<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for govulncheck-vulndb</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:4042-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-11-22T10:44:11Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-11-22T10:44:11Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-11-22T10:44:11Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for govulncheck-vulndb</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for govulncheck-vulndb fixes the following issues:

- Update to version 0.0.20241112T145010 2024-11-12T14:50:10Z.
  Refs jsc#PED-11136
  Go CVE Numbering Authority IDs added or updated with aliases:
  * GO-2024-3250 CVE-2024-51744 GHSA-29wx-vh33-7x7r

- Update to version 0.0.20241108T172500 2024-11-08T17:25:00Z.
  Refs jsc#PED-11136
  Go CVE Numbering Authority IDs added or updated with aliases:
  * GO-2024-3260 CVE-2024-45794 GHSA-q78v-cv36-8fxj
  * GO-2024-3262 CVE-2024-10975 GHSA-2w5v-x29g-jw7j

- Update to version 0.0.20241106T172143 2024-11-06T17:21:43Z.
  Refs jsc#PED-11136
  Go CVE Numbering Authority IDs added or updated with aliases:
  * GO-2024-3251 CVE-2024-10389 GHSA-q3rp-vvm7-j8jg
  * GO-2024-3252 CVE-2024-51746 GHSA-8pmp-678w-c8xx
  * GO-2024-3253 CVE-2024-48057 GHSA-ghx4-cgxw-7h9p
  * GO-2024-3254 CVE-2024-51735 GHSA-wvv7-wm5v-w2gv
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2024-4042,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-4042,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4042,openSUSE-SLE-15.5-2024-4042,openSUSE-SLE-15.6-2024-4042</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244042-1/</URL>
      <Description>Link for SUSE-SU-2024:4042-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2024-November/019840.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:4042-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-10389/</URL>
      <Description>SUSE CVE CVE-2024-10389 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-10975/</URL>
      <Description>SUSE CVE CVE-2024-10975 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-45794/</URL>
      <Description>SUSE CVE CVE-2024-45794 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-48057/</URL>
      <Description>SUSE CVE CVE-2024-48057 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-51735/</URL>
      <Description>SUSE CVE CVE-2024-51735 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-51744/</URL>
      <Description>SUSE CVE CVE-2024-51744 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-51746/</URL>
      <Description>SUSE CVE CVE-2024-51746 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Package Hub 15 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Package Hub 15 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP5" CPE="cpe:/o:suse:packagehub:15:sp5">SUSE Linux Enterprise Module for Package Hub 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Package Hub 15 SP6">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Package Hub 15 SP6">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP6" CPE="cpe:/o:suse:packagehub:15:sp6">SUSE Linux Enterprise Module for Package Hub 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.5">
      <Branch Type="Product Name" Name="openSUSE Leap 15.5">
        <FullProductName ProductID="openSUSE Leap 15.5" CPE="cpe:/o:opensuse:leap:15.5">openSUSE Leap 15.5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1">
      <FullProductName ProductID="govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1">govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</FullProductName>
    </Branch>
    <Relationship ProductReference="govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Package Hub 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1">govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Package Hub 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1">govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1">govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1">govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There exists a Path Traversal vulnerability in Safearchive on Platforms with Case-Insensitive Filesystems (e.g., NTFS). This allows Attackers to Write Arbitrary Files via Archive Extraction containing symbolic links. We recommend upgrading past commit  f7ce9d7b6f9c6ecd72d0b0f16216b046e55e44dc</Note>
    </Notes>
    <CVE>CVE-2024-10389</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
        <ProductID>openSUSE Leap 15.5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244042-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-10389.html</URL>
        <Description>CVE-2024-10389</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Nomad Community and Nomad Enterprise ("Nomad") volume specification is vulnerable to arbitrary cross-namespace volume creation through unauthorized Container Storage Interface (CSI) volume writes. This vulnerability, identified as CVE-2024-10975, is fixed in Nomad Community Edition 1.9.2 and Nomad Enterprise 1.9.2, 1.8.7, and 1.7.15.</Note>
    </Notes>
    <CVE>CVE-2024-10975</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
        <ProductID>openSUSE Leap 15.5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244042-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-10975.html</URL>
