/X3gMwslvJeOf3IKA9qC
UILww5MZZJDOhHVWmw/lTMMccqPnuuEr8fQH1viBDp25yWD7yClkHOz//oDSjvA5
WfD242TCAXh8rcW+vXw1VEfcXDnNTKtb0c/OZhpUpw0nUD+smIABGemlEi5hmHcQ
ved5Kl+9jzY3s6D3V8mm6WlOn4Ws77INH9H4cPUg1CLHk5Eh0PPN/6Frb2p+VsAI
xYVS0BCjXExoPqT9SVsB2g0IfXxDK64tZWPqeYvC+A3BggrzzG2Vh/QENoCcjpHe
o/x4fQEmkAbSwaJJSOXU3dOIWe/deuXOgaLvxlrmzdvWbsR5dNpp9G28YIsjRgAu
wsrXKmxkvH2y0yeaDJtxgUsssKIlz2HMpDCXM4N6SLF+wr+0hBLGTaZiiOYEhv3r
2r9XG6sDQL8=
=J2fE
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0900 – [SUSE] python: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/03/15/esb-2021-0900-suse-python-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0900-suse-python-multiple-vulnerabilities

ESB-2021.0899 – [Ubuntu] Python: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0899
                    USN-4754-3: Python vulnerabilities
                               15 March 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Python
Publisher:         Ubuntu
Operating System:  Ubuntu
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
                   Provide Misleading Information  -- Remote/Unauthenticated
                   Access Confidential Data        -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-3177 CVE-2020-27619 CVE-2020-26116
                   CVE-2020-8492 CVE-2019-20907 CVE-2019-17514
                   CVE-2019-9674  

Reference:         ESB-2021.0844
                   ESB-2021.0764
                   ESB-2021.0647

Original Bulletin: 
   https://ubuntu.com/security/notices/USN-4754-3

- --------------------------BEGIN INCLUDED TEXT--------------------

USN-4754-3: Python vulnerabilities
12 March 2021

Several security issues were fixed in Python 2.7 and Python 3.8.
Releases

  o Ubuntu 20.04 LTS
  o Ubuntu 18.04 LTS

Packages

  o python2.7 - An interactive high-level object-oriented language
  o python3.7 - An interactive high-level object-oriented language
  o python3.8 - An interactive high-level object-oriented language

Details

USN-4754-1 fixed vulnerabilities in Python. This update provides
the corresponding updates for Ubuntu 18.04 ESM and Ubuntu 20.04 ESM.

In the case of Python 2.7 for 20.04 ESM, these additional fixes are included:

It was dicovered that Python allowed remote attackers to cause a denial of
service (resource consumption) via a ZIP bomb. ( CVE-2019-9674 )

It was discovered that Python had potentially misleading information about
whether sorting occurs. This fix updates the documentation about it.
( CVE-2019-17514 )

It was discovered that Python incorrectly handled certain TAR archives.
An attacker could possibly use this issue to cause a denial of service.
( CVE-2019-20907 )

It was discovered that Python allowed an HTTP server to conduct Regular
Expression Denial of Service (ReDoS) attacks against a client because of
urllib.request.AbstractBasicAuthHandler catastrophic backtracking.
( CVE-2020-8492 )

It was discovered that Python allowed CRLF injection if the attacker controls
the HTTP request method, as demonstrated by inserting CR and LF control
characters in the first argument of HTTPConnection.request. ( CVE-2020-26116 )

Original advisory details:

It was discovered that Python incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code
or cause a denial of service. ( CVE-2020-27619 , CVE-2021-3177 )

Update instructions

The problem can be corrected by updating your system to the following package
versions:

Ubuntu 20.04

  o python2.7-minimal - 2.7.18-1~20.04.1
  o python2.7 - 2.7.18-1~20.04.1

Ubuntu 18.04

  o python3.8-minimal - 3.8.0-3~18.04.1
  o python3.7 - 3.7.5-2~18.04.4
  o python3.8 - 3.8.0-3~18.04.1
  o python3.7-minimal - 3.7.5-2~18.04.4

In general, a standard system update will make all the necessary changes.

