{"affected":[{"ecosystem_specific":{"binaries":[{"python311-salt":"3006.0-13.1","salt":"3006.0-13.1","salt-master":"3006.0-13.1","salt-minion":"3006.0-13.1","salt-transactional-update":"3006.0-13.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"salt","purl":"pkg:rpm/suse/salt&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3006.0-13.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update fixes the following issues:\n\ngolang-github-prometheus-node_exporter:\n\n- Security issues fixed:\n  \n  - CVE-2025-22870: Prevent a matching of hosts against proxy patterns to improperly treat an IPv6 zone ID as a\n    hostname component (bsc#1238686)\n\n- Other bugs fixed:\n\n  - Fixed Darwin memory leak\n  - pressure: Fix missing IRQ on older kernels\n\nsalt, venv-salt-minion:\n\n- Security issues fixed:\n  \n  - CVE-2024-38822: Fixed Minion token validation (bsc#1244561)\n  - CVE-2024-38823: Fixed server vulnerability to replay attacks when not using a TLS encrypted transport (bsc#1244564)\n  - CVE-2024-38824: Fixed directory traversal vulnerability in recv_file method (bsc#1244565)\n  - CVE-2024-38825: Fixed salt.auth.pki module authentication issue (bsc#1244566)\n  - CVE-2025-22240: Fixed arbitrary directory creation or file deletion with GitFS (bsc#1244567)\n  - CVE-2025-22236: Fixed Minion event bus authorization bypass (bsc#1244568)\n  - CVE-2025-22241: Fixed the use of un-validated input in the VirtKey class (bsc#1244570)\n  - CVE-2025-22237: Fixed exploitation of the 'on demand' pillar functionality (bsc#1244571)\n  - CVE-2025-22238: Fixed the master's default cache vulnerability to a directory traversal attack (bsc#1244572)\n  - CVE-2025-22239: Fixed the arbitrary event injection on the Salt Master (bsc#1244574) \n  - CVE-2025-22242: Fixed a Denial of Service vulnerability through file read operation (bsc#1244575)\n  - CVE-2025-47287: Fixed a Denial of Service vulnerability in Tornado logging behavior (bsc#1243268)\n\n- Other bugs fixed:\n\n  - Added subsystem filter to udev.exportdb (bsc#1236621)\n  - Added `minion_legacy_req_warnings` option to avoid noisy warnings\n  - Fixed Ubuntu 24.04 edge-case test failures\n  - Fixed refresh of osrelease and related grains on Python 3.10+\n  - Fixed issue requiring proper Python flavor for dependencies\n  - Require M2Crypto version 0.44.0 or higher\n  - venv-salt-minion: Fixed bundle path in pyvenv.cfg\n\nuyuni-tools:\n    \n- Version 0.1.31-0:\n\n  - Added the info message about End User License Agreement\n  - Don't migrate py2*-compat-salt.conf files (bsc#1240626)\n  - Check for restorecon before using it (bsc#1240698)\n  - Adjust the distro path in cobbler files after migration\n    (bsc#1238929)\n  - Added mgradm support ptf podman --pullPolicy flag (bsc#1236877)\n  - Support: don't dump files in bound folders (bsc#1243297)\n  - Cleanup host supportconfig files (bsc#1242174)\n  - During migration, check if backup already exists (bsc#1243105)\n  - Removed SHM size limits from all containers (bsc#1243274)\n  - Don't migrate /etc/apache2/vhosts.d/cobbler.conf\n  - Fixed migration --prepare for autoinstallable distributions (bsc#1243802)\n  - Skip instalation if the server is already set up (bsc#1238849)\n  - Bumped the default image tag to 5.0.5\n\n","id":"SUSE-SU-2025:20504-1","modified":"2025-07-23T13:34:01Z","published":"2025-07-23T13:34:01Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520504-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236621"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236877"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238686"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238849"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238929"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240626"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240698"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242174"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243105"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243268"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243274"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243297"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243802"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244561"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244564"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244565"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244566"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244567"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244568"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244570"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244571"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244572"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244574"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244575"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38822"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38823"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38824"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38825"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22236"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22237"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22238"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22239"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22240"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22241"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22242"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22870"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-47287"}],"related":["CVE-2024-38822","CVE-2024-38823","CVE-2024-38824","CVE-2024-38825","CVE-2025-22236","CVE-2025-22237","CVE-2025-22238","CVE-2025-22239","CVE-2025-22240","CVE-2025-22241","CVE-2025-22242","CVE-2025-22870","CVE-2025-47287"],"summary":"Security update 5.0.5 for Multi-Linux Manager Client Tools, Salt and Salt Bundle","upstream":["CVE-2024-38822","CVE-2024-38823","CVE-2024-38824","CVE-2024-38825","CVE-2025-22236","CVE-2025-22237","CVE-2025-22238","CVE-2025-22239","CVE-2025-22240","CVE-2025-22241","CVE-2025-22242","CVE-2025-22870","CVE-2025-47287"]}