File _patchinfo of Package patchinfo.39501
<patchinfo incident="39501">
<issue tracker="ijsc" id="MSQA-993"/>
<issue tracker="bnc" id="1244570">VUL-0: CVE-2025-22241: salt: Path traversal in salt.utils.virt</issue>
<issue tracker="bnc" id="1244575">VUL-0: CVE-2025-22242: salt: worker process denial of service through file read operation</issue>
<issue tracker="bnc" id="1244561">VUL-0: CVE-2024-38822: salt: multiple methods in the salt master skip minion token validation</issue>
<issue tracker="bnc" id="1244574">VUL-0: CVE-2025-22239: salt: the master's "_minion_event" method can be used by and authorized minion to send arbitrary events onto the master's event bus</issue>
<issue tracker="bnc" id="1244566">VUL-0: CVE-2024-38825: salt: the salt.auth.pki module does not properly authenticate callers</issue>
<issue tracker="bnc" id="1243268">VUL-0: CVE-2025-47287: python-tornado,python-tornado6: denial-of-service via generation of an extremely high volume of logs due to multipart/form-data parser</issue>
<issue tracker="bnc" id="1244571">VUL-0: CVE-2025-22237: salt: access to a minion key allows for exploitation of the 'on demand' pillar functionality such that arbitrary commands cn be run on the master with the same privileges as the master process</issue>
<issue tracker="bnc" id="1244565">VUL-0: CVE-2024-38824: salt: directory traversal in recv_file method allows arbitrary files to be written to the master cache directory</issue>
<issue tracker="bnc" id="1236621">IP address in the webui is showing up as unknown</issue>
<issue tracker="bnc" id="1244568">VUL-0: CVE-2025-22236: salt: attackers with access to a minion key can craft a message which may be able to execute a job on other minions</issue>
<issue tracker="bnc" id="1244564">VUL-0: CVE-2024-38823: salt: request server can be affected by replay attacks when not using a TLS encrypted transport</issue>
<issue tracker="bnc" id="1244572">VUL-0: CVE-2025-22238: salt: directory traversal in minion file cache creation can be leveraged to write or overwrite 'cache' files outside of the cache directory</issue>
<issue tracker="bnc" id="1244567">VUL-0: CVE-2025-22240: salt: Path traversal in GitFS find_file()</issue>
<issue tracker="cve" id="2025-22237"/>
<issue tracker="cve" id="2024-38822"/>
<issue tracker="cve" id="2025-22242"/>
<issue tracker="cve" id="2025-22236"/>
<issue tracker="cve" id="2024-38825"/>
<issue tracker="cve" id="2025-22240"/>
<issue tracker="cve" id="2025-47287"/>
<issue tracker="cve" id="2024-38823"/>
<issue tracker="cve" id="2024-38824"/>
<issue tracker="cve" id="2025-22239"/>
<issue tracker="cve" id="2025-22241"/>
<issue tracker="cve" id="2025-22238"/>
<packager>PSuarezHernandez</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for salt</summary>
<description>This update for salt fixes the following issues:
- Security issues fixed:
- CVE-2024-38822: Fixed Minion token validation (bsc#1244561)
- CVE-2024-38823: Fixed server vulnerability to replay attacks when not using a TLS encrypted transport (bsc#1244564)
- CVE-2024-38824: Fixed directory traversal vulnerability in recv_file method (bsc#1244565)
- CVE-2024-38825: Fixed salt.auth.pki module authentication issue (bsc#1244566)
- CVE-2025-22240: Fixed arbitrary directory creation or file deletion with GitFS (bsc#1244567)
- CVE-2025-22236: Fixed Minion event bus authorization bypass (bsc#1244568)
- CVE-2025-22241: Fixed the use of un-validated input in the VirtKey class (bsc#1244570)
- CVE-2025-22237: Fixed exploitation of the 'on demand' pillar functionality (bsc#1244571)
- CVE-2025-22238: Fixed the master's default cache vulnerability to a directory traversal attack (bsc#1244572)
- CVE-2025-22239: Fixed the arbitrary event injection on the Salt Master (bsc#1244574)
- CVE-2025-22242: Fixed a Denial of Service vulnerability through file read operation (bsc#1244575)
- CVE-2025-47287: Fixed a Denial of Service vulnerability in Tornado logging behavior (bsc#1243268)
- Other bugs fixed:
- Added subsystem filter to udev.exportdb (bsc#1236621)
- Fixed Ubuntu 24.04 test failures
- Fixed refresh of osrelease and related grains on Python 3.10+
- Fixed issue requiring proper Python flavor for dependencies
</description>
<zypp_restart_needed/>
</patchinfo>