<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">Security update for slurm_20_02</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:0278-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-01-31T06:15:30Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-01-31T06:15:30Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-01-31T06:15:30Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for slurm_20_02</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for slurm_20_02 fixes the following issues:

Security fixes:

- CVE-2023-49933: Prevent message extension attacks that could bypass the message hash. (bsc#1218046)
- CVE-2023-49936: Prevent NULL pointer dereference on `size_valp` overflow. (bsc#1218050)
- CVE-2023-49937: Prevent double-xfree() on error in `_unpack_node_reg_resp()`. (bsc#1218051)
- CVE-2023-49938: Prevent modified `sbcast` RPCs from opening a file with the wrong group permissions. (bsc#1218053)

Other fixes:

- Fix slurm upgrading to incompatible versions (bsc#1216869).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2024-278,openSUSE-SLE-15.5-2024-278</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20240278-1/</URL>
      <Description>Link for SUSE-SU-2024:0278-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2024-January/017819.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:0278-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1216869</URL>
      <Description>SUSE Bug 1216869</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218046</URL>
      <Description>SUSE Bug 1218046</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218050</URL>
      <Description>SUSE Bug 1218050</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218051</URL>
      <Description>SUSE Bug 1218051</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218053</URL>
      <Description>SUSE Bug 1218053</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-49933/</URL>
      <Description>SUSE CVE CVE-2023-49933 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-49936/</URL>
      <Description>SUSE CVE CVE-2023-49936 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-49937/</URL>
      <Description>SUSE CVE CVE-2023-49937 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-49938/</URL>
      <Description>SUSE CVE CVE-2023-49938 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="openSUSE Leap 15.5">
      <Branch Type="Product Name" Name="openSUSE Leap 15.5">
        <FullProductName ProductID="openSUSE Leap 15.5" CPE="cpe:/o:opensuse:leap:15.5">openSUSE Leap 15.5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libnss_slurm2_20_02-20.02.7-150100.3.30.1">
      <FullProductName ProductID="libnss_slurm2_20_02-20.02.7-150100.3.30.1">libnss_slurm2_20_02-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpmi0_20_02-20.02.7-150100.3.30.1">
      <FullProductName ProductID="libpmi0_20_02-20.02.7-150100.3.30.1">libpmi0_20_02-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libslurm35-20.02.7-150100.3.30.1">
      <FullProductName ProductID="libslurm35-20.02.7-150100.3.30.1">libslurm35-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="perl-slurm_20_02-20.02.7-150100.3.30.1">
      <FullProductName ProductID="perl-slurm_20_02-20.02.7-150100.3.30.1">perl-slurm_20_02-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_20_02-20.02.7-150100.3.30.1">
      <FullProductName ProductID="slurm_20_02-20.02.7-150100.3.30.1">slurm_20_02-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_20_02-auth-none-20.02.7-150100.3.30.1">
      <FullProductName ProductID="slurm_20_02-auth-none-20.02.7-150100.3.30.1">slurm_20_02-auth-none-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_20_02-config-20.02.7-150100.3.30.1">
      <FullProductName ProductID="slurm_20_02-config-20.02.7-150100.3.30.1">slurm_20_02-config-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_20_02-config-man-20.02.7-150100.3.30.1">
      <FullProductName ProductID="slurm_20_02-config-man-20.02.7-150100.3.30.1">slurm_20_02-config-man-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_20_02-cray-20.02.7-150100.3.30.1">
      <FullProductName ProductID="slurm_20_02-cray-20.02.7-150100.3.30.1">slurm_20_02-cray-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_20_02-devel-20.02.7-150100.3.30.1">
      <FullProductName ProductID="slurm_20_02-devel-20.02.7-150100.3.30.1">slurm_20_02-devel-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_20_02-doc-20.02.7-150100.3.30.1">
      <FullProductName ProductID="slurm_20_02-doc-20.02.7-150100.3.30.1">slurm_20_02-doc-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_20_02-hdf5-20.02.7-150100.3.30.1">
      <FullProductName ProductID="slurm_20_02-hdf5-20.02.7-150100.3.30.1">slurm_20_02-hdf5-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_20_02-lua-20.02.7-150100.3.30.1">
      <FullProductName ProductID="slurm_20_02-lua-20.02.7-150100.3.30.1">slurm_20_02-lua-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_20_02-munge-20.02.7-150100.3.30.1">
      <FullProductName ProductID="slurm_20_02-munge-20.02.7-150100.3.30.1">slurm_20_02-munge-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_20_02-node-20.02.7-150100.3.30.1">
      <FullProductName ProductID="slurm_20_02-node-20.02.7-150100.3.30.1">slurm_20_02-node-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_20_02-openlava-20.02.7-150100.3.30.1">
      <FullProductName ProductID="slurm_20_02-openlava-20.02.7-150100.3.30.1">slurm_20_02-openlava-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_20_02-pam_slurm-20.02.7-150100.3.30.1">
