<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for SUSE Manager Server 4.3</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:4007-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-11-18T13:20:15Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-11-18T13:20:15Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-11-18T13:20:15Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for SUSE Manager Server 4.3</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update fixes the following issues:

release-notes-susemanager:

- Update to SUSE Manager 4.3.14
  * Ubuntu 24.04 support as client
  * Product migration from RHEL and Clones to SUSE Liberty Linux
  * POS image templates now produce compressed images
  * Date format for API endpoints has been changed to ISO-8601 format
  * Security issues fixed:
    CVE-2024-47533, CVE-2024-49502, CVE-2024-49503
  * Bugs mentioned:
    bsc#1146701, bsc#1211899, bsc#1212985, bsc#1217003, bsc#1217338
    bsc#1217978, bsc#1218090, bsc#1219450, bsc#1219645, bsc#1219887
    bsc#1221435, bsc#1221505, bsc#1223312, bsc#1223988, bsc#1224108
    bsc#1224209, bsc#1225603, bsc#1225619, bsc#1225960, bsc#1226090
    bsc#1226439, bsc#1226461, bsc#1226478, bsc#1226687, bsc#1226917
    bsc#1227133, bsc#1227334, bsc#1227406, bsc#1227526, bsc#1227543
    bsc#1227599, bsc#1227606, bsc#1227746, bsc#1228036, bsc#1228101
    bsc#1228130, bsc#1228147, bsc#1228286, bsc#1228326, bsc#1228345
    bsc#1228412, bsc#1228545, bsc#1228638, bsc#1228851, bsc#1228945
    bsc#1229079, bsc#1229178, bsc#1229260, bsc#1229339, bsc#1231332
    bsc#1231852, bsc#1231922, bsc#1231900

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Container suse/manager/4.3/proxy-httpd:latest-2024-4007,Image SLES15-SP4-Manager-Proxy-4-3-BYOS-2024-4007,Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure-2024-4007,Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2-2024-4007,Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE-2024-4007,Image SLES15-SP4-Manager-Server-4-3-2024-4007,Image SLES15-SP4-Manager-Server-4-3-Azure-llc-2024-4007,Image SLES15-SP4-Manager-Server-4-3-Azure-ltd-2024-4007,Image SLES15-SP4-Manager-Server-4-3-BYOS-2024-4007,Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure-2024-4007,Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2-2024-4007,Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE-2024-4007,SUSE-2024-4007,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4007,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4007</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244007-1/</URL>
      <Description>Link for SUSE-SU-2024:4007-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2024-November/019836.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:4007-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1146701</URL>
      <Description>SUSE Bug 1146701</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1211899</URL>
      <Description>SUSE Bug 1211899</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1212985</URL>
      <Description>SUSE Bug 1212985</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1217003</URL>
      <Description>SUSE Bug 1217003</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1217338</URL>
      <Description>SUSE Bug 1217338</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1217978</URL>
      <Description>SUSE Bug 1217978</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218090</URL>
      <Description>SUSE Bug 1218090</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1219450</URL>
      <Description>SUSE Bug 1219450</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1219645</URL>
      <Description>SUSE Bug 1219645</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1219887</URL>
      <Description>SUSE Bug 1219887</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221435</URL>
      <Description>SUSE Bug 1221435</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221505</URL>
      <Description>SUSE Bug 1221505</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223312</URL>
      <Description>SUSE Bug 1223312</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223988</URL>
      <Description>SUSE Bug 1223988</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224108</URL>
      <Description>SUSE Bug 1224108</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224209</URL>
      <Description>SUSE Bug 1224209</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225603</URL>
      <Description>SUSE Bug 1225603</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225619</URL>
      <Description>SUSE Bug 1225619</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225960</URL>
      <Description>SUSE Bug 1225960</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226090</URL>
      <Description>SUSE Bug 1226090</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226439</URL>
      <Description>SUSE Bug 1226439</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226461</URL>
      <Description>SUSE Bug 1226461</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226478</URL>
      <Description>SUSE Bug 1226478</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226687</URL>
      <Description>SUSE Bug 1226687</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226917</URL>
      <Description>SUSE Bug 1226917</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227133</URL>
      <Description>SUSE Bug 1227133</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227334</URL>
