{"affected":[{"ecosystem_specific":{"binaries":[{"python3-salt":"3006.0-150300.53.101.1","salt":"3006.0-150300.53.101.1","salt-api":"3006.0-150300.53.101.1","salt-bash-completion":"3006.0-150300.53.101.1","salt-cloud":"3006.0-150300.53.101.1","salt-doc":"3006.0-150300.53.101.1","salt-fish-completion":"3006.0-150300.53.101.1","salt-master":"3006.0-150300.53.101.1","salt-minion":"3006.0-150300.53.101.1","salt-proxy":"3006.0-150300.53.101.1","salt-ssh":"3006.0-150300.53.101.1","salt-standalone-formulas-configuration":"3006.0-150300.53.101.1","salt-syndic":"3006.0-150300.53.101.1","salt-zsh-completion":"3006.0-150300.53.101.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP3-LTSS","name":"salt","purl":"pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3006.0-150300.53.101.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"python3-salt":"3006.0-150300.53.101.1","salt":"3006.0-150300.53.101.1","salt-api":"3006.0-150300.53.101.1","salt-bash-completion":"3006.0-150300.53.101.1","salt-cloud":"3006.0-150300.53.101.1","salt-doc":"3006.0-150300.53.101.1","salt-fish-completion":"3006.0-150300.53.101.1","salt-master":"3006.0-150300.53.101.1","salt-minion":"3006.0-150300.53.101.1","salt-proxy":"3006.0-150300.53.101.1","salt-ssh":"3006.0-150300.53.101.1","salt-standalone-formulas-configuration":"3006.0-150300.53.101.1","salt-syndic":"3006.0-150300.53.101.1","salt-transactional-update":"3006.0-150300.53.101.1","salt-zsh-completion":"3006.0-150300.53.101.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP3-LTSS","name":"salt","purl":"pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3006.0-150300.53.101.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"python3-salt":"3006.0-150300.53.101.1","salt":"3006.0-150300.53.101.1","salt-api":"3006.0-150300.53.101.1","salt-bash-completion":"3006.0-150300.53.101.1","salt-cloud":"3006.0-150300.53.101.1","salt-doc":"3006.0-150300.53.101.1","salt-fish-completion":"3006.0-150300.53.101.1","salt-master":"3006.0-150300.53.101.1","salt-minion":"3006.0-150300.53.101.1","salt-proxy":"3006.0-150300.53.101.1","salt-ssh":"3006.0-150300.53.101.1","salt-standalone-formulas-configuration":"3006.0-150300.53.101.1","salt-syndic":"3006.0-150300.53.101.1","salt-zsh-completion":"3006.0-150300.53.101.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP3","name":"salt","purl":"pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3006.0-150300.53.101.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"python3-salt":"3006.0-150300.53.101.1","salt":"3006.0-150300.53.101.1","salt-minion":"3006.0-150300.53.101.1","salt-transactional-update":"3006.0-150300.53.101.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.2","name":"salt","purl":"pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3006.0-150300.53.101.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"python3-salt":"3006.0-150300.53.101.1","salt":"3006.0-150300.53.101.1","salt-api":"3006.0-150300.53.101.1","salt-bash-completion":"3006.0-150300.53.101.1","salt-cloud":"3006.0-150300.53.101.1","salt-doc":"3006.0-150300.53.101.1","salt-fish-completion":"3006.0-150300.53.101.1","salt-master":"3006.0-150300.53.101.1","salt-minion":"3006.0-150300.53.101.1","salt-proxy":"3006.0-150300.53.101.1","salt-ssh":"3006.0-150300.53.101.1","salt-standalone-formulas-configuration":"3006.0-150300.53.101.1","salt-syndic":"3006.0-150300.53.101.1","salt-transactional-update":"3006.0-150300.53.101.1","salt-zsh-completion":"3006.0-150300.53.101.1"}]},"package":{"ecosystem":"SUSE:Enterprise Storage 7.1","name":"salt","purl":"pkg:rpm/suse/salt&distro=SUSE%20Enterprise%20Storage%207.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3006.0-150300.53.101.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for salt fixes the following issues:\n\n- Security issues fixed:\n\n  - CVE-2025-62349: Added minimum_auth_version to enforce security (bsc#1254257)\n  - CVE-2025-62348: Fixed Junos module yaml loader (bsc#1254256)\n  - Backport security fixes for vendored tornado\n    * BDSA-2024-3438\n    * BDSA-2024-3439\n    * BDSA-2024-9026\n\n- Other changes and bugs fixed:\n\n  - Fixed TLS and x509 modules for OSes with older cryptography module\n  - Fixed Salt for Python > 3.11 (bsc#1252285) (bsc#1252244)\n    * Use external tornado on Python > 3.11\n    * Make tls and x509 to use python-cryptography\n    * Remove usage of spwd\n  - Fixed payload signature verification on Tumbleweed (bsc#1251776)\n  - Fixed broken symlink on migration to Leap 16.0 (bsc#1250755)\n  - Fixed known_hosts error on gitfs (bsc#1250520) (bsc#1227207)\n  - Improved SL Micro 6.2 detection with grains\n  - Reverted requirement of M2Crypto >= 0.44.0 for SUSE Family distros\n  - Set python-CherryPy as required for python-salt-testsuite\n\n","id":"SUSE-SU-2025:4475-1","modified":"2025-12-18T12:08:19Z","published":"2025-12-18T12:08:19Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-20254475-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227207"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250520"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250755"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251776"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252244"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252285"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254256"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254257"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-62348"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-62349"}],"related":["CVE-2025-62348","CVE-2025-62349"],"summary":"Security update for salt","upstream":["CVE-2025-62348","CVE-2025-62349"]}