SUSE-SU-2025:21216-1
Vulnerability from csaf_suse - Published: 2025-12-16 07:20 - Updated: 2025-12-16 07:20Summary
Security update 5.0.6 for Multi-Linux Manager Client Tools, Salt and Salt Bundle
Notes
Title of the patch
Security update 5.0.6 for Multi-Linux Manager Client Tools, Salt and Salt Bundle
Description of the patch
This update fixes the following issues:
salt:
- Security issues fixed:
- CVE-2025-62349: Added minimum_auth_version to enforce security (bsc#1254257)
- CVE-2025-62348: Fixed Junos module yaml loader (bsc#1254256)
- Backport security fixes for vendored tornado
* BDSA-2024-3438
* BDSA-2024-3439
* BDSA-2024-9026
- Other changes and bugs fixed:
- Fixed TLS and x509 modules for OSes with older cryptography module
- Fixed Salt for Python > 3.11 (bsc#1252285) (bsc#1252244)
* Use external tornado on Python > 3.11
* Make tls and x509 to use python-cryptography
* Remove usage of spwd
- Fixed payload signature verification on Tumbleweed (bsc#1251776)
- Fixed broken symlink on migration to Leap 16.0 (bsc#1250755)
- Fixed known_hosts error on gitfs (bsc#1250520) (bsc#1227207)
- Fixed functional.states.test_user for SLES 16 and Micro systems
- Fixed the tests failing on AlmaLinux 10 and other clones
- Improved SL Micro 6.2 detection with grains
- Require Python dependencies only for used Python version
- Reverted requirement of M2Crypto >= 0.44.0 for SUSE Family distros
- Set python-CherryPy as required for python-salt-testsuite
uyuni-tools:
- Version 0.1.37-0
* Added --registry-host, --registry-user and --registry-password to pull images from an authenticate registry
* Added a lowercase version of --logLevel (bsc#1243611)
* Added migration for server monitoring configuration (bsc#1247688)
* Added SLE15SP7 to buildin productmap
* Adjusted traefik exposed configuration for chart v27+ (bsc#1247721)
* Automatically get up-to-date systemid file on salt based proxy hosts (bsc#1246789)
* Check for restorecon presence before calling (bsc#1246925)
* Convert the traefik install time to local time (bsc#1251138)
* Deprecated --registry
* Do not require backups to be at the same location for restoring (bsc#1246906)
* Do not use sudo when running as a root user (bsc#1246882)
* Fixed channel override for distro copy
* Fixed loading product map from mgradm configuration file (bsc#1246068)
* Fixed recomputing proxy images when installing a ptf or test (bsc#1246553)
* Handle CA files with symlinks during migration (bsc#1251044)
* Migrate custom auto installation snippets (bsc#1246320)
* Run smdba and reindex only during migration (bsc#1244534)
* Stop executing scripts in temporary folder (bsc#1243704)
* Support config: collect podman inspect for hub container(bsc#1245099)
* Use new dedicated path for Cobbler settings (bsc#1244027)
- Version 0.1.36-0
* Bump the default image tag to 5.0.5.1
- Version 0.1.35-0
* Restore SELinux contexts for restored backup volumes (bsc#1244127)
- Version 0.1.34-0
* Fixed mgradm backup create handling of images and systemd files (bsc#1246738)
- Version 0.1.33-0
* Restore volumes using tar instead of podman import (bsc#1244127)
- Version 0.1.32-0
* Fixed version compare by backport from main (bsc#1246662)
venv-salt-minion:
- Security issues fixed:
- CVE-2025-62349: Added minimum_auth_version to enforce security (bsc#1254257)
- CVE-2025-62348: Fixed Junos module yaml loader (bsc#1254256)
- Backport security fixes for vendored tornado
* BDSA-2024-3438
* BDSA-2024-3439
* BDSA-2024-9026
- Other changes and bugs fixed:
- Added `minion_legacy_req_warnings` option to avoid noisy warnings
- Fixed TLS and x509 modules for OSes with older cryptography module
- Fixed Salt for Python > 3.11 (bsc#1252285) (bsc#1252244)
* Use external tornado on Python > 3.11
* Make tls and x509 to use python-cryptography
* Remove usage of spwd
- Filter out zero-length check as the empty files are expected there
- Filter out env-script-interpreter for ssh-id-wrapper as not used
with the Salt Bundle, but present inside the salt module
- Fixed functional.states.test_user for SLES 16 and Micro systems
- Fixed known_hosts error on gitfs (bsc#1250520) (bsc#1227207)
- Fixed payload signature verification on Tumbleweed (bsc#1251776)
- Fixed the tests failing on AlmaLinux 10 and other clones