      <Description>SUSE Bug 1227334</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227406</URL>
      <Description>SUSE Bug 1227406</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227526</URL>
      <Description>SUSE Bug 1227526</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227543</URL>
      <Description>SUSE Bug 1227543</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227599</URL>
      <Description>SUSE Bug 1227599</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227606</URL>
      <Description>SUSE Bug 1227606</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227746</URL>
      <Description>SUSE Bug 1227746</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228036</URL>
      <Description>SUSE Bug 1228036</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228101</URL>
      <Description>SUSE Bug 1228101</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228130</URL>
      <Description>SUSE Bug 1228130</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228147</URL>
      <Description>SUSE Bug 1228147</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228286</URL>
      <Description>SUSE Bug 1228286</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228326</URL>
      <Description>SUSE Bug 1228326</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228345</URL>
      <Description>SUSE Bug 1228345</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228412</URL>
      <Description>SUSE Bug 1228412</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228545</URL>
      <Description>SUSE Bug 1228545</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228638</URL>
      <Description>SUSE Bug 1228638</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228851</URL>
      <Description>SUSE Bug 1228851</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228945</URL>
      <Description>SUSE Bug 1228945</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229079</URL>
      <Description>SUSE Bug 1229079</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229178</URL>
      <Description>SUSE Bug 1229178</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229260</URL>
      <Description>SUSE Bug 1229260</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229339</URL>
      <Description>SUSE Bug 1229339</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231332</URL>
      <Description>SUSE Bug 1231332</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231852</URL>
      <Description>SUSE Bug 1231852</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231900</URL>
      <Description>SUSE Bug 1231900</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231922</URL>
      <Description>SUSE Bug 1231922</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47533/</URL>
      <Description>SUSE CVE CVE-2024-47533 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49502/</URL>
      <Description>SUSE CVE CVE-2024-49502 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49503/</URL>
      <Description>SUSE CVE CVE-2024-49503 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Container suse/manager/4.3/proxy-httpd:latest">
      <Branch Type="Product Name" Name="Container suse/manager/4.3/proxy-httpd:latest">
        <FullProductName ProductID="Container suse/manager/4.3/proxy-httpd:latest">Container suse/manager/4.3/proxy-httpd:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Proxy-4-3-BYOS">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Proxy-4-3-BYOS">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Proxy-4-3-BYOS">Image SLES15-SP4-Manager-Proxy-4-3-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure">Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2">Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE">Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Server-4-3">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Server-4-3">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3">Image SLES15-SP4-Manager-Server-4-3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Server-4-3-Azure-llc">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Server-4-3-Azure-llc">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-Azure-llc">Image SLES15-SP4-Manager-Server-4-3-Azure-llc</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Server-4-3-Azure-ltd">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Server-4-3-Azure-ltd">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-Azure-ltd">Image SLES15-SP4-Manager-Server-4-3-Azure-ltd</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Server-4-3-BYOS">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Server-4-3-BYOS">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-BYOS">Image SLES15-SP4-Manager-Server-4-3-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure">Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2">Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE">Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Proxy 4.3">
      <Branch Type="Product Name" Name="SUSE Manager Proxy 4.3">
        <FullProductName ProductID="SUSE Manager Proxy 4.3" CPE="cpe:/o:suse:suse-manager-proxy:4.3">SUSE Manager Proxy 4.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Server 4.3">
      <Branch Type="Product Name" Name="SUSE Manager Server 4.3">
        <FullProductName ProductID="SUSE Manager Server 4.3" CPE="cpe:/o:suse:suse-manager-server:4.3">SUSE Manager Server 4.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="release-notes-susemanager-proxy-4.3.14-150400.3.90.1">
      <FullProductName ProductID="release-notes-susemanager-proxy-4.3.14-150400.3.90.1">release-notes-susemanager-proxy-4.3.14-150400.3.90.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="release-notes-susemanager-4.3.14-150400.3.122.1">
      <FullProductName ProductID="release-notes-susemanager-4.3.14-150400.3.122.1">release-notes-susemanager-4.3.14-150400.3.122.1</FullProductName>
    </Branch>
    <Relationship ProductReference="release-notes-susemanager-proxy-4.3.14-150400.3.90.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/manager/4.3/proxy-httpd:latest">
      <FullProductName ProductID="Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.14-150400.3.90.1">release-notes-susemanager-proxy-4.3.14-150400.3.90.1 as a component of Container suse/manager/4.3/proxy-httpd:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-proxy-4.3.14-150400.3.90.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Proxy-4-3-BYOS">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Proxy-4-3-BYOS:release-notes-susemanager-proxy-4.3.14-150400.3.90.1">release-notes-susemanager-proxy-4.3.14-150400.3.90.1 as a component of Image SLES15-SP4-Manager-Proxy-4-3-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-proxy-4.3.14-150400.3.90.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure:release-notes-susemanager-proxy-4.3.14-150400.3.90.1">release-notes-susemanager-proxy-4.3.14-150400.3.90.1 as a component of Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-proxy-4.3.14-150400.3.90.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2:release-notes-susemanager-proxy-4.3.14-150400.3.90.1">release-notes-susemanager-proxy-4.3.14-150400.3.90.1 as a component of Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-proxy-4.3.14-150400.3.90.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE:release-notes-susemanager-proxy-4.3.14-150400.3.90.1">release-notes-susemanager-proxy-4.3.14-150400.3.90.1 as a component of Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-4.3.14-150400.3.122.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Server-4-3">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3:release-notes-susemanager-4.3.14-150400.3.122.1">release-notes-susemanager-4.3.14-150400.3.122.1 as a component of Image SLES15-SP4-Manager-Server-4-3</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-4.3.14-150400.3.122.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Server-4-3-Azure-llc">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-Azure-llc:release-notes-susemanager-4.3.14-150400.3.122.1">release-notes-susemanager-4.3.14-150400.3.122.1 as a component of Image SLES15-SP4-Manager-Server-4-3-Azure-llc</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-4.3.14-150400.3.122.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Server-4-3-Azure-ltd">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-Azure-ltd:release-notes-susemanager-4.3.14-150400.3.122.1">release-notes-susemanager-4.3.14-150400.3.122.1 as a component of Image SLES15-SP4-Manager-Server-4-3-Azure-ltd</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-4.3.14-150400.3.122.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Server-4-3-BYOS">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-BYOS:release-notes-susemanager-4.3.14-150400.3.122.1">release-notes-susemanager-4.3.14-150400.3.122.1 as a component of Image SLES15-SP4-Manager-Server-4-3-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-4.3.14-150400.3.122.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure:release-notes-susemanager-4.3.14-150400.3.122.1">release-notes-susemanager-4.3.14-150400.3.122.1 as a component of Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-4.3.14-150400.3.122.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2:release-notes-susemanager-4.3.14-150400.3.122.1">release-notes-susemanager-4.3.14-150400.3.122.1 as a component of Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-4.3.14-150400.3.122.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE:release-notes-susemanager-4.3.14-150400.3.122.1">release-notes-susemanager-4.3.14-150400.3.122.1 as a component of Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-proxy-4.3.14-150400.3.90.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Proxy 4.3">
      <FullProductName ProductID="SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.14-150400.3.90.1">release-notes-susemanager-proxy-4.3.14-150400.3.90.1 as a component of SUSE Manager Proxy 4.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-4.3.14-150400.3.122.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Server 4.3">
      <FullProductName ProductID="SUSE Manager Server 4.3:release-notes-susemanager-4.3.14-150400.3.122.1">release-notes-susemanager-4.3.14-150400.3.122.1 as a component of SUSE Manager Server 4.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Cobbler, a Linux installation server that allows for rapid setup of network installation environments, has an improper authentication vulnerability starting in version 3.0.0 and prior to versions 3.2.3 and 3.3.7. `utils.get_shared_secret()` always returns `-1`, which allows anyone to connect to cobbler XML-RPC as user `''` password `-1` and make any changes. This gives anyone with network access to a cobbler server full control of the server. Versions 3.2.3 and 3.3.7 fix the issue.</Note>
    </Notes>