References

  o CVE-2020-8492
  o CVE-2019-17514
  o CVE-2019-9674
  o CVE-2021-3177
  o CVE-2019-20907
  o CVE-2020-26116
  o CVE-2020-27619

Related notices

  o USN-4581-1 : python3.6-minimal, python3.4, python2.7-minimal, python3.5,
    python3.5-minimal, python3.4-minimal, python2.7, python3.6
  o USN-4333-1 : python3.6-minimal, python3.4, python2.7-minimal, python3.5,
    python3.5-minimal, python3.7, python3.7-minimal, python3.4-minimal,
    python2.7, python3.6
  o USN-4428-1 : python3.6-minimal, python3.4, python2.7-minimal, python3.5,
    python3.8, python3.8-minimal, python3.5-minimal, python3.4-minimal,
    python2.7, python3.6
  o USN-4754-1 : python3.6-minimal, python3.4, python2.7-minimal, python3.5,
    python3.8, python3.8-minimal, python3.5-minimal, python3.4-minimal,
    python2.7, python3.6
  o USN-4333-2 : python3.8-minimal, python3.8
  o USN-4754-4 : python2.7-minimal, python2.7

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=q20e
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0899 – [Ubuntu] Python: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/03/15/esb-2021-0899-ubuntu-python-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0899-ubuntu-python-multiple-vulnerabilities

Sunday, March 14, 2021

Network Security News Summary for Monday March 15th, 2021

A brief daily summary of what is important in cybersecurity. The podcast is published every weekday and designed to get you ready for the day with a brief, usually about 5 minutes long, summary of current network security-related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .

The post Network Security News Summary for Monday March 15th, 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/03/14/network-security-news-summary-for-monday-march-15th-2021/?utm_source=rss&utm_medium=rss&utm_campaign=network-security-news-summary-for-monday-march-15th-2021

Wireshark 3.4.4 Released, (Sun, Mar 14th)

Wireshark version 3.4.4 was released.

There’s one vulnerability fix and many bug fixes.

The vulnerability is that Wireshark could open unsafe URLs, as illustrated in a video posted with the bug report.

 

Didier Stevens

Senior handler
Microsoft MVP
blog.DidierStevens.com DidierStevensLabs.com

 

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post Wireshark 3.4.4 Released, (Sun, Mar 14th) appeared first on Malware Devil.



https://malwaredevil.com/2021/03/14/wireshark-3-4-4-released-sun-mar-14th/?utm_source=rss&utm_medium=rss&utm_campaign=wireshark-3-4-4-released-sun-mar-14th

Cybersecurity for MSSE 2022

I am offering a fully online cybersecurity elective to MSSE second-year students for 2022: SENG 5271. It uses my Cybersecurity in the Cloud specialization offered on Coursera, plus readings and labs from my textbook Elementary Information Security. The course and textbook focus on how technical measures relate to more abstract business and safety goals. We […]

The post Cybersecurity for MSSE 2022 appeared first on Security Boulevard.

Read More

The post Cybersecurity for MSSE 2022 appeared first on Malware Devil.



https://malwaredevil.com/2021/03/14/cybersecurity-for-msse-2022/?utm_source=rss&utm_medium=rss&utm_campaign=cybersecurity-for-msse-2022

BSides Huntsville 2021 – David Hunt’s ‘Hack In Your Sleep’

Many thanks to BSides Huntsville 2021 for publishing their tremendous conference videos on the organization’s YouTube channel; one of the best BSides for this year, don’t miss this 10-video infosec event.

Permalink

The post BSides Huntsville 2021 – David Hunt’s ‘Hack In Your Sleep’ appeared first on Security Boulevard.

