Bug 1117951

Summary: VUL-0: The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations
Product: [Novell Products] SUSE Security Incidents Reporter: Marcus Meissner <meissner>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: pmonrealgonzalez, rfrohl, vcizek
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/219995/
Whiteboard: maint:released:sle10-sp3:64332 maint:released:sle10-sp3:64412
Found By: --- Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---
Deadline: 2020-02-19   

Description Marcus Meissner 2018-11-30 15:28:03 UTC
paper just published:

http://cat.eyalro.net/

he 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations
Nov 30, 2018

Eyal Ronen, Robert Gillham, Daniel Genkin, Adi Shamir, David Wong and Yuval Yarom
Download Full Paper
Abstract

At CRYPTO’98, Bleichenbacher published his seminal paper which described a padding oracle attack against RSA implementations that follow the PKCS #1 v1.5 standard.

Over the last twenty years researchers and implementors had spent a huge amount of effort in developing and deploying numerous mitigation techniques which were supposed to plug all the possible sources of Bleichenbacher-like leakages. However, as we show in this paper most implementations are still vulnerable to several novel types of attack based on leakage from various microarchitectural side channels: Out of nine popular implementations of TLS that we tested, we were able to break the security of seven implementations with practical proof-of-concept attacks. We demonstrate the feasibility of using those Cache-like ATacks (CATs) to perform a downgrade attack against any TLS connection to a vulnerable server, using a BEAST-like Man in the Browser attack.

The main difficulty we face is how to perform the thousands of oracle queries required before the browser’s imposed timeout (which is 30 seconds for almost all browsers, with the exception of Firefox which can be tricked into extending this period). The attack seems to be inherently sequential (due to its use of adaptive chosen ciphertext queries), but we describe a new way to parallelize Bleichenbacher-like padding attacks by exploiting any available number of TLS servers that share the same public key certificate.

With this improvement, we could demonstrate the feasibility of a downgrade attack which could recover all the 2048 bits of the RSA plaintext (including the premaster secret value, which suffices to establish a secure connection) from five available TLS servers in under 30 seconds. This sequential-to-parallel transformation of such attacks can be of independent interest, speeding up and facilitating other side channel attacks on RSA implementations.
Comment 1 Marcus Meissner 2018-11-30 15:56:46 UTC
openssl just merged a suspicious set of patches:

commit 603221407ddc6404f8c417c6beadebf84449074c (HEAD -> master, origin/master, origin/HEAD)
Author: Andy Polyakov <appro@openssl.org>
Date:   Fri Sep 14 17:24:13 2018 +0200

    rsa/rsa_ssl.c: make RSA_padding_check_SSLv23 constant-time.
    
    Copy of RSA_padding_check_PKCS1_type_2 with a twist that rejects padding
    if nul delimiter is preceded by 8 consecutive 0x03 bytes.
    
    Reviewed-by: Richard Levitte <levitte@openssl.org>
    Reviewed-by: Matt Caswell <matt@openssl.org>

commit 75f5e944be97f28867e7c489823c889d89d0bd06
Author: Andy Polyakov <appro@openssl.org>
Date:   Thu Sep 6 21:54:23 2018 +0200

    rsa/rsa_oaep.c: remove memcpy calls from RSA_padding_check_PKCS1_OAEP.
    
    And make RSAErr call unconditional.
    
    Reviewed-by: Richard Levitte <levitte@openssl.org>
    Reviewed-by: Matt Caswell <matt@openssl.org>

commit e875b0cf2f10bf2adf73e0c2ec81428290f4660c
Author: Andy Polyakov <appro@openssl.org>
Date:   Sat Sep 1 12:00:33 2018 +0200

    rsa/rsa_pk1.c: remove memcpy calls from RSA_padding_check_PKCS1_type_2.
    
    And make RSAErr call unconditional.
    
    Reviewed-by: Richard Levitte <levitte@openssl.org>
    Reviewed-by: Matt Caswell <matt@openssl.org>

commit 89072e0c2a483f2ad678e723e112712567b0ceb1
Author: Andy Polyakov <appro@openssl.org>
Date:   Fri Sep 14 12:17:43 2018 +0200

    rsa/rsa_ossl.c: make RSAerr call in rsa_ossl_private_decrypt unconditional.
    