      <FullProductName ProductID="slurm_20_02-pam_slurm-20.02.7-150100.3.30.1">slurm_20_02-pam_slurm-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_20_02-plugins-20.02.7-150100.3.30.1">
      <FullProductName ProductID="slurm_20_02-plugins-20.02.7-150100.3.30.1">slurm_20_02-plugins-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_20_02-rest-20.02.7-150100.3.30.1">
      <FullProductName ProductID="slurm_20_02-rest-20.02.7-150100.3.30.1">slurm_20_02-rest-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_20_02-seff-20.02.7-150100.3.30.1">
      <FullProductName ProductID="slurm_20_02-seff-20.02.7-150100.3.30.1">slurm_20_02-seff-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_20_02-sjstat-20.02.7-150100.3.30.1">
      <FullProductName ProductID="slurm_20_02-sjstat-20.02.7-150100.3.30.1">slurm_20_02-sjstat-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_20_02-slurmdbd-20.02.7-150100.3.30.1">
      <FullProductName ProductID="slurm_20_02-slurmdbd-20.02.7-150100.3.30.1">slurm_20_02-slurmdbd-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_20_02-sql-20.02.7-150100.3.30.1">
      <FullProductName ProductID="slurm_20_02-sql-20.02.7-150100.3.30.1">slurm_20_02-sql-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_20_02-sview-20.02.7-150100.3.30.1">
      <FullProductName ProductID="slurm_20_02-sview-20.02.7-150100.3.30.1">slurm_20_02-sview-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_20_02-testsuite-20.02.7-150100.3.30.1">
      <FullProductName ProductID="slurm_20_02-testsuite-20.02.7-150100.3.30.1">slurm_20_02-testsuite-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_20_02-torque-20.02.7-150100.3.30.1">
      <FullProductName ProductID="slurm_20_02-torque-20.02.7-150100.3.30.1">slurm_20_02-torque-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="slurm_20_02-webdoc-20.02.7-150100.3.30.1">
      <FullProductName ProductID="slurm_20_02-webdoc-20.02.7-150100.3.30.1">slurm_20_02-webdoc-20.02.7-150100.3.30.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libnss_slurm2_20_02-20.02.7-150100.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:libnss_slurm2_20_02-20.02.7-150100.3.30.1">libnss_slurm2_20_02-20.02.7-150100.3.30.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpmi0_20_02-20.02.7-150100.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:libpmi0_20_02-20.02.7-150100.3.30.1">libpmi0_20_02-20.02.7-150100.3.30.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="perl-slurm_20_02-20.02.7-150100.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:perl-slurm_20_02-20.02.7-150100.3.30.1">perl-slurm_20_02-20.02.7-150100.3.30.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_20_02-20.02.7-150100.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:slurm_20_02-20.02.7-150100.3.30.1">slurm_20_02-20.02.7-150100.3.30.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_20_02-auth-none-20.02.7-150100.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:slurm_20_02-auth-none-20.02.7-150100.3.30.1">slurm_20_02-auth-none-20.02.7-150100.3.30.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_20_02-config-20.02.7-150100.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:slurm_20_02-config-20.02.7-150100.3.30.1">slurm_20_02-config-20.02.7-150100.3.30.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_20_02-config-man-20.02.7-150100.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:slurm_20_02-config-man-20.02.7-150100.3.30.1">slurm_20_02-config-man-20.02.7-150100.3.30.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_20_02-cray-20.02.7-150100.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:slurm_20_02-cray-20.02.7-150100.3.30.1">slurm_20_02-cray-20.02.7-150100.3.30.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_20_02-devel-20.02.7-150100.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:slurm_20_02-devel-20.02.7-150100.3.30.1">slurm_20_02-devel-20.02.7-150100.3.30.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_20_02-doc-20.02.7-150100.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:slurm_20_02-doc-20.02.7-150100.3.30.1">slurm_20_02-doc-20.02.7-150100.3.30.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_20_02-hdf5-20.02.7-150100.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:slurm_20_02-hdf5-20.02.7-150100.3.30.1">slurm_20_02-hdf5-20.02.7-150100.3.30.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_20_02-lua-20.02.7-150100.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:slurm_20_02-lua-20.02.7-150100.3.30.1">slurm_20_02-lua-20.02.7-150100.3.30.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_20_02-munge-20.02.7-150100.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:slurm_20_02-munge-20.02.7-150100.3.30.1">slurm_20_02-munge-20.02.7-150100.3.30.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_20_02-node-20.02.7-150100.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:slurm_20_02-node-20.02.7-150100.3.30.1">slurm_20_02-node-20.02.7-150100.3.30.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_20_02-openlava-20.02.7-150100.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:slurm_20_02-openlava-20.02.7-150100.3.30.1">slurm_20_02-openlava-20.02.7-150100.3.30.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_20_02-pam_slurm-20.02.7-150100.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:slurm_20_02-pam_slurm-20.02.7-150100.3.30.1">slurm_20_02-pam_slurm-20.02.7-150100.3.30.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_20_02-plugins-20.02.7-150100.