<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update 5.0.6 for Multi-Linux Manager Client Tools, Salt and Salt Bundle</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:21216-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-12-16T07:20:56Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-12-16T07:20:56Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-12-16T07:20:56Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update 5.0.6 for Multi-Linux Manager Client Tools, Salt and Salt Bundle</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update fixes the following issues:

salt:

- Security issues fixed:

  - CVE-2025-62349: Added minimum_auth_version to enforce security (bsc#1254257)
  - CVE-2025-62348: Fixed Junos module yaml loader (bsc#1254256)
  - Backport security fixes for vendored tornado
    * BDSA-2024-3438
    * BDSA-2024-3439
    * BDSA-2024-9026

- Other changes and bugs fixed:

  - Fixed TLS and x509 modules for OSes with older cryptography module
  - Fixed Salt for Python &gt; 3.11 (bsc#1252285) (bsc#1252244)
    * Use external tornado on Python &gt; 3.11
    * Make tls and x509 to use python-cryptography
    * Remove usage of spwd
  - Fixed payload signature verification on Tumbleweed (bsc#1251776)
  - Fixed broken symlink on migration to Leap 16.0 (bsc#1250755)
  - Fixed known_hosts error on gitfs (bsc#1250520) (bsc#1227207)
  - Fixed functional.states.test_user for SLES 16 and Micro systems
  - Fixed the tests failing on AlmaLinux 10 and other clones
  - Improved SL Micro 6.2 detection with grains
  - Require Python dependencies only for used Python version
  - Reverted requirement of M2Crypto &gt;= 0.44.0 for SUSE Family distros
  - Set python-CherryPy as required for python-salt-testsuite

uyuni-tools:

- Version 0.1.37-0

  * Added --registry-host, --registry-user and --registry-password to pull images from an authenticate registry
  * Added a lowercase version of --logLevel (bsc#1243611)
  * Added migration for server monitoring configuration (bsc#1247688)
  * Added SLE15SP7 to buildin productmap
  * Adjusted traefik exposed configuration for chart v27+ (bsc#1247721)
  * Automatically get up-to-date systemid file on salt based proxy hosts (bsc#1246789)
  * Check for restorecon presence before calling (bsc#1246925)
  * Convert the traefik install time to local time (bsc#1251138)
  * Deprecated --registry
  * Do not require backups to be at the same location for restoring (bsc#1246906)
  * Do not use sudo when running as a root user (bsc#1246882)
  * Fixed channel override for distro copy
  * Fixed loading product map from mgradm configuration file (bsc#1246068)
  * Fixed recomputing proxy images when installing a ptf or test (bsc#1246553)
  * Handle CA files with symlinks during migration (bsc#1251044)
  * Migrate custom auto installation snippets (bsc#1246320)
  * Run smdba and reindex only during migration (bsc#1244534)
  * Stop executing scripts in temporary folder (bsc#1243704)
  * Support config: collect podman inspect for hub container(bsc#1245099)
  * Use new dedicated path for Cobbler settings (bsc#1244027)

- Version 0.1.36-0

  * Bump the default image tag to 5.0.5.1

- Version 0.1.35-0

  * Restore SELinux contexts for restored backup volumes (bsc#1244127)

- Version 0.1.34-0

  * Fixed mgradm backup create handling of images and systemd files (bsc#1246738)

- Version 0.1.33-0

  * Restore volumes using tar instead of podman import (bsc#1244127)

- Version 0.1.32-0

  * Fixed version compare by backport from main (bsc#1246662)

venv-salt-minion:

- Security issues fixed:

  - CVE-2025-62349: Added minimum_auth_version to enforce security (bsc#1254257)
  - CVE-2025-62348: Fixed Junos module yaml loader (bsc#1254256)
  - Backport security fixes for vendored tornado
    * BDSA-2024-3438
    * BDSA-2024-3439
    * BDSA-2024-9026

- Other changes and bugs fixed:

  - Added `minion_legacy_req_warnings` option to avoid noisy warnings
  - Fixed TLS and x509 modules for OSes with older cryptography module
  - Fixed Salt for Python &gt; 3.11 (bsc#1252285) (bsc#1252244)

    * Use external tornado on Python &gt; 3.11
    * Make tls and x509 to use python-cryptography
    * Remove usage of spwd

  - Filter out zero-length check as the empty files are expected there
  - Filter out env-script-interpreter for ssh-id-wrapper as not used
    with the Salt Bundle, but present inside the salt module
  - Fixed functional.states.test_user for SLES 16 and Micro systems
  - Fixed known_hosts error on gitfs (bsc#1250520) (bsc#1227207)
  - Fixed payload signature verification on Tumbleweed (bsc#1251776)
  - Fixed the tests failing on AlmaLinux 10 and other clones
  - Improve SL Micro 6.2 detection with grains
  - Removed unused activate script (bsc#1245740)
  - Use more strict way to Fixed shebang in the bundle scripts
  - Use versioned python interpreter for salt-ssh