    <CVE>CVE-2024-47533</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.14-150400.3.90.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure:release-notes-susemanager-proxy-4.3.14-150400.3.90.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2:release-notes-susemanager-proxy-4.3.14-150400.3.90.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE:release-notes-susemanager-proxy-4.3.14-150400.3.90.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS:release-notes-susemanager-proxy-4.3.14-150400.3.90.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-llc:release-notes-susemanager-4.3.14-150400.3.122.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-ltd:release-notes-susemanager-4.3.14-150400.3.122.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure:release-notes-susemanager-4.3.14-150400.3.122.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2:release-notes-susemanager-4.3.14-150400.3.122.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE:release-notes-susemanager-4.3.14-150400.3.122.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS:release-notes-susemanager-4.3.14-150400.3.122.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3:release-notes-susemanager-4.3.14-150400.3.122.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.14-150400.3.90.1</ProductID>
        <ProductID>SUSE Manager Server 4.3:release-notes-susemanager-4.3.14-150400.3.122.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244007-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47533.html</URL>
        <Description>CVE-2024-47533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231332</URL>
        <Description>SUSE Bug 1231332</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in the Setup Wizard, HTTP Proxy credentials pane in spacewalk-web allows attackers to attack users by providing specially crafted URLs to click.
This issue affects Container suse/manager/5.0/x86_64/server:5.0.2.7.8.1: before 5.0.15-150600.3.10.2; SUSE Manager Server Module 4.3: before 4.3.42-150400.3.52.1.</Note>
    </Notes>
    <CVE>CVE-2024-49502</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.14-150400.3.90.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure:release-notes-susemanager-proxy-4.3.14-150400.3.90.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2:release-notes-susemanager-proxy-4.3.14-150400.3.90.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE:release-notes-susemanager-proxy-4.3.14-150400.3.90.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS:release-notes-susemanager-proxy-4.3.14-150400.3.90.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-llc:release-notes-susemanager-4.3.14-150400.3.122.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-ltd:release-notes-susemanager-4.3.14-150400.3.122.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure:release-notes-susemanager-4.3.14-150400.3.122.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2:release-notes-susemanager-4.3.14-150400.3.122.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE:release-notes-susemanager-4.3.14-150400.3.122.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS:release-notes-susemanager-4.3.14-150400.3.122.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3:release-notes-susemanager-4.3.14-150400.3.122.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.14-150400.3.90.1</ProductID>
        <ProductID>SUSE Manager Server 4.3:release-notes-susemanager-4.3.14-150400.3.122.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244007-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49502.html</URL>
        <Description>CVE-2024-49502</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231852</URL>
        <Description>SUSE Bug 1231852</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in SUSE manager allows attackers to execute Javascript code in the organization credentials sub page.
This issue affects Container suse/manager/5.0/x86_64/server:5.0.2.7.8.1: before 5.0.15-150600.3.10.2; SUSE Manager Server Module 4.3: before 4.3.42-150400.3.52.1.</Note>
    </Notes>
    <CVE>CVE-2024-49503</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.14-150400.3.90.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure:release-notes-susemanager-proxy-4.3.14-150400.3.90.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2:release-notes-susemanager-proxy-4.3.14-150400.3.90.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE:release-notes-susemanager-proxy-4.3.14-150400.3.90.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS:release-notes-susemanager-proxy-4.3.14-150400.3.90.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-llc:release-notes-susemanager-4.3.14-150400.3.122.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-ltd:release-notes-susemanager-4.3.14-150400.3.122.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure:release-notes-susemanager-4.3.14-150400.3.122.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2:release-notes-susemanager-4.3.14-150400.3.122.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE:release-notes-susemanager-4.3.14-150400.3.122.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS:release-notes-susemanager-4.3.14-150400.3.122.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3:release-notes-susemanager-4.3.14-150400.3.122.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.14-150400.3.90.1</ProductID>
        <ProductID>SUSE Manager Server 4.3:release-notes-susemanager-4.3.14-150400.3.122.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244007-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49503.html</URL>
        <Description>CVE-2024-49503</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231922</URL>
        <Description>SUSE Bug 1231922</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
