[SUSE-SU-2022:1536-1] Security Beta update for SUSE Manager Salt Bundle
Severity
Important
CVEs
8
Security Beta update for SUSE Manager Salt Bundle
This update fixes the following issues:
venv-salt-minion:
- Fix the regression caused by the patch removing strict requirement for OpenSSL 1.1.1 leading to read/write issues with ssl module for SLE 15, SLE 12, CentOS 7, Debian 9 (bsc#1198556)
- Fixes for Python 3.10
- Fix salt-ssh opts poisoning (bsc#1197637)
- Fix multiple security issues (bsc#1197417)
- CVE-2022-22935: Sign authentication replies to prevent MiTM
- CVE-2022-22934: Sign pillar data to prevent MiTM attacks.
- CVE-2022-22936: Prevent job and fileserver replays.
- CVE-2022-22941: Fixed targeting bug, especially visible when using syndic and user auth.
- Salt version bump to 3004
- Python version bump to 3.10.2
- CVE-2022-24302: unauthorized information disclosure for python-paramiko.
- CVE-2021-28957: XSS due to missing input sanitization in python-lxml.
- CVE-2018-19787: XSS attacks due to missing URLs sanitization in python-lxml.
- Security Fix: (bsc#1196249, bsc#1196877, CVE-2022-0778)
- Allow CRYPTO_THREADID_set_callback to be called with NULL parameter
- Infinite loop in BN_mod_sqrt() reachable when parsing certificates
- ID
- SUSE-SU-2022:1536-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2022/suse-su-20221536-1/
- Published
-
2022-05-04T13:33:28
(2 years ago) - Modified
-
2022-05-04T13:33:28
(2 years ago) - Rights
- Copyright 2023 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2022-1575
- ALAS2-2022-1766
- ALAS2-2024-2502
- ALAS2-2024-2620
- ALPINE:CVE-2021-28957
- ALPINE:CVE-2022-0778
- ALPINE:CVE-2022-22934
- ALPINE:CVE-2022-22935
- ALPINE:CVE-2022-22936
- ALPINE:CVE-2022-22941
- ALSA-2021:4151
- ALSA-2021:4158
- ALSA-2021:4160
- ALSA-2021:4162
- ALSA-2022:1065
- ALSA-2022:5326
- DSA-4880-1
- DSA-5103-1
- ELSA-2021-4151
- ELSA-2021-4160
- ELSA-2021-4162
- ELSA-2022-1065
- ELSA-2022-1066
- ELSA-2022-4899
- ELSA-2022-5326
- ELSA-2022-9224
- ELSA-2022-9225
- ELSA-2022-9233
- ELSA-2022-9237
- ELSA-2022-9243
- ELSA-2022-9246
- ELSA-2022-9249
- ELSA-2022-9255
- ELSA-2022-9258
- ELSA-2022-9272
- ELSA-2022-9341
- FEDORA-2018-4be0428ab2
- FEDORA-2018-67e98d4b7a
- FEDORA-2021-28723f9670
- FEDORA-2021-4cdb0f68c7
- FEDORA-2022-806492f1d1
- FEDORA-2022-8bb51f6901
- FEDORA-2022-8eb95d8611
- FEDORA-2022-9e88b5d8d7
- FEDORA-2022-a5f51502f0
- FEDORA-2022-bb5c461682
- FREEBSD:ADD683BE-BD76-11EC-A06F-D4C9EF517024
- FREEBSD:EA05C456-A4FD-11EC-90DE-1C697AA5A594
- GLSA-202208-06
- GLSA-202210-02
- GLSA-202310-22
- GLSA-202405-29
- MS:CVE-2018-19787
- MS:CVE-2021-28957
- MS:CVE-2022-0778
- openSUSE-SU-2022:0803-1
- openSUSE-SU-2022:0856-1
- openSUSE-SU-2022:1059-1
- PYSEC-2018-12
- PYSEC-2021-19
- PYSEC-2022-166
- PYSEC-2022-171
- PYSEC-2022-172
- PYSEC-2022-173
- PYSEC-2022-174
- RHSA-2021:4151
- RHSA-2021:4158
- RHSA-2021:4160
- RHSA-2021:4162
- RHSA-2022:1065
- RHSA-2022:1066
- RHSA-2022:4899
- RHSA-2022:5326
- RLSA-2021:4151
- RLSA-2021:4160
- RLSA-2021:4162
- RLSA-2022:1065
- RLSA-2022:4899
- RLSA-2022:5326
- RUSTSEC-2022-0014
- SECADV-20220315-1
- SSA:2022-076-02
- SUSE-SU-2022:0803-1
- SUSE-SU-2022:0851-1
- SUSE-SU-2022:0853-1
- SUSE-SU-2022:0854-1
- SUSE-SU-2022:0856-1
- SUSE-SU-2022:0857-1
- SUSE-SU-2022:0859-1
- SUSE-SU-2022:0860-1
- SUSE-SU-2022:0861-1
- SUSE-SU-2022:0895-1
- SUSE-SU-2022:0935-1
- SUSE-SU-2022:1049-1
- SUSE-SU-2022:1050-1
- SUSE-SU-2022:1051-1
- SUSE-SU-2022:1057-1
- SUSE-SU-2022:1058-1
- SUSE-SU-2022:1059-1
- SUSE-SU-2022:1060-1
- SUSE-SU-2022:1446-1
- SUSE-SU-2022:1447-1
- SUSE-SU-2022:1459-1
- SUSE-SU-2022:1461-1
- SUSE-SU-2022:1462-1
- SUSE-SU-2022:1514-1
- SUSE-SU-2022:1531-1
- SUSE-SU-2022:1545-1
- SUSE-SU-2022:1729-1
- SUSE-SU-2022:3836-1
- SUSE-SU-2022:3934-1
- SUSE-SU-2022:3937-1
- USN-3841-1
- USN-3841-2
- USN-4896-1
- USN-4896-2
- USN-5328-1
- USN-5328-2
- USN-5351-1
- USN-5351-2
- USN-6457-1
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |