{"affected":[{"ecosystem_specific":{"binaries":[{"python3-salt":"3004-150400.8.8.1","salt":"3004-150400.8.8.1","salt-bash-completion":"3004-150400.8.8.1","salt-doc":"3004-150400.8.8.1","salt-minion":"3004-150400.8.8.1","salt-zsh-completion":"3004-150400.8.8.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP4","name":"salt","purl":"pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3004-150400.8.8.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"salt-api":"3004-150400.8.8.1","salt-cloud":"3004-150400.8.8.1","salt-fish-completion":"3004-150400.8.8.1","salt-master":"3004-150400.8.8.1","salt-proxy":"3004-150400.8.8.1","salt-ssh":"3004-150400.8.8.1","salt-standalone-formulas-configuration":"3004-150400.8.8.1","salt-syndic":"3004-150400.8.8.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Server Applications 15 SP4","name":"salt","purl":"pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3004-150400.8.8.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"salt-transactional-update":"3004-150400.8.8.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Transactional Server 15 SP4","name":"salt","purl":"pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Transactional%20Server%2015%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3004-150400.8.8.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"python3-salt":"3004-150400.8.8.1","salt":"3004-150400.8.8.1","salt-api":"3004-150400.8.8.1","salt-bash-completion":"3004-150400.8.8.1","salt-cloud":"3004-150400.8.8.1","salt-doc":"3004-150400.8.8.1","salt-fish-completion":"3004-150400.8.8.1","salt-master":"3004-150400.8.8.1","salt-minion":"3004-150400.8.8.1","salt-proxy":"3004-150400.8.8.1","salt-ssh":"3004-150400.8.8.1","salt-standalone-formulas-configuration":"3004-150400.8.8.1","salt-syndic":"3004-150400.8.8.1","salt-transactional-update":"3004-150400.8.8.1","salt-zsh-completion":"3004-150400.8.8.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.4","name":"salt","purl":"pkg:rpm/opensuse/salt&distro=openSUSE%20Leap%2015.4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3004-150400.8.8.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for salt fixes the following issues:\n\n- CVE-2022-22967: Fixed missing check for PAM_ACCT_MGM return value that could be used to bypass authentication when using PAM (bsc#1200566)\n","id":"SUSE-SU-2022:2304-1","modified":"2022-07-06T11:38:33Z","published":"2022-07-06T11:38:33Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2022/suse-su-20222304-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1200566"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-22967"}],"related":["CVE-2022-22967"],"summary":"Security update for salt","upstream":["CVE-2022-22967"]}