- Improve SL Micro 6.2 detection with grains
- Removed unused activate script (bsc#1245740)
- Use more strict way to Fixed shebang in the bundle scripts
- Use versioned python interpreter for salt-ssh
Patchnames
SUSE-SLE-Micro-6.0-535
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update 5.0.6 for Multi-Linux Manager Client Tools, Salt and Salt Bundle",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update fixes the following issues:\n\nsalt:\n\n- Security issues fixed:\n\n - CVE-2025-62349: Added minimum_auth_version to enforce security (bsc#1254257)\n - CVE-2025-62348: Fixed Junos module yaml loader (bsc#1254256)\n - Backport security fixes for vendored tornado\n * BDSA-2024-3438\n * BDSA-2024-3439\n * BDSA-2024-9026\n\n- Other changes and bugs fixed:\n\n - Fixed TLS and x509 modules for OSes with older cryptography module\n - Fixed Salt for Python \u003e 3.11 (bsc#1252285) (bsc#1252244)\n * Use external tornado on Python \u003e 3.11\n * Make tls and x509 to use python-cryptography\n * Remove usage of spwd\n - Fixed payload signature verification on Tumbleweed (bsc#1251776)\n - Fixed broken symlink on migration to Leap 16.0 (bsc#1250755)\n - Fixed known_hosts error on gitfs (bsc#1250520) (bsc#1227207)\n - Fixed functional.states.test_user for SLES 16 and Micro systems\n - Fixed the tests failing on AlmaLinux 10 and other clones\n - Improved SL Micro 6.2 detection with grains\n - Require Python dependencies only for used Python version\n - Reverted requirement of M2Crypto \u003e= 0.44.0 for SUSE Family distros\n - Set python-CherryPy as required for python-salt-testsuite\n\nuyuni-tools:\n\n- Version 0.1.37-0\n\n * Added --registry-host, --registry-user and --registry-password to pull images from an authenticate registry\n * Added a lowercase version of --logLevel (bsc#1243611)\n * Added migration for server monitoring configuration (bsc#1247688)\n * Added SLE15SP7 to buildin productmap\n * Adjusted traefik exposed configuration for chart v27+ (bsc#1247721)\n * Automatically get up-to-date systemid file on salt based proxy hosts (bsc#1246789)\n * Check for restorecon presence before calling (bsc#1246925)\n * Convert the traefik install time to local time (bsc#1251138)\n * Deprecated --registry\n * Do not require backups to be at the same location for restoring (bsc#1246906)\n * Do not use sudo when running as a root user (bsc#1246882)\n * Fixed channel override for distro copy\n * Fixed loading product map from mgradm configuration file (bsc#1246068)\n * Fixed recomputing proxy images when installing a ptf or test (bsc#1246553)\n * Handle CA files with symlinks during migration (bsc#1251044)\n * Migrate custom auto installation snippets (bsc#1246320)\n * Run smdba and reindex only during migration (bsc#1244534)\n * Stop executing scripts in temporary folder (bsc#1243704)\n * Support config: collect podman inspect for hub container(bsc#1245099)\n * Use new dedicated path for Cobbler settings (bsc#1244027)\n\n- Version 0.1.36-0\n\n * Bump the default image tag to 5.0.5.1\n\n- Version 0.1.35-0\n\n * Restore SELinux contexts for restored backup volumes (bsc#1244127)\n\n- Version 0.1.34-0\n\n * Fixed mgradm backup create handling of images and systemd files (bsc#1246738)\n\n- Version 0.1.33-0\n\n * Restore volumes using tar instead of podman import (bsc#1244127)\n\n- Version 0.1.32-0\n\n * Fixed version compare by backport from main (bsc#1246662)\n\nvenv-salt-minion:\n\n- Security issues fixed:\n\n - CVE-2025-62349: Added minimum_auth_version to enforce security (bsc#1254257)\n - CVE-2025-62348: Fixed Junos module yaml loader (bsc#1254256)\n - Backport security fixes for vendored tornado\n * BDSA-2024-3438\n * BDSA-2024-3439\n * BDSA-2024-9026\n\n- Other changes and bugs fixed:\n\n - Added `minion_legacy_req_warnings` option to avoid noisy warnings\n - Fixed TLS and x509 modules for OSes with older cryptography module\n - Fixed Salt for Python \u003e 3.11 (bsc#1252285) (bsc#1252244)\n\n * Use external tornado on Python \u003e 3.11\n * Make tls and x509 to use python-cryptography\n * Remove usage of spwd\n\n - Filter out zero-length check as the empty files are expected there\n - Filter out env-script-interpreter for ssh-id-wrapper as not used\n with the Salt Bundle, but present inside