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:slurm_20_02-plugins-20.02.7-150100.3.30.1">slurm_20_02-plugins-20.02.7-150100.3.30.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_20_02-rest-20.02.7-150100.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:slurm_20_02-rest-20.02.7-150100.3.30.1">slurm_20_02-rest-20.02.7-150100.3.30.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_20_02-seff-20.02.7-150100.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:slurm_20_02-seff-20.02.7-150100.3.30.1">slurm_20_02-seff-20.02.7-150100.3.30.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_20_02-sjstat-20.02.7-150100.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:slurm_20_02-sjstat-20.02.7-150100.3.30.1">slurm_20_02-sjstat-20.02.7-150100.3.30.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_20_02-slurmdbd-20.02.7-150100.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:slurm_20_02-slurmdbd-20.02.7-150100.3.30.1">slurm_20_02-slurmdbd-20.02.7-150100.3.30.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_20_02-sql-20.02.7-150100.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:slurm_20_02-sql-20.02.7-150100.3.30.1">slurm_20_02-sql-20.02.7-150100.3.30.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_20_02-sview-20.02.7-150100.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:slurm_20_02-sview-20.02.7-150100.3.30.1">slurm_20_02-sview-20.02.7-150100.3.30.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_20_02-testsuite-20.02.7-150100.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:slurm_20_02-testsuite-20.02.7-150100.3.30.1">slurm_20_02-testsuite-20.02.7-150100.3.30.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_20_02-torque-20.02.7-150100.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:slurm_20_02-torque-20.02.7-150100.3.30.1">slurm_20_02-torque-20.02.7-150100.3.30.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="slurm_20_02-webdoc-20.02.7-150100.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:slurm_20_02-webdoc-20.02.7-150100.3.30.1">slurm_20_02-webdoc-20.02.7-150100.3.30.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
  </ProductTree>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. There is Improper Enforcement of Message Integrity During Transmission in a Communication Channel. This allows attackers to modify RPC traffic in a way that bypasses message hash checks. The fixed versions are 22.05.11, 23.02.7, and 23.11.1.</Note>
    </Notes>
    <CVE>CVE-2023-49933</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.5:libnss_slurm2_20_02-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:libpmi0_20_02-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:perl-slurm_20_02-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-auth-none-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-config-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-config-man-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-cray-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-devel-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-doc-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-hdf5-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-lua-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-munge-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-node-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-openlava-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-pam_slurm-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-plugins-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-rest-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-seff-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-sjstat-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-slurmdbd-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-sql-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-sview-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-testsuite-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-torque-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-webdoc-20.02.7-150100.3.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV3>
        <BaseScoreV3>5.9</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20240278-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-49933.html</URL>
        <Description>CVE-2023-49933</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218046</URL>
        <Description>SUSE Bug 1218046</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. A NULL pointer dereference leads to denial of service. The fixed versions are 22.05.11, 23.02.7, and 23.11.1.</Note>
    </Notes>
    <CVE>CVE-2023-49936</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.5:libnss_slurm2_20_02-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:libpmi0_20_02-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:perl-slurm_20_02-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-auth-none-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-config-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-config-man-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-cray-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-devel-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-doc-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-hdf5-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-lua-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-munge-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-node-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-openlava-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-pam_slurm-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-plugins-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-rest-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-seff-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-sjstat-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-slurmdbd-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-sql-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-sview-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-testsuite-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-torque-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-webdoc-20.02.7-150100.3.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV3>
