openSUSE: 2022:1059-1 important: salt
Description
This update for salt fixes the following issues: - CVE-2022-22935: Sign authentication replies to prevent MiTM (bsc#1197417) - CVE-2022-22934: Sign pillar data to prevent MiTM attacks. (bsc#1197417) - CVE-2022-22936: Prevent job and fileserver replays (bsc#1197417) - CVE-2022-22941: Fixed targeting bug, especially visible when using syndic and user auth. (bsc#1197417)
Patch
Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.3: zypper in -t patch openSUSE-SLE-15.3-2022-1059=1
Package List
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64): python3-salt-3002.2-150300.53.10.1 salt-3002.2-150300.53.10.1 salt-api-3002.2-150300.53.10.1 salt-cloud-3002.2-150300.53.10.1 salt-doc-3002.2-150300.53.10.1 salt-master-3002.2-150300.53.10.1 salt-minion-3002.2-150300.53.10.1 salt-proxy-3002.2-150300.53.10.1 salt-ssh-3002.2-150300.53.10.1 salt-standalone-formulas-configuration-3002.2-150300.53.10.1 salt-syndic-3002.2-150300.53.10.1 salt-transactional-update-3002.2-150300.53.10.1 - openSUSE Leap 15.3 (noarch): salt-bash-completion-3002.2-150300.53.10.1 salt-fish-completion-3002.2-150300.53.10.1 salt-zsh-completion-3002.2-150300.53.10.1
References
https://www.suse.com/security/cve/CVE-2022-22934.html https://www.suse.com/security/cve/CVE-2022-22935.html https://www.suse.com/security/cve/CVE-2022-22936.html https://www.suse.com/security/cve/CVE-2022-22941.html https://bugzilla.suse.com/1197417