Read More

The post BSides Huntsville 2021 – David Hunt’s ‘Hack In Your Sleep’ appeared first on Malware Devil.



https://malwaredevil.com/2021/03/14/bsides-huntsville-2021-david-hunts-hack-in-your-sleep/?utm_source=rss&utm_medium=rss&utm_campaign=bsides-huntsville-2021-david-hunts-hack-in-your-sleep

Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 319’

via the respected information security capabilities of Robert M. Lee & the superlative illustration talents of Jeff Haas at Little Bobby Comics

via the respected information security capabilities of Robert M. Lee & the superlative illustration talents of Jeff Haas at Little Bobby Comics

Permalink

The post Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 319’ appeared first on Security Boulevard.

Read More

The post Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 319’ appeared first on Malware Devil.



https://malwaredevil.com/2021/03/14/robert-m-lees-jeff-haas-little-bobby-comics-week-319-2/?utm_source=rss&utm_medium=rss&utm_campaign=robert-m-lees-jeff-haas-little-bobby-comics-week-319-2

BSides Huntsville 2021 – Ronnie Watson’s ‘Build Yourself An Elastic Threat Hunting And Monitoring SIEM’

Many thanks to BSides Huntsville 2021 for publishing their tremendous conference videos on the organization’s YouTube channel; one of the best BSides for this year, don’t miss this 10-video infosec event.

Permalink

The post BSides Huntsville 2021 – Ronnie Watson’s ‘Build Yourself An Elastic Threat Hunting And Monitoring SIEM’ appeared first on Security Boulevard.

Read More

The post BSides Huntsville 2021 – Ronnie Watson’s ‘Build Yourself An Elastic Threat Hunting And Monitoring SIEM’ appeared first on Malware Devil.



https://malwaredevil.com/2021/03/14/bsides-huntsville-2021-ronnie-watsons-build-yourself-an-elastic-threat-hunting-and-monitoring-siem/?utm_source=rss&utm_medium=rss&utm_campaign=bsides-huntsville-2021-ronnie-watsons-build-yourself-an-elastic-threat-hunting-and-monitoring-siem

Cyber Attacks: Is the ‘Big One’ Coming Soon?

Is it time to ring cyber alarm bells — even louder? Many CSO, CTOs, military leaders, and even some global company CEOs, are now saying yes. Quick Recap 2020 was the year that the COVID-19 crisis also brought a cyber pandemic. Late last year, the security industry’s top experts from global cybersecurity company leadership predicted..

The post Cyber Attacks: Is the ‘Big One’ Coming Soon? appeared first on Security Boulevard.

Read More

The post Cyber Attacks: Is the ‘Big One’ Coming Soon? appeared first on Malware Devil.



https://malwaredevil.com/2021/03/14/cyber-attacks-is-the-big-one-coming-soon/?utm_source=rss&utm_medium=rss&utm_campaign=cyber-attacks-is-the-big-one-coming-soon

Book Review: Born Digital by Robert Wigley

There is a growing generation of adults who have grown up in the digital age, not knowing a life without almost immediate access to a digital connected world. Most adults and children either carry or have access to connected computers, whether they be smartphones, tablets, games consoles, or good old-fashioned PCs, computers have become an essential human tool. Even toddlers seem to have an inherent ability to pick up and use tablet devices to play and learn. While the digital age has brought countless benefits for society, what of the trade-offs in our sleepwalk towards a lifetime dependency on digital technology?

In his book ‘Born Digital’, Bob Wigley shines a light on the darker side of humanity’s relationship with digital technology, pulling out and expanding on the serious issues which are all too often underplayed or brushed aside by a technology distracted and addicted world. Throughout Born Digital Bob cites a series of sobering statistics which brings a reality check in his exploration of the various psychological issues caused by society’s new devotion to digital technology. Indeed, reading Born Digital is a thought-provoking experience, which makes you question whether tech giants, governments, schools, and even yourself as a parent, are doing enough to protect and educate children born into the digital age.  