    Reviewed-by: Richard Levitte <levitte@openssl.org>
    Reviewed-by: Matt Caswell <matt@openssl.org>

commit f658a3b64d8750642f4975090740865f770c2a1b
Author: Andy Polyakov <appro@openssl.org>
Date:   Sat Sep 1 12:19:30 2018 +0200

    err/err.c: add err_clear_last_constant_time.
    
    Expected usage pattern is to unconditionally set error and then
    wipe it if there was no actual error.
    
    Reviewed-by: Richard Levitte <levitte@openssl.org>
    Reviewed-by: Matt Caswell <matt@openssl.org>
Comment 2 Marcus Meissner 2018-11-30 15:58:49 UTC
https://github.com/openssl/openssl/pull/7735
Comment 3 Marcus Meissner 2018-12-03 07:26:40 UTC
bug 1118086 for libnettle

bug 1118087 for gnutls
Comment 4 Vítězslav Čížek 2018-12-03 10:50:38 UTC
OpenSSL upstream discussion about the issue:
https://github.com/openssl/openssl/issues/7739

The recently released openssl versions are reportedly fixed already.
I'll check how are our packages doing.
Comment 5 Vítězslav Čížek 2018-12-19 16:06:08 UTC
The OpenSSL team didn't assign any CVEs.

The paper mentions three timing attacks against openssl:

(1) Manger-type attack padding oracle in RSA_padding_check_none()
(2) Bleichenbacher-type attack timing leak in RSA_padding_check_PKCS1_type_2()
(3) Manger-type attack padding oracle in BN2binpad()

(1)
RSA_padding_check_none() isn't used by the openssl's TLS implementation any more since 1.1.0i and 1.1.1. Fixed together with (3).
The call was removed, the function remains unfixed and exported though.

(2)
Addressed by the RSA padding checks hardening, eg https://github.com/openssl/openssl/pull/7737
Currently fixed in master only.

(3)
Fixed in 1.1.1, 1.1.0j and 1.0.2q.
BN_bn2bin was replaced by BN_bn2binpad which was made constant time and CRT-RSA was rewritten to use montgomery reductions.

Basically all our openssl packages are affected by all the three issues.
Comment 7 Swamp Workflow Management 2019-01-29 17:45:50 UTC
SUSE-SU-2019:0197-1: An update that solves one vulnerability and has one errata is now available.

Category: security (moderate)
Bug References: 1117951,1118913
CVE References: CVE-2018-0737
Sources used:
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (src):    openssl-1_1-1.1.0i-4.18.1
SUSE Linux Enterprise Module for Basesystem 15 (src):    openssl-1_1-1.1.0i-4.18.1
Comment 8 Swamp Workflow Management 2019-02-08 11:11:50 UTC
openSUSE-SU-2019:0152-1: An update that solves one vulnerability and has one errata is now available.

Category: security (moderate)
Bug References: 1117951,1118913
CVE References: CVE-2018-0737
Sources used:
openSUSE Leap 15.0 (src):    openssl-1_1-1.1.0i-lp150.3.18.1
Comment 10 Swamp Workflow Management 2019-02-28 17:10:29 UTC
SUSE-SU-2019:0512-1: An update that contains security fixes can now be installed.

Category: security (moderate)
Bug References: 1117951
CVE References: 
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP4 (src):    openssl-1_1-1.1.1-2.6.1
SUSE Linux Enterprise Server 12-SP4 (src):    openssl-1_1-1.1.1-2.6.1
SUSE Linux Enterprise Desktop 12-SP4 (src):    openssl-1_1-1.1.1-2.6.1
Comment 13 Swamp Workflow Management 2019-03-08 14:10:19 UTC
SUSE-SU-2019:0572-1: An update that solves one vulnerability and has one errata is now available.

Category: security (moderate)
Bug References: 1117951,1127080
CVE References: CVE-2019-1559
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP4 (src):    openssl-1_0_0-1.0.2p-3.6.1
SUSE Linux Enterprise Server 12-SP4 (src):    openssl-1_0_0-1.0.2p-3.6.1
SUSE Linux Enterprise Desktop 12-SP4 (src):    openssl-1_0_0-1.0.2p-3.6.1
Comment 14 Swamp Workflow Management 2019-03-12 23:09:19 UTC
SUSE-SU-2019:0600-1: An update that solves one vulnerability and has one errata is now available.

