Security update 5.0.7 for Multi-Linux Manager Salt Bundle
| Announcement ID: | SUSE-SU-2026:1014-1 |
|---|---|
| Release Date: | 2026-03-25T10:12:36Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves six vulnerabilities, contains one feature and has three security fixes can now be installed.
Description:
This update fixes the following issues:
venv-salt-minion:
- Security issues fixed:
- CVE-2025-67724: Fixed missing validation of supplied reason phrase (bsc#1254903)
- CVE-2025-67725: Fixed DoS via malicious HTTP request (bsc#1254905)
- CVE-2025-67726: Fixed HTTP header parameter parsing algorithm (bsc#1254904)
- CVE-2025-62349: Added minimum_auth_version to enforce security (bsc#1254257)
- CVE-2025-62348: Fixed Junos module yaml loader (bsc#1254256)
-
CVE-2025-13836: Set a safe limit to http.client response read (bsc#1254400)
-
Fixed KeyError in postgres module with PostgreSQL 17 (bsc#1254325)
- Use internal deb classes instead of external aptsource lib
- Improved performance of wheel key.finger call (bsc#1240532)
- Improved performance of utils.find_json function (bsc#1246130)
- Extended warn_until period to 2027
Special Instructions and Notes:
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Manager Client Tools for SLE 15
zypper in -t patch SUSE-SLE-Manager-Tools-15-2026-1014=1 -
SUSE Manager Client Tools for SLE Micro 5
zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2026-1014=1
Package List:
-
SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64)
- venv-salt-minion-3006.0-150000.3.86.1
-
SUSE Manager Client Tools for SLE Micro 5 (aarch64 s390x x86_64)
- venv-salt-minion-3006.0-150000.3.86.1
References:
- https://www.suse.com/security/cve/CVE-2025-13836.html
- https://www.suse.com/security/cve/CVE-2025-62348.html
- https://www.suse.com/security/cve/CVE-2025-62349.html
- https://www.suse.com/security/cve/CVE-2025-67724.html
- https://www.suse.com/security/cve/CVE-2025-67725.html
- https://www.suse.com/security/cve/CVE-2025-67726.html
- https://bugzilla.suse.com/show_bug.cgi?id=1240532
- https://bugzilla.suse.com/show_bug.cgi?id=1246130
- https://bugzilla.suse.com/show_bug.cgi?id=1254256
- https://bugzilla.suse.com/show_bug.cgi?id=1254257
- https://bugzilla.suse.com/show_bug.cgi?id=1254325
- https://bugzilla.suse.com/show_bug.cgi?id=1254400
- https://bugzilla.suse.com/show_bug.cgi?id=1254903
- https://bugzilla.suse.com/show_bug.cgi?id=1254904
- https://bugzilla.suse.com/show_bug.cgi?id=1254905
- https://jira.suse.com/browse/MSQA-1045