<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for pgadmin4</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:3771-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-10-29T12:55:34Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-10-29T12:55:34Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-10-29T12:55:34Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for pgadmin4</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for pgadmin4 fixes the following issues:

- CVE-2024-38355: Fixed socket.io: unhandled 'error' event (bsc#1226967)
- CVE-2024-38998: Fixed requirejs: prototype pollution via function config (bsc#1227248)
- CVE-2024-38999: Fixed requirejs: prototype pollution via function s.contexts._.configure (bsc#1227252)
- CVE-2024-39338: Fixed axios: server-side request forgery due to requests for path relative URLs being processed as protocol relative URLs in axios (bsc#1229423)
- CVE-2024-4067: Fixed micromatch: vulnerable to Regular Expression Denial of Service (ReDoS) (bsc#1224366)
- CVE-2024-4068: Fixed braces: fails to limit the number of characters it can handle, which could lead to Memory Exhaustion (bsc#1224295)
- CVE-2024-43788: Fixed webpack: DOM clobbering gadget in AutoPublicPathRuntimeModule could lead to XSS (bsc#1229861)
- CVE-2024-48948: Fixed elliptic: ECDSA signature verification error due to leading zero may reject legitimate transactions in elliptic (bsc#1231684)
- CVE-2024-48949: Fixed elliptic: Missing Validation in Elliptic's EDDSA Signature Verification (bsc#1231564)
- CVE-2024-9014: Fixed OAuth2 issue that could lead to information leak (bsc#1230928)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2024-3771,SUSE-SLE-Module-Python3-15-SP6-2024-3771,openSUSE-SLE-15.6-2024-3771</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243771-1/</URL>
      <Description>Link for SUSE-SU-2024:3771-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2024-October/019689.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:3771-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224295</URL>
      <Description>SUSE Bug 1224295</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224366</URL>
      <Description>SUSE Bug 1224366</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226967</URL>
      <Description>SUSE Bug 1226967</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227248</URL>
      <Description>SUSE Bug 1227248</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227252</URL>
      <Description>SUSE Bug 1227252</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229423</URL>
      <Description>SUSE Bug 1229423</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229861</URL>
      <Description>SUSE Bug 1229861</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230928</URL>
      <Description>SUSE Bug 1230928</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231564</URL>
      <Description>SUSE Bug 1231564</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231684</URL>
      <Description>SUSE Bug 1231684</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38355/</URL>
      <Description>SUSE CVE CVE-2024-38355 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38998/</URL>
      <Description>SUSE CVE CVE-2024-38998 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38999/</URL>
      <Description>SUSE CVE CVE-2024-38999 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-39338/</URL>
      <Description>SUSE CVE CVE-2024-39338 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-4067/</URL>
      <Description>SUSE CVE CVE-2024-4067 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-4068/</URL>
      <Description>SUSE CVE CVE-2024-4068 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-43788/</URL>
      <Description>SUSE CVE CVE-2024-43788 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-48948/</URL>
      <Description>SUSE CVE CVE-2024-48948 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-48949/</URL>
      <Description>SUSE CVE CVE-2024-48949 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-9014/</URL>
      <Description>SUSE CVE CVE-2024-9014 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Python 3 15 SP6">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Python 3 15 SP6">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Python 3 15 SP6" CPE="cpe:/o:suse:sle-module-python3:15:sp6">SUSE Linux Enterprise Module for Python 3 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="pgadmin4-8.5-150600.3.6.1">
      <FullProductName ProductID="pgadmin4-8.5-150600.3.6.1">pgadmin4-8.5-150600.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="pgadmin4-cloud-8.5-150600.3.6.1">
      <FullProductName ProductID="pgadmin4-cloud-8.5-150600.3.6.1">pgadmin4-cloud-8.5-150600.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="pgadmin4-desktop-8.5-150600.3.6.1">
      <FullProductName ProductID="pgadmin4-desktop-8.5-150600.3.6.1">pgadmin4-desktop-8.5-150600.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="pgadmin4-doc-8.5-150600.3.6.1">
      <FullProductName ProductID="pgadmin4-doc-8.5-150600.3.6.1">pgadmin4-doc-8.5-150600.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="pgadmin4-web-uwsgi-8.5-150600.3.6.1">
      <FullProductName ProductID="pgadmin4-web-uwsgi-8.5-150600.3.6.1">pgadmin4-web-uwsgi-8.5-150600.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="system-user-pgadmin-8.5-150600.3.6.1">
      <FullProductName ProductID="system-user-pgadmin-8.5-150600.3.6.1">system-user-pgadmin-8.5-150600.3.6.1</FullProductName>
    </Branch>
    <Relationship ProductReference="pgadmin4-8.5-150600.3.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Python 3 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1">pgadmin4-8.5-150600.3.6.1 as a component of SUSE Linux Enterprise Module for Python 3 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="pgadmin4-doc-8.5-150600.3.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Python 3 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1">pgadmin4-doc-8.5-150600.3.6.1 as a component of SUSE Linux Enterprise Module for Python 3 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="system-user-pgadmin-8.5-150600.3.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Python 3 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1">system-user-pgadmin-8.5-150600.3.6.1 as a component of SUSE Linux Enterprise Module for Python 3 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="pgadmin4-8.5-150600.3.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1">pgadmin4-8.5-150600.3.6.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="pgadmin4-cloud-8.5-150600.3.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1">pgadmin4-cloud-8.5-150600.3.6.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="pgadmin4-desktop-8.5-150600.3.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1">pgadmin4-desktop-8.5-150600.3.6.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="pgadmin4-doc-8.5-150600.3.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1">pgadmin4-doc-8.5-150600.3.6.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="pgadmin4-web-uwsgi-8.5-150600.3.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1">pgadmin4-web-uwsgi-8.5-150600.3.6.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="system-user-pgadmin-8.5-150600.3.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1">system-user-pgadmin-8.5-150600.3.6.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Socket.IO is an open source, real-time, bidirectional, event-based, communication framework. A specially crafted Socket.IO packet can trigger an uncaught exception on the Socket.IO server, thus killing the Node.js process. This issue is fixed by commit `15af22fc22` which has been included in `socket.io@4.6.2` (released in May 2023). The fix was backported in the 2.x branch as well with commit `d30630ba10`. Users are advised to upgrade. Users unable to upgrade may attach a listener for the "error" event to catch these errors.