Category: security (moderate)
Bug References: 1117951,1127080
CVE References: CVE-2019-1559
Sources used:
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (src):    openssl-1_0_0-1.0.2p-3.14.2
SUSE Linux Enterprise Module for Legacy Software 15 (src):    openssl-1_0_0-1.0.2p-3.14.2
Comment 17 Swamp Workflow Management 2019-03-29 17:16:27 UTC
SUSE-SU-2019:0803-1: An update that solves one vulnerability and has three fixes is now available.

Category: security (moderate)
Bug References: 1100078,1113975,1117951,1127080
CVE References: CVE-2019-1559
Sources used:
SUSE OpenStack Cloud 7 (src):    openssl-1.0.2j-60.49.1
SUSE Linux Enterprise Software Development Kit 12-SP3 (src):    openssl-1.0.2j-60.49.1
SUSE Linux Enterprise Server for SAP 12-SP2 (src):    openssl-1.0.2j-60.49.1
SUSE Linux Enterprise Server 12-SP3 (src):    openssl-1.0.2j-60.49.1
SUSE Linux Enterprise Server 12-SP2-LTSS (src):    openssl-1.0.2j-60.49.1
SUSE Linux Enterprise Server 12-SP2-BCL (src):    openssl-1.0.2j-60.49.1
SUSE Linux Enterprise Desktop 12-SP3 (src):    openssl-1.0.2j-60.49.1
SUSE Enterprise Storage 4 (src):    openssl-1.0.2j-60.49.1
SUSE CaaS Platform ALL (src):    openssl-1.0.2j-60.49.1
SUSE CaaS Platform 3.0 (src):    openssl-1.0.2j-60.49.1
OpenStack Cloud Magnum Orchestration 7 (src):    openssl-1.0.2j-60.49.1

*** NOTE: This information is not intended to be used for external
    communication, because this may only be a partial fix.
    If you have questions please reach out to maintenance coordination.
Comment 18 Swamp Workflow Management 2019-04-02 16:31:01 UTC
openSUSE-SU-2019:1105-1: An update that solves one vulnerability and has one errata is now available.

Category: security (moderate)
Bug References: 1117951,1127080
CVE References: CVE-2019-1559
Sources used:
openSUSE Leap 15.0 (src):    openssl-1_0_0-1.0.2p-lp150.2.13.1

*** NOTE: This information is not intended to be used for external
    communication, because this may only be a partial fix.
    If you have questions please reach out to maintenance coordination.
Comment 19 Swamp Workflow Management 2019-04-08 13:36:55 UTC
openSUSE-SU-2019:1175-1: An update that solves one vulnerability and has three fixes is now available.

Category: security (moderate)
Bug References: 1100078,1113975,1117951,1127080
CVE References: CVE-2019-1559
Sources used:
openSUSE Leap 42.3 (src):    openssl-1.0.2j-35.1

*** NOTE: This information is not intended to be used for external
    communication, because this may only be a partial fix.
    If you have questions please reach out to maintenance coordination.
Comment 21 Swamp Workflow Management 2019-04-30 19:15:57 UTC
SUSE-SU-2019:1124-1: An update that contains security fixes can now be installed.

Category: security (moderate)
Bug References: 1117951,1131291
CVE References: 
Sources used:
SUSE Linux Enterprise Server for SAP 12-SP1 (src):    openssl-1.0.1i-54.23.1
SUSE Linux Enterprise Server 12-SP1-LTSS (src):    openssl-1.0.1i-54.23.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 23 Swamp Workflow Management 2019-05-21 22:11:32 UTC
openSUSE-SU-2019:1432-1: An update that solves one vulnerability and has one errata is now available.

Category: security (moderate)
Bug References: 1117951,1127080
CVE References: CVE-2019-1559
Sources used:
openSUSE Leap 15.1 (src):    openssl-1_0_0-1.0.2p-lp151.5.3.1
Comment 27 Swamp Workflow Management 2019-06-18 19:56:34 UTC
SUSE-SU-2019:14092-1: An update that solves one vulnerability and has two fixes is now available.