the salt module\n - Fixed functional.states.test_user for SLES 16 and Micro systems\n - Fixed known_hosts error on gitfs (bsc#1250520) (bsc#1227207)\n - Fixed payload signature verification on Tumbleweed (bsc#1251776)\n - Fixed the tests failing on AlmaLinux 10 and other clones\n - Improve SL Micro 6.2 detection with grains\n - Removed unused activate script (bsc#1245740)\n - Use more strict way to Fixed shebang in the bundle scripts\n - Use versioned python interpreter for salt-ssh\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-535",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_21216-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:21216-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202521216-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:21216-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023594.html"
},
{
"category": "self",
"summary": "SUSE Bug 1227207",
"url": "https://bugzilla.suse.com/1227207"
},
{
"category": "self",
"summary": "SUSE Bug 1243611",
"url": "https://bugzilla.suse.com/1243611"
},
{
"category": "self",
"summary": "SUSE Bug 1243704",
"url": "https://bugzilla.suse.com/1243704"
},
{
"category": "self",
"summary": "SUSE Bug 1244027",
"url": "https://bugzilla.suse.com/1244027"
},
{
"category": "self",
"summary": "SUSE Bug 1244127",
"url": "https://bugzilla.suse.com/1244127"
},
{
"category": "self",
"summary": "SUSE Bug 1244534",
"url": "https://bugzilla.suse.com/1244534"
},
{
"category": "self",
"summary": "SUSE Bug 1245099",
"url": "https://bugzilla.suse.com/1245099"
},
{
"category": "self",
"summary": "SUSE Bug 1245740",
"url": "https://bugzilla.suse.com/1245740"
},
{
"category": "self",
"summary": "SUSE Bug 1246068",
"url": "https://bugzilla.suse.com/1246068"
},
{
"category": "self",
"summary": "SUSE Bug 1246320",
"url": "https://bugzilla.suse.com/1246320"
},
{
"category": "self",
"summary": "SUSE Bug 1246553",
"url": "https://bugzilla.suse.com/1246553"
},
{
"category": "self",
"summary": "SUSE Bug 1246662",
"url": "https://bugzilla.suse.com/1246662"
},
{
"category": "self",
"summary": "SUSE Bug 1246738",
"url": "https://bugzilla.suse.com/1246738"
},
{
"category": "self",
"summary": "SUSE Bug 1246789",
"url": "https://bugzilla.suse.com/1246789"
},
{
"category": "self",
"summary": "SUSE Bug 1246882",
"url": "https://bugzilla.suse.com/1246882"
},
{
"category": "self",
"summary": "SUSE Bug 1246906",
"url": "https://bugzilla.suse.com/1246906"
},
{
"category": "self",
"summary": "SUSE Bug 1246925",
"url": "https://bugzilla.suse.com/1246925"
},
{
"category": "self",
"summary": "SUSE Bug 1247688",
"url": "https://bugzilla.suse.com/1247688"
},
{
"category": "self",
"summary": "SUSE Bug 1247721",
"url": "https://bugzilla.suse.com/1247721"
},
{
"category": "self",
"summary": "SUSE Bug 1250520",
"url": "https://bugzilla.suse.com/1250520"
},
{
"category": "self",
"summary": "SUSE Bug 1250755",
"url": "https://bugzilla.suse.com/1250755"
},
{
"category": "self",
"summary": "SUSE Bug 1251044",
"url": "https://bugzilla.suse.com/1251044"
},
{
"category": "self",
"summary": "SUSE Bug 1251138",
"url": "https://bugzilla.suse.com/1251138"
},
{
"category": "self",
"summary": "SUSE Bug 1251776",
"url": "https://bugzilla.suse.com/1251776"
},
{
"category": "self",
"summary": "SUSE Bug 1252244",
"url": "https://bugzilla.suse.com/1252244"
},
{
"category": "self",
"summary": "SUSE Bug 1252285",
"url": "https://bugzilla.suse.com/1252285"
},
{
"category": "self",
"summary": "SUSE Bug 1254256",
"url": "https://bugzilla.suse.com/1254256"
},
{
"category": "self",
"summary": "SUSE Bug 1254257",
"url": "https://bugzilla.suse.com/1254257"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62348 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62349 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62349/"
}
],
"title": "Security update 5.0.6 for Multi-Linux Manager Client Tools, Salt and Salt Bundle",
"tracking": {
"current_release_date": "2025-12-16T07:20:56Z",
"generator": {
"date": "2025-12-16T07:20:56Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:21216-1",
"initial_release_date": "2025-12-16T07:20:56Z",
"revision_history": [
{
"date": "2025-12-16T07:20:56Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python311-salt-3006.0-14.1.aarch64",
