Overview
Request 849302 revoked
- PMIx - fix potential buffer overflows from use of unpackmem().
CVE-2020-27745 (bsc#1178890)
* PMIx-fix-potential-buffer-overflows-from-use-of-unpackmen_CVE-2020-27745.patch
- X11 forwarding - fix potential leak of the magic cookie when sent as an
argument to the xauth command. CVE-2020-27746 (bsc#1178891)
* X11-forwarding-avoid-unsafe-use-of-magic-cookie_CVE-2020-27746.patch
- More information at https://lists.schedmd.com/pipermail/slurm-announce/2020/000045.html
Request History
anag created request
- PMIx - fix potential buffer overflows from use of unpackmem().
CVE-2020-27745 (bsc#1178890)
* PMIx-fix-potential-buffer-overflows-from-use-of-unpackmen_CVE-2020-27745.patch
- X11 forwarding - fix potential leak of the magic cookie when sent as an
argument to the xauth command. CVE-2020-27746 (bsc#1178891)
* X11-forwarding-avoid-unsafe-use-of-magic-cookie_CVE-2020-27746.patch
- More information at https://lists.schedmd.com/pipermail/slurm-announce/2020/000045.html
factory-auto accepted review
Check script succeeded
licensedigger accepted review
ok
maintbot added slurm as a reviewer
Submission for slurm by someone who is not maintainer in the devel project (network:cluster). Please review
maintbot accepted review
ok
eeich accepted review
Looks good, thanks!
eeich approved review
Looks good, thanks!
rfrohl declined request
imported from SLE
anag revoked request
The source project 'home:anag:branches:openSUSE:Leap:15.1:Update' has been removed
home:anag:branches:openSUSE:Leap:15.1:Update/slurm@2dca98832909b26460d195ba7edb2959 -> openSUSE:Leap:15.1:Update/slurm
expected origin is 'SUSE:SLE-15-SP1:GA' (changed)