        <BaseScoreV3>7.8</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20240278-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-49936.html</URL>
        <Description>CVE-2023-49936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218050</URL>
        <Description>SUSE Bug 1218050</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. Because of a double free, attackers can cause a denial of service or possibly execute arbitrary code. The fixed versions are 22.05.11, 23.02.7, and 23.11.1.</Note>
    </Notes>
    <CVE>CVE-2023-49937</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.5:libnss_slurm2_20_02-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:libpmi0_20_02-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:perl-slurm_20_02-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-auth-none-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-config-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-config-man-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-cray-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-devel-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-doc-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-hdf5-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-lua-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-munge-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-node-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-openlava-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-pam_slurm-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-plugins-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-rest-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-seff-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-sjstat-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-slurmdbd-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-sql-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-sview-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-testsuite-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-torque-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-webdoc-20.02.7-150100.3.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV3>
        <BaseScoreV3>7.8</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20240278-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-49937.html</URL>
        <Description>CVE-2023-49937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218051</URL>
        <Description>SUSE Bug 1218051</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in SchedMD Slurm 22.05.x and 23.02.x. There is Incorrect Access Control: an attacker can modified their extended group list that is used with the sbcast subsystem, and open files with an unauthorized set of extended groups. The fixed versions are 22.05.11 and 23.02.7.</Note>
    </Notes>
    <CVE>CVE-2023-49938</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.5:libnss_slurm2_20_02-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:libpmi0_20_02-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:perl-slurm_20_02-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-auth-none-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-config-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-config-man-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-cray-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-devel-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-doc-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-hdf5-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-lua-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-munge-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-node-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-openlava-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-pam_slurm-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-plugins-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-rest-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-seff-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-sjstat-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-slurmdbd-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-sql-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-sview-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-testsuite-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-torque-20.02.7-150100.3.30.1</ProductID>
        <ProductID>openSUSE Leap 15.5:slurm_20_02-webdoc-20.02.7-150100.3.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV3>
        <BaseScoreV3>5.1</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20240278-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-49938.html</URL>
        <Description>CVE-2023-49938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218053</URL>
        <Description>SUSE Bug 1218053</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
</cvrfdoc>