Born Digital by Robert Wigley is available at Amazon in Hardback, as a Kindle eBook, and as an Audiobook
Born Digital examines the most digital distracted generation of all, ‘Generation Z’, namely anyone born between the late 1990s and early 2010s. Generation Z has grown up psychologically hardwired with digital technology, their smartphones are an extension of themselves, enabling a relentless habit of synchronising their real-world and digital lives with endless social media and digital communications. Generation Z does not regard themselves as a digital addicted and distracted generation, their digital way of life is their normal, so we should not expect them to have epiphany moments of ‘admitting to having a problem’, which is as any alcohol, drug, and gambling addiction counsellor will tell you, is the first and most important step to taper a lifestyle with a harmful dependency. The unhealthy elements of living digital are in plain sight, Born Digital explores the grim reality of harmful effects experienced by Generation Z, such as addiction, anxiety, depression, low self-esteem, stunned empathy development, troubled relationships, fake news, propaganda, and even threats to democracy.

Born Digital is written as a wakeup call to the dangers and the negative outcomes which comes with all our dependency on the digital world, with the book concluding with a call to urgently reset society’s relationship with technology. Tech giants, governments, schools, parents, and each of us must be more informed about the dark side of digital tech, so we can take the necessary steps to better safeguard our society, ourselves, and the next generations from the detrimental side of our relatively newfound digital dependency. 

Firstly, I believe improving education is essential, particularly within schools, and at young ages. We cannot count on parents to educate children about digital dangers, as parents tend not to have little understanding of their children’s digital realms. Secondly, there has to be stronger regulation of tech and social media giants, they must be made far more accountable for the digital services they provide, given the profound impact they have, especially on young lives. The ugly truth is social media and big tech companies are highly incentivised to culture addictive habits with their consumers to increase screen time, as more screen time means greater profit through increased advertising revenue. So it is not really in their nature to curtail addictive digital behaviours.


Some help is on the horizon in the UK, with a revolutionary Online Harms Bill, which at present appears to have sufficient teeth to force social media companies to act, by removing and limiting the spread of harmful content, or else face fines of £18m or 10% of their global turnover. If this parliamentary bill is written into UK law as it stands, the potential global turnover linked fine will certainly focus the minds of executives at social media giants like Facebook, TikTok, and Twitter. The bill, which will be regulated by Ofcom, will also require platforms to follow a new code of conduct that covers their responsibilities towards protecting children that are born digital.

The post Book Review: Born Digital by Robert Wigley appeared first on Security Boulevard.

Read More

The post Book Review: Born Digital by Robert Wigley appeared first on Malware Devil.



https://malwaredevil.com/2021/03/14/book-review-born-digital-by-robert-wigley/?utm_source=rss&utm_medium=rss&utm_campaign=book-review-born-digital-by-robert-wigley

Application Security for builders and creators

Meet Alice and Bob

Alice and Bob work for an exciting data analytics startup that is disrupting the healthcare tech space. You might have heard their names as they are well known in the security industry for building apps that are secure by design. As creators, they also enjoy rapidly prototyping ideas into functional apps that demonstrate innovative thoughts and potential solution to customer problems.

Let’s build an app
Let’s build an App

“Let’s build a vaccine passport app!” declared Alice during one of those recurring zoom meetings.
“You know what I’ve been thinking about it as well. Let’s do it!” said Bob as he hurriedly unmuted himself.
“We can involve Claire as well, our new DevSecOps person, since it will be best to get security built into the product from the start,” said Alice.

Bob asked, “Won’t that slow us down Alice? Can we build the app first to see if there any downloads from the AppStore and then implement security features next month?”.
Before Alice could respond, Bob quickly replied, “I’m just joking! Of course, safety and privacy of our users are more important not just speed and time to launch”.

Claire now joins the Zoom meeting.