"product": {
"name": "python311-salt-3006.0-14.1.aarch64",
"product_id": "python311-salt-3006.0-14.1.aarch64"
}
},
{
"category": "product_version",
"name": "salt-3006.0-14.1.aarch64",
"product": {
"name": "salt-3006.0-14.1.aarch64",
"product_id": "salt-3006.0-14.1.aarch64"
}
},
{
"category": "product_version",
"name": "salt-master-3006.0-14.1.aarch64",
"product": {
"name": "salt-master-3006.0-14.1.aarch64",
"product_id": "salt-master-3006.0-14.1.aarch64"
}
},
{
"category": "product_version",
"name": "salt-minion-3006.0-14.1.aarch64",
"product": {
"name": "salt-minion-3006.0-14.1.aarch64",
"product_id": "salt-minion-3006.0-14.1.aarch64"
}
},
{
"category": "product_version",
"name": "salt-transactional-update-3006.0-14.1.aarch64",
"product": {
"name": "salt-transactional-update-3006.0-14.1.aarch64",
"product_id": "salt-transactional-update-3006.0-14.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python311-salt-3006.0-14.1.s390x",
"product": {
"name": "python311-salt-3006.0-14.1.s390x",
"product_id": "python311-salt-3006.0-14.1.s390x"
}
},
{
"category": "product_version",
"name": "salt-3006.0-14.1.s390x",
"product": {
"name": "salt-3006.0-14.1.s390x",
"product_id": "salt-3006.0-14.1.s390x"
}
},
{
"category": "product_version",
"name": "salt-master-3006.0-14.1.s390x",
"product": {
"name": "salt-master-3006.0-14.1.s390x",
"product_id": "salt-master-3006.0-14.1.s390x"
}
},
{
"category": "product_version",
"name": "salt-minion-3006.0-14.1.s390x",
"product": {
"name": "salt-minion-3006.0-14.1.s390x",
"product_id": "salt-minion-3006.0-14.1.s390x"
}
},
{
"category": "product_version",
"name": "salt-transactional-update-3006.0-14.1.s390x",
"product": {
"name": "salt-transactional-update-3006.0-14.1.s390x",
"product_id": "salt-transactional-update-3006.0-14.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python311-salt-3006.0-14.1.x86_64",
"product": {
"name": "python311-salt-3006.0-14.1.x86_64",
"product_id": "python311-salt-3006.0-14.1.x86_64"
}
},
{
"category": "product_version",
"name": "salt-3006.0-14.1.x86_64",
"product": {
"name": "salt-3006.0-14.1.x86_64",
"product_id": "salt-3006.0-14.1.x86_64"
}
},
{
"category": "product_version",
"name": "salt-master-3006.0-14.1.x86_64",
"product": {
"name": "salt-master-3006.0-14.1.x86_64",
"product_id": "salt-master-3006.0-14.1.x86_64"
}
},
{
"category": "product_version",
"name": "salt-minion-3006.0-14.1.x86_64",
"product": {
"name": "salt-minion-3006.0-14.1.x86_64",
"product_id": "salt-minion-3006.0-14.1.x86_64"
}
},
{
"category": "product_version",
"name": "salt-transactional-update-3006.0-14.1.x86_64",
"product": {
"name": "salt-transactional-update-3006.0-14.1.x86_64",
"product_id": "salt-transactional-update-3006.0-14.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-salt-3006.0-14.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:python311-salt-3006.0-14.1.aarch64"
},
"product_reference": "python311-salt-3006.0-14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-salt-3006.0-14.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:python311-salt-3006.0-14.1.s390x"
},
"product_reference": "python311-salt-3006.0-14.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-salt-3006.0-14.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:python311-salt-3006.0-14.1.x86_64"
},
"product_reference": "python311-salt-3006.0-14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "salt-3006.0-14.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:salt-3006.0-14.1.aarch64"
},
"product_reference": "salt-3006.0-14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "salt-3006.0-14.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:salt-3006.0-14.1.s390x"
},
"product_reference": "salt-3006.0-14.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "salt-3006.0-14.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:salt-3006.0-14.1.x86_64"
},
"product_reference": "salt-3006.0-14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "salt-master-3006.0-14.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:salt-master-3006.0-14.1.aarch64"
},
"product_reference": "salt-master-3006.0-14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "salt-master-3006.0-14.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:salt-master-3006.0-14.1.s390x"