Category: security (moderate)
Bug References: 1117951,1127080,1131291
CVE References: CVE-2019-1559
Sources used:
SUSE Linux Enterprise Server 11-SP4-LTSS (src):    openssl-0.9.8j-0.106.21.1
SUSE Linux Enterprise Point of Sale 11-SP3 (src):    openssl-0.9.8j-0.106.21.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    openssl-0.9.8j-0.106.21.1
SUSE Linux Enterprise Debuginfo 11-SP3 (src):    openssl-0.9.8j-0.106.21.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 28 Swamp Workflow Management 2019-06-18 23:12:01 UTC
SUSE-SU-2019:14091-1: An update that solves one vulnerability and has two fixes is now available.

Category: security (moderate)
Bug References: 1117951,1127080,1131291
CVE References: CVE-2019-1559
Sources used:
SUSE Linux Enterprise Server 11-SECURITY (src):    openssl1-1.0.1g-0.58.18.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 29 Swamp Workflow Management 2019-06-18 23:15:28 UTC
SUSE-SU-2019:1553-1: An update that solves 6 vulnerabilities and has 7 fixes is now available.

Category: security (moderate)
Bug References: 1089039,1097158,1097624,1098592,1101470,1104789,1106197,1110018,1113534,1113652,1117951,1127080,1131291
CVE References: CVE-2016-8610,CVE-2018-0732,CVE-2018-0734,CVE-2018-0737,CVE-2018-5407,CVE-2019-1559
Sources used:
SUSE Linux Enterprise Server 12-LTSS (src):    openssl-1.0.1i-27.34.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 30 Swamp Workflow Management 2019-06-21 13:31:46 UTC
SUSE-SU-2019:1608-1: An update that solves one vulnerability and has two fixes is now available.

Category: security (moderate)
Bug References: 1117951,1127080,1131291
CVE References: CVE-2019-1559
Sources used:
SUSE Linux Enterprise Server for SAP 12-SP4 (src):    compat-openssl098-0.9.8j-106.12.1
SUSE Linux Enterprise Server for SAP 12-SP3 (src):    compat-openssl098-0.9.8j-106.12.1
SUSE Linux Enterprise Server for SAP 12-SP2 (src):    compat-openssl098-0.9.8j-106.12.1
SUSE Linux Enterprise Server for SAP 12-SP1 (src):    compat-openssl098-0.9.8j-106.12.1
SUSE Linux Enterprise Module for Legacy Software 12 (src):    compat-openssl098-0.9.8j-106.12.1
SUSE Linux Enterprise Desktop 12-SP4 (src):    compat-openssl098-0.9.8j-106.12.1
SUSE Linux Enterprise Desktop 12-SP3 (src):    compat-openssl098-0.9.8j-106.12.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 31 Swamp Workflow Management 2019-06-27 10:30:03 UTC
openSUSE-SU-2019:1637-1: An update that solves one vulnerability and has two fixes is now available.

Category: security (moderate)
Bug References: 1117951,1127080,1131291
CVE References: CVE-2019-1559
Sources used:
openSUSE Leap 42.3 (src):    compat-openssl098-0.9.8j-30.1
Comment 33 Swamp Workflow Management 2019-07-18 13:13:02 UTC
An update workflow for this issue was started.
This issue was rated as moderate.
Please submit fixed packages until 2019-08-01.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/64331
Comment 35 Swamp Workflow Management 2020-02-05 12:36:54 UTC
An update workflow for this issue was started.
This issue was rated as moderate.
Please submit fixed packages until 2020-02-19.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/64411
Comment 36 Swamp Workflow Management 2020-02-24 23:14:18 UTC
SUSE-SU-2020:14291-1: An update that contains security fixes can now be installed.

Category: security (moderate)
Bug References: 1117951,1160163
CVE References: 
Sources used:
SUSE Linux Enterprise Server 11-SECURITY (src):    openssl1-1.0.1g-0.58.24.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 37 Swamp Workflow Management 2020-02-25 17:13:54 UTC
SUSE-SU-2020:0474-1: An update that solves one vulnerability and has two fixes is now available.