Chat up with the devs

Claire, the AppSec, joins Alice and Bob
Claire, the AppSec, joins Alice and Bob

“OMG, that will be a super cool app!” said Claire before Alice and Bob could even describe their app idea. The boring Zoom meeting suddenly became a design discussion between the devs (Alice and Bob) and the security person (Claire). Claire starts by asking for some basic information about the app and takes notes for future reference.

  • Team: Who are the developers, DevOps and Product Owners?
  • User stories: Are there any existing user stories providing an overview of the app?
  • Tech: What is the application and cloud technology stack?
  • Architecture: Are there any diagrams even the back of the napkin ones?

Gathering information through formal and informal discussions with devs is an essential skill to succeed in an AppSec or DevSecOps and even in a cybersecurity role. A good knowledge about the application helps build a relationship with not just the dev team but also with the security testing tools (including the vendor). A well configured static analysis-based security tool would help with both developer productivity and application security.

Bootstrap the app

Our vaccine passport app is going to have a go micro-services backend, and a React front-end Single Page App (SPA). This will be followed by a native mobile app for Android and iOS built using React Native framework.

App architecture: go microservices with React frontend
App architecture: go microservices with React frontend

Having read my blog on DevSecOps with GitHub, Claire suggests the team to integrate ShiftLeft NG SAST with their GitHub repo’s workflow from the start. Alice and Bob are naturally sceptical. After all, the app they are thinking is new and therefore any automated security analysis is bound to create false positives and require hours of triaging right?

With this feedback from the devs, Claire plans her homework. She goes through the documentation pages for go and react on ShiftLeft over the weekend. She decides to customize the default analyze command used by ShiftLeft by adding some custom tags.

# Default command
sl analyze --js --app passport-fe .
sl analyze --go --app passport-backend .
# Claire’s command
sl analyze --js --app passport-fe
--tag app.group=alice-team
--tag stage=poc
--tag threat_model_id=page-100
--tag classification=sensitive
--tag branch=${GITHUB_REF}
.

sl analyze --go --app passport-backend
--tag app.group=alice-team
--tag stage=poc
--tag threat_model_id=page-101
--tag classification=sensitive
--tag branch=${GITHUB_REF}
.

The additional custom tags added by Claire are based on the notes from the information gathering session with the devs. These tags can be any key-value pairs and are completely optional. In this particular example the following tags are used.

  • stage=poc — This would help decide on the business criticality of this app if there is any incident that might cause downtime
  • threat_model_id=page-100 — This is the id for the wiki pages where the notes and the architecture diagrams shared by the devs are kept
  • classification=sensitive — Even though the app is at a poc stage, the users will be sharing their medical, vaccine and personal information so the data is sensitive. With this tag, Claire can check and ensure if the app continues to have safeguards to prevent sensitive data from getting leaked from the cloud or to the logs
  • branch=${GITHUB_REF} — By assigning the Git branch as the branch name, separate reports can be maintained for each branch and its Pull Request.

With this GitHub workflow including ShiftLeft NG SAST in place, the team decides to meet up over zoom to discuss the data that will be collected and stored by the app.

Gather data dictionary

Every app uses different terms and variable names in the code to represent data. A variable called “Customer” or “Patient” can potentially contain sensitive information that should be kept safe and private whereas a variable called “tmpCounter” is usually safe.

The vaccination app would collect the following data from the users:

  • Customer: Personal information such as their names, address and location
  • Vaccination data: The date, location and the type of the vaccine the customer received. A photo of the vaccine and a copy of the confirmation letter would also be uploaded and stored via the app

The backend would support the following functionality via its API:

  • Store and retrieve customer information
  • Upload photos and evidence of vaccine to an AWS s3 bucket
  • Generate confirmation and unique reference for a trusted authority to query and confirm the vaccination status

The team agrees that the data would always be encrypted both at rest and in transit. Further, they would never log any sensitive information to the log files but maintain a generic audit log to track the usage of all API calls that can retrieve sensitive information. In summary, always encrypt, don’t log but audit.