</Note>
    </Notes>
    <CVE>CVE-2024-38355</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243771-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38355.html</URL>
        <Description>CVE-2024-38355</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226965</URL>
        <Description>SUSE Bug 1226965</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.</Note>
    </Notes>
    <CVE>CVE-2024-38998</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243771-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38998.html</URL>
        <Description>CVE-2024-38998</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227247</URL>
        <Description>SUSE Bug 1227247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">jrburke requirejs v2.3.6 was discovered to contain a prototype pollution via the function s.contexts._.configure. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties.</Note>
    </Notes>
    <CVE>CVE-2024-38999</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243771-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38999.html</URL>
        <Description>CVE-2024-38999</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227251</URL>
        <Description>SUSE Bug 1227251</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">axios 1.7.2 allows SSRF via unexpected behavior where requests for path relative URLs get processed as protocol relative URLs.</Note>
    </Notes>
    <CVE>CVE-2024-39338</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243771-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-39338.html</URL>
        <Description>CVE-2024-39338</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1229421</URL>
        <Description>SUSE Bug 1229421</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The NPM package `micromatch` prior to 4.0.8 is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs in `micromatch.braces()` in `index.js` because the pattern `.*` will greedily match anything. By passing a malicious payload, the pattern matching will keep backtracking to the input while it doesn't find the closing bracket. As the input size increases, the consumption time will also increase until it causes the application to hang or slow down. There was a merged fix but further testing shows the issue persists. This issue should be mitigated by using a safe pattern that won't start backtracking the regular expression due to greedy matching. This issue was fixed in version 4.0.8.</Note>
    </Notes>
    <CVE>CVE-2024-4067</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243771-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-4067.html</URL>
        <Description>CVE-2024-4067</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224255</URL>
        <Description>SUSE Bug 1224255</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The NPM package `braces`, versions prior to 3.0.3, fails to limit the number of characters it can handle, which could lead to Memory Exhaustion. In `lib/parse.js,` if a malicious user sends "imbalanced braces" as input, the parsing will enter a loop, which will cause the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash.</Note>
    </Notes>
    <CVE>CVE-2024-4068</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243771-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-4068.html</URL>
        <Description>CVE-2024-4068</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224256</URL>
        <Description>SUSE Bug 1224256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Webpack is a module bundler. Its main purpose is to bundle JavaScript files for usage in a browser, yet it is also capable of transforming, bundling, or packaging just about any resource or asset. The webpack developers have discovered a DOM Clobbering vulnerability in Webpack's `AutoPublicPathRuntimeModule`. The DOM Clobbering gadget in the module can lead to cross-site scripting (XSS) in web pages where scriptless attacker-controlled HTML elements (e.g., an `img` tag with an unsanitized `name` attribute) are present. Real-world exploitation of this gadget has been observed in the Canvas LMS which allows a XSS attack to happen through a javascript code compiled by Webpack (the vulnerable part is from Webpack). DOM Clobbering is a type of code-reuse attack where the attacker first embeds a piece of non-script, seemingly benign HTML markups in the webpage (e.g. through a post or comment) and leverages the gadgets (pieces of js code) living in the existing javascript code to transform it into executable code. This vulnerability can lead to cross-site scripting (XSS) on websites that include Webpack-generated files and allow users to inject certain scriptless HTML tags with improperly sanitized name or id attributes. This issue has been addressed in release version 5.94.0. All users are advised to upgrade. There are no known workarounds for this issue.</Note>
    </Notes>
    <CVE>CVE-2024-43788</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243771-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-43788.html</URL>
        <Description>CVE-2024-43788</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1229860</URL>
        <Description>SUSE Bug 1229860</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve's base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.</Note>
    </Notes>
    <CVE>CVE-2024-48948</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243771-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-48948.html</URL>
        <Description>CVE-2024-48948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231681</URL>
        <Description>SUSE Bug 1231681</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The verify function in lib/elliptic/eddsa/index.js in the Elliptic package before 6.5.6 for Node.js omits "sig.S().gte(sig.eddsa.curve.n) || sig.S().isNeg()" validation.</Note>
    </Notes>
    <CVE>CVE-2024-48949</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243771-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-48949.html</URL>
        <Description>CVE-2024-48949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231557</URL>
        <Description>SUSE Bug 1231557</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">pgAdmin versions 8.11 and earlier are vulnerable to a security flaw in OAuth2 authentication. This vulnerability allows an attacker to potentially obtain the client ID and secret, leading to unauthorized access to user data.</Note>
    </Notes>
    <CVE>CVE-2024-9014</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243771-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-9014.html</URL>
        <Description>CVE-2024-9014</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230928</URL>
        <Description>SUSE Bug 1230928</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
