openSUSE-SU-2022:1059-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/openSUSE-SU-2022:1059-1.json
JSON Data
https://api.osv.dev/v1/vulns/openSUSE-SU-2022:1059-1
Related
Published
2022-03-30T15:33:09Z
Modified
2022-03-30T15:33:09Z
Summary
Security update for salt
Details

This update for salt fixes the following issues:

  • CVE-2022-22935: Sign authentication replies to prevent MiTM (bsc#1197417)
  • CVE-2022-22934: Sign pillar data to prevent MiTM attacks. (bsc#1197417)
  • CVE-2022-22936: Prevent job and fileserver replays (bsc#1197417)
  • CVE-2022-22941: Fixed targeting bug, especially visible when using syndic and user auth. (bsc#1197417)
References

Affected packages

openSUSE:Leap 15.3 / salt

Package

Name
salt
Purl
pkg:rpm/opensuse/salt&distro=openSUSE%20Leap%2015.3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3002.2-150300.53.10.1

Ecosystem specific

{
    "binaries": [
        {
            "salt-bash-completion": "3002.2-150300.53.10.1",
            "salt-cloud": "3002.2-150300.53.10.1",
            "salt": "3002.2-150300.53.10.1",
            "python3-salt": "3002.2-150300.53.10.1",
            "salt-ssh": "3002.2-150300.53.10.1",
            "salt-transactional-update": "3002.2-150300.53.10.1",
            "salt-proxy": "3002.2-150300.53.10.1",
            "salt-zsh-completion": "3002.2-150300.53.10.1",
            "salt-standalone-formulas-configuration": "3002.2-150300.53.10.1",
            "salt-syndic": "3002.2-150300.53.10.1",
            "salt-master": "3002.2-150300.53.10.1",
            "salt-doc": "3002.2-150300.53.10.1",
            "salt-api": "3002.2-150300.53.10.1",
            "salt-minion": "3002.2-150300.53.10.1",
            "salt-fish-completion": "3002.2-150300.53.10.1"
        }
    ]
}