Configure NG SAST data dictionary

Claire knows quite well that both Alice and Bob would stick to their words and always use encryption for data and obfuscation for logs. But regulators and auditors unfortunately require evidence of compliance and cannot just take someone’s word as assurances. Even the best devs sometimes do make a mistake, so it is best to configure a tool to track the usage of sensitive data for peace of mind.

Having come across the documentation page for customizing the sensitive data dictionary, Claire learns that while ShiftLeft has a broad collection of terms in the default dictionary it won’t have terms such as covid or vaccine and so on. She therefore decides to try adding some app-specific terms to the default dictionary using a policy file.

IMPORT io.shiftleft/defaultdict
DATA highlySensitive = VAR vaccine, covid, clinic, dosage
DATA pii = VAR vaccine photo, evidence image, clinic location, vaccination date

The above snippet is saved in a file called passport.policy. By using the sl policy command Claire adds this new policy that includes new data dictionary to ShiftLeft.

sl policy push passportrules passport.policy
sl policy assignment set --project passport-backend <ShiftLeft Org Id>/passportrules:latest

Dev-Test-Iterate

With the ShiftLeft integration along with the right data dictionary in place, NG SAST analysis would automatically run whenever Alice or Bob create a Pull Request. Initially, they decide not to use ShiftLeft as a Required Status Check since they do not want their merges to be blocked by a SAST tool yet. The good news is that NG SAST is designed for spotting realistic security defects and business logic flaws thanks to our code property graph, so it doesn’t cry wolf for everything.

Few weeks pass with both the frontend app and the microservices API gaining features rapidly. Then the unexpected happens – ShiftLeft NG SAST reports few security findings and the team gets quite anxious. They decide to meet over zoom to discuss the security findings the next day.

To be continued …


Application Security for builders and creators was originally published in ShiftLeft Blog on Medium, where people are continuing the conversation by highlighting and responding to this story.

The post Application Security for builders and creators appeared first on Security Boulevard.

Read More

The post Application Security for builders and creators appeared first on Malware Devil.



https://malwaredevil.com/2021/03/14/application-security-for-builders-and-creators/?utm_source=rss&utm_medium=rss&utm_campaign=application-security-for-builders-and-creators

Saturday, March 13, 2021

ELF sections stats

If you follow my blog you may know that I have dedicated a lot of time building a very comprehensive list of PE Sections, Today I realized that I never looked at ELF section the same way. With this post I took a first stab at it. The below are nothing but quick & dirty stats from a reasonably sized sampleset of ELF files:

