{"affected":[{"ecosystem_specific":{"binaries":[{"libpmi0":"17.11.13-150000.6.40.1","libslurm32":"17.11.13-150000.6.40.1","perl-slurm":"17.11.13-150000.6.40.1","slurm":"17.11.13-150000.6.40.1","slurm-auth-none":"17.11.13-150000.6.40.1","slurm-config":"17.11.13-150000.6.40.1","slurm-devel":"17.11.13-150000.6.40.1","slurm-doc":"17.11.13-150000.6.40.1","slurm-lua":"17.11.13-150000.6.40.1","slurm-munge":"17.11.13-150000.6.40.1","slurm-node":"17.11.13-150000.6.40.1","slurm-pam_slurm":"17.11.13-150000.6.40.1","slurm-plugins":"17.11.13-150000.6.40.1","slurm-slurmdbd":"17.11.13-150000.6.40.1","slurm-sql":"17.11.13-150000.6.40.1","slurm-torque":"17.11.13-150000.6.40.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15-ESPOS","name":"slurm","purl":"pkg:rpm/suse/slurm&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"17.11.13-150000.6.40.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libpmi0":"17.11.13-150000.6.40.1","libslurm32":"17.11.13-150000.6.40.1","perl-slurm":"17.11.13-150000.6.40.1","slurm":"17.11.13-150000.6.40.1","slurm-auth-none":"17.11.13-150000.6.40.1","slurm-config":"17.11.13-150000.6.40.1","slurm-devel":"17.11.13-150000.6.40.1","slurm-doc":"17.11.13-150000.6.40.1","slurm-lua":"17.11.13-150000.6.40.1","slurm-munge":"17.11.13-150000.6.40.1","slurm-node":"17.11.13-150000.6.40.1","slurm-pam_slurm":"17.11.13-150000.6.40.1","slurm-plugins":"17.11.13-150000.6.40.1","slurm-slurmdbd":"17.11.13-150000.6.40.1","slurm-sql":"17.11.13-150000.6.40.1","slurm-torque":"17.11.13-150000.6.40.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15-LTSS","name":"slurm","purl":"pkg:rpm/suse/slurm&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"17.11.13-150000.6.40.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libslurm32":"17.11.13-150000.6.40.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.3","name":"slurm","purl":"pkg:rpm/opensuse/slurm&distro=openSUSE%20Leap%2015.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"17.11.13-150000.6.40.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libslurm32":"17.11.13-150000.6.40.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.4","name":"slurm","purl":"pkg:rpm/opensuse/slurm&distro=openSUSE%20Leap%2015.4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"17.11.13-150000.6.40.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for slurm fixes the following issues:\n\n- CVE-2022-31251: Fixed a potential security vulnerability in the test package (bsc#1201674).\n- CVE-2022-29500: Fixed architectural flaw that could have been exploited to allow an unprivileged user to execute arbitrary processes as root (bsc#1199278).\n- CVE-2022-29501: Fixed a problem that an unprivileged user could have sent data to arbitrary unix socket as root (bsc#1199279).\n","id":"SUSE-SU-2022:3535-1","modified":"2022-10-06T08:27:36Z","published":"2022-10-06T08:27:36Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2022/suse-su-20223535-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1199278"},{"type":"REPORT","url":"https://bugzilla.suse.com/1199279"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201674"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-29500"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-29501"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-31251"}],"related":["CVE-2022-29500","CVE-2022-29501","CVE-2022-31251"],"summary":"Security update for slurm","upstream":["CVE-2022-29500","CVE-2022-29501","CVE-2022-31251"]}