Category: security (moderate)
Bug References: 1117951,1158809,1160163
CVE References: CVE-2019-1551
Sources used:
SUSE OpenStack Cloud Crowbar 8 (src):    openssl-1.0.2j-60.60.1
SUSE OpenStack Cloud 8 (src):    openssl-1.0.2j-60.60.1
SUSE OpenStack Cloud 7 (src):    openssl-1.0.2j-60.60.1
SUSE Linux Enterprise Server for SAP 12-SP3 (src):    openssl-1.0.2j-60.60.1
SUSE Linux Enterprise Server for SAP 12-SP2 (src):    openssl-1.0.2j-60.60.1
SUSE Linux Enterprise Server 12-SP3-LTSS (src):    openssl-1.0.2j-60.60.1
SUSE Linux Enterprise Server 12-SP3-BCL (src):    openssl-1.0.2j-60.60.1
SUSE Linux Enterprise Server 12-SP2-LTSS (src):    openssl-1.0.2j-60.60.1
SUSE Linux Enterprise Server 12-SP2-BCL (src):    openssl-1.0.2j-60.60.1
SUSE Enterprise Storage 5 (src):    openssl-1.0.2j-60.60.1
SUSE CaaS Platform 3.0 (src):    openssl-1.0.2j-60.60.1
HPE Helion Openstack 8 (src):    openssl-1.0.2j-60.60.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 38 Swamp Workflow Management 2020-02-27 17:13:28 UTC
SUSE-SU-2020:14295-1: An update that contains security fixes can now be installed.

Category: security (moderate)
Bug References: 1117951,1160163
CVE References: 
Sources used:
SUSE Linux Enterprise Server 11-SP4-LTSS (src):    openssl-0.9.8j-0.106.31.1
SUSE Linux Enterprise Point of Sale 11-SP3 (src):    openssl-0.9.8j-0.106.31.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    openssl-0.9.8j-0.106.31.1
SUSE Linux Enterprise Debuginfo 11-SP3 (src):    openssl-0.9.8j-0.106.31.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 39 Swamp Workflow Management 2020-02-27 17:16:00 UTC
SUSE-SU-2020:0516-1: An update that contains security fixes can now be installed.

Category: security (moderate)
Bug References: 1117951,1160163
CVE References: 
Sources used:
SUSE Linux Enterprise Server for SAP 12-SP1 (src):    openssl-1.0.1i-54.32.1
SUSE Linux Enterprise Server 12-SP1-LTSS (src):    openssl-1.0.1i-54.32.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 40 Swamp Workflow Management 2020-03-03 17:23:23 UTC
SUSE-SU-2020:0576-1: An update that contains security fixes can now be installed.

Category: security (moderate)
Bug References: 1117951,1160163
CVE References: 
Sources used:
SUSE Linux Enterprise Server for SAP 12-SP5 (src):    compat-openssl098-0.9.8j-106.18.1
SUSE Linux Enterprise Server for SAP 12-SP4 (src):    compat-openssl098-0.9.8j-106.18.1
SUSE Linux Enterprise Server for SAP 12-SP3 (src):    compat-openssl098-0.9.8j-106.18.1
SUSE Linux Enterprise Server for SAP 12-SP2 (src):    compat-openssl098-0.9.8j-106.18.1
SUSE Linux Enterprise Server for SAP 12-SP1 (src):    compat-openssl098-0.9.8j-106.18.1
SUSE Linux Enterprise Module for Legacy Software 12 (src):    compat-openssl098-0.9.8j-106.18.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 41 Marcus Meissner 2020-09-17 16:03:40 UTC
done
Comment 46 Swamp Workflow Management 2022-02-16 20:56:15 UTC
SUSE-FU-2022:0445-1: An update that solves 183 vulnerabilities, contains 21 features and has 299 fixes is now available.