},
"product_reference": "salt-master-3006.0-14.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "salt-master-3006.0-14.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:salt-master-3006.0-14.1.x86_64"
},
"product_reference": "salt-master-3006.0-14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "salt-minion-3006.0-14.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:salt-minion-3006.0-14.1.aarch64"
},
"product_reference": "salt-minion-3006.0-14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "salt-minion-3006.0-14.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:salt-minion-3006.0-14.1.s390x"
},
"product_reference": "salt-minion-3006.0-14.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "salt-minion-3006.0-14.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:salt-minion-3006.0-14.1.x86_64"
},
"product_reference": "salt-minion-3006.0-14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "salt-transactional-update-3006.0-14.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:salt-transactional-update-3006.0-14.1.aarch64"
},
"product_reference": "salt-transactional-update-3006.0-14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "salt-transactional-update-3006.0-14.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:salt-transactional-update-3006.0-14.1.s390x"
},
"product_reference": "salt-transactional-update-3006.0-14.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "salt-transactional-update-3006.0-14.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:salt-transactional-update-3006.0-14.1.x86_64"
},
"product_reference": "salt-transactional-update-3006.0-14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-62348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62348"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:python311-salt-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:python311-salt-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:python311-salt-3006.0-14.1.x86_64",
"SUSE Linux Micro 6.0:salt-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:salt-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:salt-3006.0-14.1.x86_64",
"SUSE Linux Micro 6.0:salt-master-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:salt-master-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:salt-master-3006.0-14.1.x86_64",
"SUSE Linux Micro 6.0:salt-minion-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:salt-minion-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:salt-minion-3006.0-14.1.x86_64",
"SUSE Linux Micro 6.0:salt-transactional-update-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:salt-transactional-update-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:salt-transactional-update-3006.0-14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62348",
"url": "https://www.suse.com/security/cve/CVE-2025-62348"
},
{
"category": "external",
"summary": "SUSE Bug 1254256 for CVE-2025-62348",
"url": "https://bugzilla.suse.com/1254256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:python311-salt-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:python311-salt-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:python311-salt-3006.0-14.1.x86_64",
"SUSE Linux Micro 6.0:salt-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:salt-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:salt-3006.0-14.1.x86_64",
"SUSE Linux Micro 6.0:salt-master-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:salt-master-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:salt-master-3006.0-14.1.x86_64",
"SUSE Linux Micro 6.0:salt-minion-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:salt-minion-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:salt-minion-3006.0-14.1.x86_64",
"SUSE Linux Micro 6.0:salt-transactional-update-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:salt-transactional-update-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:salt-transactional-update-3006.0-14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:python311-salt-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:python311-salt-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:python311-salt-3006.0-14.1.x86_64",