47165 .shstrtab
44289 .bss
33390 .comment
31664 .strtab
31651 .symtab
23516 .data
20756 .got
12634 .debug_aranges
12628 .debug_line
12628 .debug_info
12628 .debug_abbrev
12181 .debug_frame
11408 .sbss
10339 .mdebug.abi32
9359 .ARM.attributes
8239 .jcr
6703 .dynamic
6547 .rodata
6432 .debug_str
6386 .ctors
6343 .dtors
6035 .debug_pubnames
5846 .debug_ranges
5834 .debug_loc
5101 .fini_array
4915 .data.rel.ro
4858 .pdr
4133 .eh_frame
3056 .fini
2919 .text
2877 .plt
2515 .init
2444 .sdata
1858 .got.plt
1778 .note
1542 .init_array
1335 .stabstr
1335 .stab
1140 .rel.plt
1003 __libc_freeres_ptrs
862 .tbss
839 .tdata
820 .note.gnu.gold-version
812 .gcc_except_table
791 __libc_thread_subfreeres
739 .ARM.exidx
484 .ARM.extab
423 .data.rel.ro.local
414 .eh_frame_hdr
283 __libc_atexit
245 __libc_subfreeres
239 .note.ABI-tag
172 .preinit_array
140 .note.stapsdt
138 .stapsdt.base
117 .bmp
114 .mips
113 .compiler
110 .dynstr
96 .rld_map
76 .gnu.attributes
75 .noptrbss
73 .context
71 .note.go.buildid
49 .rel.dyn
45 .gnu_debuglink
38 .gnu.prelink_undo
36 .debug_pubtypes
33 .gnu_extab
30 .stab.indexstr
30 .stab.index
29 .note.GNU-stack
29 .engine
20 .xt.prop
19 .xtensa.info
19 .xt.lit
19 .debug_gdb_scripts
19 .bep
18 .rel.gnu.linkonce.this_module
18 .gnu.warning.llseek
17 .interp
17 .gnu.linkonce.this_module
16 .rodata.str1.1
15 .gnu.conflict
14 .rel.debug_aranges
14 .rel.data
13 .rel__ex_table
13 .rel.debug_pubnames
13 .redata
13 .jgd
12 __ex_table
12 .rodata.str1.4
12 .rel.eh_frame
12 .dynbss
11 __versions
11 .rel.rodata
11 .modinfo
10 __mcount_loc
10 .rel__mcount_loc
10 .rel.debug_line
10 .data1
8 __ksymtab
8 .plt.got
8 .exception_ranges
8 .ex_shared
8 .debug_macinfo
8 .data.rel.local
7 COFF
7 .mdebug
6 .rodata1
6 .rel.text
6 .rel.fixup
6 .rel.debug_info
6 .MIPS.stubs
5 __param
5 PROGRAM
5 IBC_2.0
5 ABI
5 .xzrodata
5 .rel__param
5 .rel.debug_loc
5 .rel.debug_frame
4 .note.android.ident
4 .got2
4 .gnu.version_r
4 .cpp_finidata
4 .arm_vfe_header
3 Input file:
3 .upx.1
3 .smp_locks
3 .rel.smp_locks
3 .rdata
3 .ident
2 text_env
2 ta
2 odata
2 elink
2 __verbose
2 __ksymtab_strings
2 ___ksymtab_gpl+fb_mode_option
2 ___ksymtab_gpl+fb_destroy_modelist
2 ___ksymtab+vesa_modes
2 ___ksymtab+fb_videomode_to_var
2 ___ksymtab+fb_var_to_videomode
2 ___ksymtab+fb_mode_is_equal
2 ___ksymtab+fb_match_mode
2 ___ksymtab+fb_find_nearest_mode
2 ___ksymtab+fb_find_mode_cvt
2 ___ksymtab+fb_find_mode
2 ___ksymtab+fb_find_best_mode
2 ___ksymtab+fb_find_best_display
2 Import
2 C_2.0
2 .vmp
2 .tptext
2 .tm_clone_table
2 .rodata.cst4
2 .rela.plt
2 .rel__verbose
2 .rel___ksymtab_gpl+fb_mode_option
2 .rel___ksymtab_gpl+fb_destroy_modelist
2 .rel___ksymtab+vesa_modes
2 .rel___ksymtab+fb_videomode_to_var
2 .rel___ksymtab+fb_var_to_videomode
2 .rel___ksymtab+fb_mode_is_equal
2 .rel___ksymtab+fb_match_mode
2 .rel___ksymtab+fb_find_nearest_mode
2 .rel___ksymtab+fb_find_mode_cvt
2 .rel___ksymtab+fb_find_mode
2 .rel___ksymtab+fb_find_best_mode
2 .rel___ksymtab+fb_find_best_display
2 .rel.debug_pubtypes
2 .null
2 .msym
2 .fixup
2 .conststring
2 .constdata
2 .compact_rel
2 .comment.SUSE.OPTs
2 .PPC.EMB.apuinfo

Read More

The post ELF sections stats appeared first on Malware Devil.



https://malwaredevil.com/2021/03/13/elf-sections-stats-2/?utm_source=rss&utm_medium=rss&utm_campaign=elf-sections-stats-2

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...