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-Micro-6.0-535</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521216-1/</URL>
      <Description>Link for SUSE-SU-2025:21216-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-December/023594.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:21216-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227207</URL>
      <Description>SUSE Bug 1227207</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1243611</URL>
      <Description>SUSE Bug 1243611</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1243704</URL>
      <Description>SUSE Bug 1243704</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244027</URL>
      <Description>SUSE Bug 1244027</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244127</URL>
      <Description>SUSE Bug 1244127</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244534</URL>
      <Description>SUSE Bug 1244534</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245099</URL>
      <Description>SUSE Bug 1245099</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245740</URL>
      <Description>SUSE Bug 1245740</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246068</URL>
      <Description>SUSE Bug 1246068</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246320</URL>
      <Description>SUSE Bug 1246320</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246553</URL>
      <Description>SUSE Bug 1246553</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246662</URL>
      <Description>SUSE Bug 1246662</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246738</URL>
      <Description>SUSE Bug 1246738</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246789</URL>
      <Description>SUSE Bug 1246789</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246882</URL>
      <Description>SUSE Bug 1246882</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246906</URL>
      <Description>SUSE Bug 1246906</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246925</URL>
      <Description>SUSE Bug 1246925</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247688</URL>
      <Description>SUSE Bug 1247688</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247721</URL>
      <Description>SUSE Bug 1247721</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1250520</URL>
      <Description>SUSE Bug 1250520</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1250755</URL>
      <Description>SUSE Bug 1250755</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251044</URL>
      <Description>SUSE Bug 1251044</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251138</URL>
      <Description>SUSE Bug 1251138</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251776</URL>
      <Description>SUSE Bug 1251776</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1252244</URL>
      <Description>SUSE Bug 1252244</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1252285</URL>
      <Description>SUSE Bug 1252285</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1254256</URL>
      <Description>SUSE Bug 1254256</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1254257</URL>
      <Description>SUSE Bug 1254257</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-62348/</URL>
      <Description>SUSE CVE CVE-2025-62348 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-62349/</URL>
      <Description>SUSE CVE CVE-2025-62349 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Micro 6.0">
      <Branch Type="Product Name" Name="SUSE Linux Micro 6.0">
        <FullProductName ProductID="SUSE Linux Micro 6.0" CPE="cpe:/o:suse:sl-micro:6.0">SUSE Linux Micro 6.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="python311-salt-3006.0-14.1">
      <FullProductName ProductID="python311-salt-3006.0-14.1">python311-salt-3006.0-14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="salt-3006.0-14.1">
      <FullProductName ProductID="salt-3006.0-14.1">salt-3006.0-14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="salt-master-3006.0-14.1">
      <FullProductName ProductID="salt-master-3006.0-14.1">salt-master-3006.0-14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="salt-minion-3006.0-14.1">
      <FullProductName ProductID="salt-minion-3006.0-14.1">salt-minion-3006.0-14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="salt-transactional-update-3006.0-14.1">
      <FullProductName ProductID="salt-transactional-update-3006.0-14.1">salt-transactional-update-3006.0-14.1</FullProductName>
    </Branch>
    <Relationship ProductReference="python311-salt-3006.0-14.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:python311-salt-3006.0-14.1">python311-salt-3006.0-14.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="salt-3006.0-14.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:salt-3006.0-14.1">salt-3006.0-14.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="salt-master-3006.0-14.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:salt-master-3006.0-14.1">salt-master-3006.0-14.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="salt-minion-3006.0-14.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:salt-minion-3006.0-14.1">salt-minion-3006.0-14.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="salt-transactional-update-3006.0-14.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:salt-transactional-update-3006.0-14.1">salt-transactional-update-3006.0-14.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">unknown</Note>
    </Notes>
    <CVE>CVE-2025-62348</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:python311-salt-3006.0-14.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:salt-3006.0-14.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:salt-master-3006.0-14.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:salt-minion-3006.0-14.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:salt-transactional-update-3006.0-14.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521216-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-62348.html</URL>
        <Description>CVE-2025-62348</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1254256</URL>
        <Description>SUSE Bug 1254256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">unknown</Note>
    </Notes>
    <CVE>CVE-2025-62349</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:python311-salt-3006.0-14.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:salt-3006.0-14.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:salt-master-3006.0-14.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:salt-minion-3006.0-14.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:salt-transactional-update-3006.0-14.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521216-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-62349.html</URL>
        <Description>CVE-2025-62349</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1254257</URL>
        <Description>SUSE Bug 1254257</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
