{"affected":[{"ecosystem_specific":{"binaries":[{"libpmi0":"17.02.11-6.50.1","libslurm31":"17.02.11-6.50.1","perl-slurm":"17.02.11-6.50.1","slurm":"17.02.11-6.50.1","slurm-auth-none":"17.02.11-6.50.1","slurm-config":"17.02.11-6.50.1","slurm-devel":"17.02.11-6.50.1","slurm-doc":"17.02.11-6.50.1","slurm-lua":"17.02.11-6.50.1","slurm-munge":"17.02.11-6.50.1","slurm-pam_slurm":"17.02.11-6.50.1","slurm-plugins":"17.02.11-6.50.1","slurm-sched-wiki":"17.02.11-6.50.1","slurm-slurmdb-direct":"17.02.11-6.50.1","slurm-slurmdbd":"17.02.11-6.50.1","slurm-sql":"17.02.11-6.50.1","slurm-torque":"17.02.11-6.50.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for HPC 12","name":"slurm","purl":"pkg:rpm/suse/slurm&distro=SUSE%20Linux%20Enterprise%20Module%20for%20HPC%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"17.02.11-6.50.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for slurm fixes the following issues:\n\n- CVE-2021-31215: remote code execution as SlurmUser because of a PrologSlurmctld or EpilogSlurmctld script leads to environment mishandling (bsc#1186024)\n","id":"SUSE-SU-2021:1787-1","modified":"2021-05-27T14:48:42Z","published":"2021-05-27T14:48:42Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2021/suse-su-20211787-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1186024"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-31215"}],"related":["CVE-2021-31215"],"summary":"Security update for slurm","upstream":["CVE-2021-31215"]}