SUSE alert SUSE-SU-2026:1027-1 (salt)
| From: | OPENSUSE-SECURITY-UPDATES <null@suse.de> | |
| To: | security-announce@lists.opensuse.org | |
| Subject: | SUSE-SU-2026:1027-1: important: Security update for salt | |
| Date: | Wed, 25 Mar 2026 16:34:16 -0000 | |
| Message-ID: | <177445645649.743.14642994467366791967@1fb0c5c8c07c> | |
| Archive-link: | Article |
# Security update for salt Announcement ID: SUSE-SU-2026:1027-1 Release Date: 2026-03-25T10:15:43Z Rating: important References: * bsc#1240532 * bsc#1246130 * bsc#1254325 * bsc#1254400 * bsc#1254903 * bsc#1254904 * bsc#1254905 * jsc#MSQA-1045 Cross-References: * CVE-2025-13836 * CVE-2025-67724 * CVE-2025-67725 * CVE-2025-67726 CVSS scores: * CVE-2025-13836 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13836 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-13836 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13836 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-67724 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-67724 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-67724 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2025-67724 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-67725 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-67725 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-67725 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-67726 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-67726 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-67726 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves four vulnerabilities, contains one feature and has three security fixes can now be installed. ## Description: This update for salt fixes the following issues: * Security issues fixed: * CVE-2025-67724: Fixed missing validation of supplied reason phrase (bsc#1254903) * CVE-2025-67725: Fixed DoS via malicious HTTP request (bsc#1254905) * CVE-2025-67726: Fixed HTTP header parameter parsing algorithm (bsc#1254904) * CVE-2025-13836: Set a safe limit to http.client response read (bsc#1254400) * Made syntax in httputil_test compatible with Python 3.6 * Fixed KeyError in postgres module with PostgreSQL 17 (bsc#1254325) * Use internal deb classes instead of external aptsource lib * Improved wheel key.finger call (bsc#1240532) * Improved utils.find_json function (bsc#1246130) * Extended warn_until period to 2027 ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2026-1027=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-1027=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-1027=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * salt-transactional-update-3006.0-150300.53.104.1 * salt-cloud-3006.0-150300.53.104.1 * salt-syndic-3006.0-150300.53.104.1 * salt-standalone-formulas-configuration-3006.0-150300.53.104.1 * python3-salt-testsuite-3006.0-150300.53.104.1 * salt-api-3006.0-150300.53.104.1 * salt-master-3006.0-150300.53.104.1 * salt-3006.0-150300.53.104.1 * salt-doc-3006.0-150300.53.104.1 * salt-ssh-3006.0-150300.53.104.1 * salt-minion-3006.0-150300.53.104.1 * python3-salt-3006.0-150300.53.104.1 * salt-proxy-3006.0-150300.53.104.1 * openSUSE Leap 15.3 (noarch) * salt-zsh-completion-3006.0-150300.53.104.1 * salt-bash-completion-3006.0-150300.53.104.1 * salt-fish-completion-3006.0-150300.53.104.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * salt-3006.0-150300.53.104.1 * salt-transactional-update-3006.0-150300.53.104.1 * python3-salt-3006.0-150300.53.104.1 * salt-minion-3006.0-150300.53.104.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * salt-3006.0-150300.53.104.1 * salt-transactional-update-3006.0-150300.53.104.1 * python3-salt-3006.0-150300.53.104.1 * salt-minion-3006.0-150300.53.104.1 ## References: * https://www.suse.com/security/cve/CVE-2025-13836.html * https://www.suse.com/security/cve/CVE-2025-67724.html * https://www.suse.com/security/cve/CVE-2025-67725.html * https://www.suse.com/security/cve/CVE-2025-67726.html * https://bugzilla.suse.com/show_bug.cgi?id=1240532 * https://bugzilla.suse.com/show_bug.cgi?id=1246130 * https://bugzilla.suse.com/show_bug.cgi?id=1254325 * https://bugzilla.suse.com/show_bug.cgi?id=1254400 * https://bugzilla.suse.com/show_bug.cgi?id=1254903 * https://bugzilla.suse.com/show_bug.cgi?id=1254904 * https://bugzilla.suse.com/show_bug.cgi?id=1254905 * https://jira.suse.com/browse/MSQA-1045
Attachment: None (type=text/html)
(HTML attachment elided)