"SUSE Linux Micro 6.0:salt-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:salt-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:salt-3006.0-14.1.x86_64",
"SUSE Linux Micro 6.0:salt-master-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:salt-master-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:salt-master-3006.0-14.1.x86_64",
"SUSE Linux Micro 6.0:salt-minion-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:salt-minion-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:salt-minion-3006.0-14.1.x86_64",
"SUSE Linux Micro 6.0:salt-transactional-update-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:salt-transactional-update-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:salt-transactional-update-3006.0-14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-16T07:20:56Z",
"details": "important"
}
],
"title": "CVE-2025-62348"
},
{
"cve": "CVE-2025-62349",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62349"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:python311-salt-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:python311-salt-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:python311-salt-3006.0-14.1.x86_64",
"SUSE Linux Micro 6.0:salt-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:salt-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:salt-3006.0-14.1.x86_64",
"SUSE Linux Micro 6.0:salt-master-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:salt-master-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:salt-master-3006.0-14.1.x86_64",
"SUSE Linux Micro 6.0:salt-minion-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:salt-minion-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:salt-minion-3006.0-14.1.x86_64",
"SUSE Linux Micro 6.0:salt-transactional-update-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:salt-transactional-update-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:salt-transactional-update-3006.0-14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62349",
"url": "https://www.suse.com/security/cve/CVE-2025-62349"
},
{
"category": "external",
"summary": "SUSE Bug 1254257 for CVE-2025-62349",
"url": "https://bugzilla.suse.com/1254257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:python311-salt-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:python311-salt-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:python311-salt-3006.0-14.1.x86_64",
"SUSE Linux Micro 6.0:salt-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:salt-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:salt-3006.0-14.1.x86_64",
"SUSE Linux Micro 6.0:salt-master-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:salt-master-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:salt-master-3006.0-14.1.x86_64",
"SUSE Linux Micro 6.0:salt-minion-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:salt-minion-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:salt-minion-3006.0-14.1.x86_64",
"SUSE Linux Micro 6.0:salt-transactional-update-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:salt-transactional-update-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:salt-transactional-update-3006.0-14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:python311-salt-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:python311-salt-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:python311-salt-3006.0-14.1.x86_64",
"SUSE Linux Micro 6.0:salt-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:salt-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:salt-3006.0-14.1.x86_64",
"SUSE Linux Micro 6.0:salt-master-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:salt-master-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:salt-master-3006.0-14.1.x86_64",
"SUSE Linux Micro 6.0:salt-minion-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:salt-minion-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:salt-minion-3006.0-14.1.x86_64",
"SUSE Linux Micro 6.0:salt-transactional-update-3006.0-14.1.aarch64",
"SUSE Linux Micro 6.0:salt-transactional-update-3006.0-14.1.s390x",
"SUSE Linux Micro 6.0:salt-transactional-update-3006.0-14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-16T07:20:56Z",
"details": "moderate"
}
],
"title": "CVE-2025-62349"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…