        <Description>CVE-2024-10975</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">devtron is an open source tool integration platform for Kubernetes. In affected versions an authenticated user (with minimum permission) could utilize and exploit SQL Injection to allow the execution of malicious SQL queries via CreateUser API (/orchestrator/user). This issue has been addressed in version 0.7.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability.</Note>
    </Notes>
    <CVE>CVE-2024-45794</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
        <ProductID>openSUSE Leap 15.5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244042-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-45794.html</URL>
        <Description>CVE-2024-45794</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">localai &lt;=2.20.1 is vulnerable to Cross Site Scripting (XSS). When calling the delete model API and passing inappropriate parameters, it can cause a one-time storage XSS, which will trigger the payload when a user accesses the homepage.</Note>
    </Notes>
    <CVE>CVE-2024-48057</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
        <ProductID>openSUSE Leap 15.5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244042-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-48057.html</URL>
        <Description>CVE-2024-48057</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Osmedeus is a Workflow Engine for Offensive Security. Cross-site Scripting (XSS) occurs on the Osmedues web server when viewing results from the workflow, allowing commands to be executed on the server. When using a workflow that contains the summary module, it generates reports in HTML and Markdown formats. The default report is based on the `general-template.md` template.The contents of the files are read and used to generate the report. However, the file contents are not properly filtered, leading to XSS. This may lead to commands executed on the host as well. This issue is not yet resolved. Users are advised to add their own filtering or to reach out to the developer to aid in developing a patch.</Note>
    </Notes>
    <CVE>CVE-2024-51735</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
        <ProductID>openSUSE Leap 15.5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244042-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-51735.html</URL>
        <Description>CVE-2024-51735</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` return both error codes. If users only check for the `jwt.ErrTokenExpired ` using `error.Is`, they will ignore the embedded `jwt.ErrTokenSignatureInvalid` and thus potentially accept invalid tokens. A fix has been back-ported with the error handling logic from the `v5` branch to the `v4` branch. In this logic, the `ParseWithClaims` function will immediately return in "dangerous" situations (e.g., an invalid signature), limiting the combined errors only to situations where the signature is valid, but further validation failed (e.g., if the signature is valid, but is expired AND has the wrong audience). This fix is part of the 4.5.1 release. We are aware that this changes the behaviour of an established function and is not 100 % backwards compatible, so updating to 4.5.1 might break your code. In case you cannot update to 4.5.0, please make sure that you are properly checking for all errors ("dangerous" ones first), so that you are not running in the case detailed above.</Note>
    </Notes>
    <CVE>CVE-2024-51744</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
        <ProductID>openSUSE Leap 15.5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244042-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-51744.html</URL>
        <Description>CVE-2024-51744</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232936</URL>
        <Description>SUSE Bug 1232936</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Gitsign is a keyless Sigstore to signing tool for Git commits with your a GitHub / OIDC identity. gitsign may select the wrong Rekor entry to use during online verification when multiple entries are returned by the log. gitsign uses Rekor's search API to fetch entries that apply to a signature being verified. The parameters used for the search are the public key and the payload. The search API returns entries that match either condition rather than both. When gitsign's credential cache is used, there can be multiple entries that use the same ephemeral keypair / signing certificate. As gitsign assumes both conditions are matched by Rekor, there is no additional validation that the entry's hash matches the payload being verified, meaning that the wrong entry can be used to successfully pass verification. Impact is minimal as while gitsign does not match the payload against the entry, it does ensure that the certificate matches. This would need to be exploited during the certificate validity window (10 minutes) by the key holder.</Note>
    </Notes>
    <CVE>CVE-2024-51746</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
        <ProductID>openSUSE Leap 15.5:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244042-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-51746.html</URL>
        <Description>CVE-2024-51746</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232903</URL>
        <Description>SUSE Bug 1232903</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
