{"affected":[{"ecosystem_specific":{"binaries":[{"libpmi0":"18.08.9-3.16.4","libslurm33":"18.08.9-3.16.4","perl-slurm":"18.08.9-3.16.4","slurm":"18.08.9-3.16.4","slurm-auth-none":"18.08.9-3.16.4","slurm-config":"18.08.9-3.16.4","slurm-config-man":"18.08.9-3.16.4","slurm-devel":"18.08.9-3.16.4","slurm-doc":"18.08.9-3.16.4","slurm-lua":"18.08.9-3.16.4","slurm-munge":"18.08.9-3.16.4","slurm-node":"18.08.9-3.16.4","slurm-pam_slurm":"18.08.9-3.16.4","slurm-plugins":"18.08.9-3.16.4","slurm-slurmdbd":"18.08.9-3.16.4","slurm-sql":"18.08.9-3.16.4","slurm-sview":"18.08.9-3.16.4","slurm-torque":"18.08.9-3.16.4"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for HPC 15 SP1","name":"slurm","purl":"pkg:rpm/suse/slurm&distro=SUSE%20Linux%20Enterprise%20Module%20for%20HPC%2015%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"18.08.9-3.16.4"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for slurm fixes the following issues:\n\n- CVE-2020-27745: PMIx - fix potential buffer overflows from use of unpackmem() (bsc#1178890).\n- CVE-2020-27746: X11 forwarding - fix potential leak of the magic cookie when \n  sent as an argument to the xauth command (bsc#1178891).\n","id":"SUSE-SU-2020:3505-1","modified":"2020-11-24T16:16:27Z","published":"2020-11-24T16:16:27Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2020/suse-su-20203505-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1178890"},{"type":"REPORT","url":"https://bugzilla.suse.com/1178891"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-27745"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-27746"}],"related":["CVE-2020-27745","CVE-2020-27746"],"summary":"Security update for slurm","upstream":["CVE-2020-27745","CVE-2020-27746"]}