Category: feature (moderate)
Bug References: 1000080,1000117,1000194,1000677,1000742,1001148,1001912,1002585,1002895,1003091,1005246,1009528,1010874,1010966,1011936,1015549,1019637,1021641,1022085,1022086,1022271,1027079,1027610,1027688,1027705,1027908,1028281,1028723,1029523,1029902,1030038,1032118,1032119,1035604,1039469,1040164,1040256,1041090,1042392,1042670,1044095,1044107,1044175,1049186,1049304,1050653,1050665,1055478,1055542,1055825,1056058,1056951,1057496,1062237,1065363,1066242,1066873,1068790,1070737,1070738,1070853,1071905,1071906,1071941,1073310,1073845,1073879,1074247,1076519,1077096,1077230,1078329,1079761,1080301,1081005,1081750,1081751,1082155,1082163,1082318,1083826,1084117,1084157,1085276,1085529,1085661,1087102,1087104,1088573,1089039,1090427,1090765,1090953,1093518,1093917,1094788,1094814,1094883,1095267,1096738,1096937,1097158,1097531,1097624,1098535,1098592,1099308,1099569,1100078,1101246,1101470,1102868,1104789,1106197,1108508,1109882,1109998,1110435,1110869,1110871,1111493,1111622,1111657,1112209,1112357,1113534,1113652,1113742,1113975,1115769,1117951,1118611,1119376,1119416,1119792,1121717,1121852,1122191,1123064,1123185,1123186,1123558,1124885,1125815,1126283,1126318,1127080,1127173,1128146,1128323,1128355,1129071,1129566,1130840,1131291,1132174,1132323,1132455,1132663,1132900,1135009,1136444,1138666,1138715,1138746,1139915,1140255,1141168,1142899,1143033,1143454,1143893,1144506,1149686,1149792,1150003,1150190,1150250,1150895,1153830,1155815,1156677,1156694,1156908,1157104,1157354,1158809,1159235,1159538,1160163,1161557,1161770,1162224,1162367,1162743,1163978,1164310,1165439,1165578,1165730,1165823,1165960,1166139,1166758,1167008,1167501,1167732,1167746,1168480,1168973,1169489,1170175,1170863,1171368,1171561,1172226,1172908,1172928,1173226,1173356,1174009,1174091,1174514,1175729,1176116,1176129,1176134,1176232,1176256,1176257,1176258,1176259,1176262,1176389,1176785,1176977,1177120,1177127,1177559,1178168,1178341,1178670,1179491,1179562,1179630,1179805,1180125,1180781,1181126,1181324,1181944,1182066,1182211,1182244,1182264,1182331,1182333,1182379,1182963,1183059,1183374,1183858,1184505,1185588,1185706,1185748,1186738,1187045,1189521,1190781,1193357,356549,381844,394317,408865,428177,430141,431945,437293,442740,459468,489641,504687,509031,526319,590833,610223,610642,629905,637176,651003,657698,658604,670526,673071,693027,715423,720601,743787,747125,748738,749210,749213,749735,750618,751718,751946,751977,754447,754677,761500,774710,784670,784994,787526,793420,799119,802184,803004,809831,811890,822642,825221,828513,831629,832833,834601,835687,839107,84331,849377,855666,855676,856687,857203,857850,858239,867887,869945,871152,872299,873351,876282,876710,876712,876748,880891,885662,885882,889013,889363,892477,892480,895129,898917,901223,901277,901902,902364,906878,907584,908362,908372,912014,912015,912018,912292,912293,912294,912296,912460,913229,915479,917607,917759,917815,919648,920236,922448,922488,922496,922499,922500,926597,929678,929736,930189,931698,931978,933898,933911,934487,934489,934491,934493,935856,937085,937212,937492,937634,937912,939456,940608,942385,942751,943421,944204,945455,946648,947104,947357,947679,948198,952871,954256,954486,954690,957812,957813,957815,958501,961334,962291,963415,963974,964204,964472,964474,965830,967128,968046,968047,968048,968050,968265,968270,968374,968601,975875,976942,977584,977614,977615,977616,977663,978224,981848,982268,982575,983249,984323,985054,988086,990207,990392,990419,990428,991193,991877,992120,992988,992989,992992,993130,993819,993825,993968,994749,994844,994910,995075,995324,995359,995377,995959,996255,997043,997614,998190,999665,999666,999668
