{"affected":[{"ecosystem_specific":{"binaries":[{"libpmi0":"17.02.11-6.44.1","libslurm31":"17.02.11-6.44.1","perl-slurm":"17.02.11-6.44.1","slurm":"17.02.11-6.44.1","slurm-auth-none":"17.02.11-6.44.1","slurm-config":"17.02.11-6.44.1","slurm-devel":"17.02.11-6.44.1","slurm-doc":"17.02.11-6.44.1","slurm-lua":"17.02.11-6.44.1","slurm-munge":"17.02.11-6.44.1","slurm-pam_slurm":"17.02.11-6.44.1","slurm-plugins":"17.02.11-6.44.1","slurm-sched-wiki":"17.02.11-6.44.1","slurm-slurmdb-direct":"17.02.11-6.44.1","slurm-slurmdbd":"17.02.11-6.44.1","slurm-sql":"17.02.11-6.44.1","slurm-torque":"17.02.11-6.44.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for HPC 12","name":"slurm","purl":"pkg:rpm/suse/slurm&distro=SUSE%20Linux%20Enterprise%20Module%20for%20HPC%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"17.02.11-6.44.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for slurm fixes the following issues:\n\n- Fix Authentication Bypass when Message Aggregation is enabled CVE-2020-12693\n  This fixes and issue where authentication could be bypassed via an alternate\n  path or channel when message Aggregation was enabled.\n  A race condition allowed a user to launch a process as an arbitrary user.\n  Add: Fix-Authentication-Bypass-when-Message-Aggregation-is-enabled-CVE-2020-12693.patch\n  (CVE-2020-12693, bsc#1172004). \n- Remove unneeded build dependency to postgresql-devel.\n","id":"SUSE-SU-2020:2601-1","modified":"2020-09-10T13:30:33Z","published":"2020-09-10T13:30:33Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2020/suse-su-20202601-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1172004"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-19727"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-12693"}],"related":["CVE-2019-19727","CVE-2020-12693"],"summary":"Security update for slurm","upstream":["CVE-2019-19727","CVE-2020-12693"]}