SUSE-SU-2026:1027-1

Source
https://www.suse.com/support/update/announcement/2026/suse-su-20261027-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:1027-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2026:1027-1
Upstream
Related
Published
2026-03-25T10:15:43Z
Modified
2026-03-26T09:01:00.582269Z
Summary
Security update for salt
Details

This update for salt fixes the following issues:

  • Security issues fixed:

    • CVE-2025-67724: Fixed missing validation of supplied reason phrase (bsc#1254903)
    • CVE-2025-67725: Fixed DoS via malicious HTTP request (bsc#1254905)
    • CVE-2025-67726: Fixed HTTP header parameter parsing algorithm (bsc#1254904)
    • CVE-2025-13836: Set a safe limit to http.client response read (bsc#1254400)
  • Made syntax in httputil_test compatible with Python 3.6

  • Fixed KeyError in postgres module with PostgreSQL 17 (bsc#1254325)
  • Use internal deb classes instead of external aptsource lib
  • Improved wheel key.finger call (bsc#1240532)
  • Improved utils.find_json function (bsc#1246130)
  • Extended warn_until period to 2027
References

Affected packages

SUSE:Linux Enterprise Micro 5.2 / salt

Package

Name
salt
Purl
pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3006.0-150300.53.104.1

Ecosystem specific

{
    "binaries": [
        {
            "salt-minion": "3006.0-150300.53.104.1",
            "salt-transactional-update": "3006.0-150300.53.104.1",
            "salt": "3006.0-150300.53.104.1",
            "python3-salt": "3006.0-150300.53.104.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:1027-1.json"