{"affected":[{"ecosystem_specific":{"binaries":[{"libnss_slurm2_20_11":"20.11.9-150100.3.14.1","libpmi0_20_11":"20.11.9-150100.3.14.1","libslurm36":"20.11.9-150100.3.14.1","perl-slurm_20_11":"20.11.9-150100.3.14.1","slurm_20_11":"20.11.9-150100.3.14.1","slurm_20_11-auth-none":"20.11.9-150100.3.14.1","slurm_20_11-config":"20.11.9-150100.3.14.1","slurm_20_11-config-man":"20.11.9-150100.3.14.1","slurm_20_11-devel":"20.11.9-150100.3.14.1","slurm_20_11-doc":"20.11.9-150100.3.14.1","slurm_20_11-lua":"20.11.9-150100.3.14.1","slurm_20_11-munge":"20.11.9-150100.3.14.1","slurm_20_11-node":"20.11.9-150100.3.14.1","slurm_20_11-pam_slurm":"20.11.9-150100.3.14.1","slurm_20_11-plugins":"20.11.9-150100.3.14.1","slurm_20_11-slurmdbd":"20.11.9-150100.3.14.1","slurm_20_11-sql":"20.11.9-150100.3.14.1","slurm_20_11-sview":"20.11.9-150100.3.14.1","slurm_20_11-torque":"20.11.9-150100.3.14.1","slurm_20_11-webdoc":"20.11.9-150100.3.14.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP1-ESPOS","name":"slurm_20_11","purl":"pkg:rpm/suse/slurm_20_11&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-ESPOS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20.11.9-150100.3.14.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libnss_slurm2_20_11":"20.11.9-150100.3.14.1","libpmi0_20_11":"20.11.9-150100.3.14.1","libslurm36":"20.11.9-150100.3.14.1","perl-slurm_20_11":"20.11.9-150100.3.14.1","slurm_20_11":"20.11.9-150100.3.14.1","slurm_20_11-auth-none":"20.11.9-150100.3.14.1","slurm_20_11-config":"20.11.9-150100.3.14.1","slurm_20_11-config-man":"20.11.9-150100.3.14.1","slurm_20_11-devel":"20.11.9-150100.3.14.1","slurm_20_11-doc":"20.11.9-150100.3.14.1","slurm_20_11-lua":"20.11.9-150100.3.14.1","slurm_20_11-munge":"20.11.9-150100.3.14.1","slurm_20_11-node":"20.11.9-150100.3.14.1","slurm_20_11-pam_slurm":"20.11.9-150100.3.14.1","slurm_20_11-plugins":"20.11.9-150100.3.14.1","slurm_20_11-slurmdbd":"20.11.9-150100.3.14.1","slurm_20_11-sql":"20.11.9-150100.3.14.1","slurm_20_11-sview":"20.11.9-150100.3.14.1","slurm_20_11-torque":"20.11.9-150100.3.14.1","slurm_20_11-webdoc":"20.11.9-150100.3.14.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP1-LTSS","name":"slurm_20_11","purl":"pkg:rpm/suse/slurm_20_11&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20.11.9-150100.3.14.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for slurm_20_11 fixes the following issues:\n\n- CVE-2022-29500: Fixed architectural flaw that could have been exploited to allow an unprivileged user to execute arbitrary processes as root (bsc#1199278).\n- CVE-2022-29501: Fixed a problem that an unprivileged user could have sent data to arbitrary unix socket as root (bsc#1199279).\n","id":"SUSE-SU-2022:1815-1","modified":"2022-05-23T12:17:04Z","published":"2022-05-23T12:17:04Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2022/suse-su-20221815-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1199278"},{"type":"REPORT","url":"https://bugzilla.suse.com/1199279"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-29500"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-29501"}],"related":["CVE-2022-29500","CVE-2022-29501"],"summary":"Security update for slurm_20_11","upstream":["CVE-2022-29500","CVE-2022-29501"]}