slurm-llnl is vulnerable to authentication bypass. when message aggregation is enabled, An attacker can exploit this vulnerability via an alternate path or channel while race condition allows a user to launch a process as an arbitrary user
lists.opensuse.org/opensuse-security-announce/2020-09/msg00035.html
lists.opensuse.org/opensuse-security-announce/2020-09/msg00063.html
lists.debian.org/debian-lts-announce/2022/01/msg00011.html
lists.fedoraproject.org/archives/list/[email protected]/message/KNL5E5SK4WP6M3DKU4IKW2NPQD2XTZ4Y/
lists.fedoraproject.org/archives/list/[email protected]/message/T3RGQB3EWDLOLTSPAJPPWZEPQK3O3AUH/
lists.schedmd.com/pipermail/slurm-announce/2020/000036.html
security-tracker.debian.org/tracker/CVE-2020-12693
www.debian.org/security/2021/dsa-4841
www.schedmd.com/news.php?id=236