CVE References: CVE-2006-2937,CVE-2006-2940,CVE-2006-3738,CVE-2006-4339,CVE-2006-4343,CVE-2006-7250,CVE-2007-3108,CVE-2007-4995,CVE-2007-5135,CVE-2008-0891,CVE-2008-1672,CVE-2008-5077,CVE-2009-0590,CVE-2009-0591,CVE-2009-0789,CVE-2009-1377,CVE-2009-1378,CVE-2009-1379,CVE-2009-1386,CVE-2009-1387,CVE-2010-0740,CVE-2010-0742,CVE-2010-1633,CVE-2010-2939,CVE-2010-3864,CVE-2010-5298,CVE-2011-0014,CVE-2011-3207,CVE-2011-3210,CVE-2011-3389,CVE-2011-4108,CVE-2011-4576,CVE-2011-4577,CVE-2011-4619,CVE-2011-4944,CVE-2012-0027,CVE-2012-0050,CVE-2012-0845,CVE-2012-0884,CVE-2012-1150,CVE-2012-1165,CVE-2012-2110,CVE-2012-2686,CVE-2012-4929,CVE-2013-0166,CVE-2013-0169,CVE-2013-1752,CVE-2013-4238,CVE-2013-4314,CVE-2013-4353,CVE-2013-6449,CVE-2013-6450,CVE-2014-0012,CVE-2014-0076,CVE-2014-0160,CVE-2014-0195,CVE-2014-0198,CVE-2014-0221,CVE-2014-0224,CVE-2014-1829,CVE-2014-1830,CVE-2014-2667,CVE-2014-3470,CVE-2014-3505,CVE-2014-3506,CVE-2014-3507,CVE-2014-3508,CVE-2014-3509,CVE-2014-3510,CVE-2014-3511,CVE-2014-3512,CVE-2014-3513,CVE-2014-3566,CVE-2014-3567,CVE-2014-3568,CVE-2014-3570,CVE-2014-3571,CVE-2014-3572,CVE-2014-4650,CVE-2014-5139,CVE-2014-7202,CVE-2014-7203,CVE-2014-8275,CVE-2014-9721,CVE-2015-0204,CVE-2015-0205,CVE-2015-0206,CVE-2015-0209,CVE-2015-0286,CVE-2015-0287,CVE-2015-0288,CVE-2015-0289,CVE-2015-0293,CVE-2015-1788,CVE-2015-1789,CVE-2015-1790,CVE-2015-1791,CVE-2015-1792,CVE-2015-2296,CVE-2015-3194,CVE-2015-3195,CVE-2015-3196,CVE-2015-3197,CVE-2015-3216,CVE-2015-4000,CVE-2016-0702,CVE-2016-0705,CVE-2016-0797,CVE-2016-0798,CVE-2016-0799,CVE-2016-0800,CVE-2016-10745,CVE-2016-2105,CVE-2016-2106,CVE-2016-2107,CVE-2016-2109,CVE-2016-2176,CVE-2016-2177,CVE-2016-2178,CVE-2016-2179,CVE-2016-2180,CVE-2016-2181,CVE-2016-2182,CVE-2016-2183,CVE-2016-6302,CVE-2016-6303,CVE-2016-6304,CVE-2016-6306,CVE-2016-7052,CVE-2016-7055,CVE-2016-9015,CVE-2017-18342,CVE-2017-3731,CVE-2017-3732,CVE-2017-3735,CVE-2017-3736,CVE-2017-3737,CVE-2017-3738,CVE-2018-0732,CVE-2018-0734,CVE-2018-0737,CVE-2018-0739,CVE-2018-18074,CVE-2018-20060,CVE-2018-5407,CVE-2018-7750,CVE-2019-10906,CVE-2019-11236,CVE-2019-11324,CVE-2019-13132,CVE-2019-1547,CVE-2019-1551,CVE-2019-1559,CVE-2019-1563,CVE-2019-20907,CVE-2019-20916,CVE-2019-5010,CVE-2019-6250,CVE-2019-8341,CVE-2019-9740,CVE-2019-9947,CVE-2020-14343,CVE-2020-15166,CVE-2020-15523,CVE-2020-15801,CVE-2020-1747,CVE-2020-1971,CVE-2020-25659,CVE-2020-26137,CVE-2020-27783,CVE-2020-28493,CVE-2020-29651,CVE-2020-36242,CVE-2020-8492,CVE-2021-23336,CVE-2021-23840,CVE-2021-23841,CVE-2021-28957,CVE-2021-29921,CVE-2021-3177,CVE-2021-33503,CVE-2021-3426,CVE-2021-3712
JIRA References: ECO-3105,SLE-11435,SLE-12684,SLE-12986,SLE-13688,SLE-14253,SLE-15159,SLE-15860,SLE-15861,SLE-16754,SLE-17532,SLE-17957,SLE-18260,SLE-18354,SLE-18446,SLE-19264,SLE-3887,SLE-4480,SLE-4577,SLE-7686,SLE-9135
Sources used:
SUSE Manager Tools 12-BETA (src):    venv-salt-minion-3002.2-3.3.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.