<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update 4.3.16 for Multi-Linux Manager Server</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:02476-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-07-23T12:37:12Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-07-23T12:37:12Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-07-23T12:37:12Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update 4.3.16 for Multi-Linux Manager Server</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update fixes the following issues:
    
release-notes-susemanager:

- Update to SUSE Manager 4.3.16
  * Important Salt Security Update
  * Added support for SUSE Linux Enterprise 15 SP7 as a client
    using the Salt Bundle
  * CVE Fixed
    CVE-2025-23392, CVE-2025-23393, CVE-2024-38824, CVE-2025-22239
    CVE-2025-22236, CVE-2025-22237, CVE-2024-38825, CVE-2025-22240
    CVE-2024-38823, CVE-2025-22241, CVE-2025-22238, CVE-2025-22242
    CVE-2024-38822, CVE-2025-46811, CVE-2025-46809
  * Bugs mentioned:
    bsc#1157520, bsc#1191142, bsc#1209060, bsc#1211373, bsc#1213952
    bsc#1216187, bsc#1221031, bsc#1225740, bsc#1230403, bsc#1230908
    bsc#1233371, bsc#1234608, bsc#1236635, bsc#1236779, bsc#1236810
    bsc#1236877, bsc#1236910, bsc#1237060, bsc#1237082, bsc#1237294
    bsc#1237403, bsc#1237581, bsc#1237694, bsc#1237770, bsc#1238922
    bsc#1238924, bsc#1239102, bsc#1239154, bsc#1239604, bsc#1239743
    bsc#1239826, bsc#1239868, bsc#1239907, bsc#1240038, bsc#1240386
    bsc#1240666, bsc#1240842, bsc#1241239, bsc#1241286, bsc#1241455
    bsc#1241490, bsc#1242004, bsc#1242030, bsc#1242148, bsc#1242554
    bsc#1242911, bsc#1243239, bsc#1243460, bsc#1243724, bsc#1243825
    bsc#1244065, bsc#1244290, bsc#1245027, bsc#1245222, bsc#1245368
    bsc#1245005, bsc#1246119

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Container suse/manager/4.3/proxy-httpd:latest-2025-2476,SUSE-2025-2476,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-2476,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-2476</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502476-1/</URL>
      <Description>Link for SUSE-SU-2025:02476-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2025-July/040893.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:02476-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1157520</URL>
      <Description>SUSE Bug 1157520</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1191142</URL>
      <Description>SUSE Bug 1191142</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1209060</URL>
      <Description>SUSE Bug 1209060</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1211373</URL>
      <Description>SUSE Bug 1211373</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213952</URL>
      <Description>SUSE Bug 1213952</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1216187</URL>
      <Description>SUSE Bug 1216187</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221031</URL>
      <Description>SUSE Bug 1221031</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225740</URL>
      <Description>SUSE Bug 1225740</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230403</URL>
      <Description>SUSE Bug 1230403</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230908</URL>
      <Description>SUSE Bug 1230908</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233371</URL>
      <Description>SUSE Bug 1233371</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234608</URL>
      <Description>SUSE Bug 1234608</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1236635</URL>
      <Description>SUSE Bug 1236635</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1236779</URL>
      <Description>SUSE Bug 1236779</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1236810</URL>
      <Description>SUSE Bug 1236810</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1236877</URL>
      <Description>SUSE Bug 1236877</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1236910</URL>
      <Description>SUSE Bug 1236910</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1237060</URL>
      <Description>SUSE Bug 1237060</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1237082</URL>
      <Description>SUSE Bug 1237082</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1237294</URL>
      <Description>SUSE Bug 1237294</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1237403</URL>
      <Description>SUSE Bug 1237403</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1237581</URL>
      <Description>SUSE Bug 1237581</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1237694</URL>
      <Description>SUSE Bug 1237694</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1237770</URL>
      <Description>SUSE Bug 1237770</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1238922</URL>
      <Description>SUSE Bug 1238922</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1238924</URL>
      <Description>SUSE Bug 1238924</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1239102</URL>
      <Description>SUSE Bug 1239102</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1239154</URL>
      <Description>SUSE Bug 1239154</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1239604</URL>
      <Description>SUSE Bug 1239604</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1239743</URL>
      <Description>SUSE Bug 1239743</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1239826</URL>
      <Description>SUSE Bug 1239826</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1239868</URL>
      <Description>SUSE Bug 1239868</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1239907</URL>
      <Description>SUSE Bug 1239907</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1240038</URL>
      <Description>SUSE Bug 1240038</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1240386</URL>
      <Description>SUSE Bug 1240386</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1240666</URL>
      <Description>SUSE Bug 1240666</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1240842</URL>
      <Description>SUSE Bug 1240842</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1241239</URL>
      <Description>SUSE Bug 1241239</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1241286</URL>
      <Description>SUSE Bug 1241286</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1241455</URL>
      <Description>SUSE Bug 1241455</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1241490</URL>
      <Description>SUSE Bug 1241490</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1242004</URL>
      <Description>SUSE Bug 1242004</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1242030</URL>
      <Description>SUSE Bug 1242030</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1242148</URL>
      <Description>SUSE Bug 1242148</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1242554</URL>
      <Description>SUSE Bug 1242554</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1242911</URL>
      <Description>SUSE Bug 1242911</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1243239</URL>
      <Description>SUSE Bug 1243239</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1243460</URL>
      <Description>SUSE Bug 1243460</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1243724</URL>
      <Description>SUSE Bug 1243724</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1243825</URL>
      <Description>SUSE Bug 1243825</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244065</URL>
      <Description>SUSE Bug 1244065</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244290</URL>
      <Description>SUSE Bug 1244290</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245005</URL>
      <Description>SUSE Bug 1245005</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245027</URL>
      <Description>SUSE Bug 1245027</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245222</URL>
      <Description>SUSE Bug 1245222</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245368</URL>
      <Description>SUSE Bug 1245368</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246119</URL>
      <Description>SUSE Bug 1246119</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38822/</URL>
      <Description>SUSE CVE CVE-2024-38822 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38823/</URL>
      <Description>SUSE CVE CVE-2024-38823 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38824/</URL>
      <Description>SUSE CVE CVE-2024-38824 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38825/</URL>
      <Description>SUSE CVE CVE-2024-38825 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-22236/</URL>
      <Description>SUSE CVE CVE-2025-22236 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-22237/</URL>
      <Description>SUSE CVE CVE-2025-22237 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-22238/</URL>
      <Description>SUSE CVE CVE-2025-22238 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-22239/</URL>
      <Description>SUSE CVE CVE-2025-22239 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-22240/</URL>
      <Description>SUSE CVE CVE-2025-22240 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-22241/</URL>
      <Description>SUSE CVE CVE-2025-22241 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-22242/</URL>
      <Description>SUSE CVE CVE-2025-22242 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-23392/</URL>
      <Description>SUSE CVE CVE-2025-23392 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-23393/</URL>
      <Description>SUSE CVE CVE-2025-23393 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-46809/</URL>
      <Description>SUSE CVE CVE-2025-46809 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-46811/</URL>
      <Description>SUSE CVE CVE-2025-46811 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Container suse/manager/4.3/proxy-httpd:latest">
      <Branch Type="Product Name" Name="Container suse/manager/4.3/proxy-httpd:latest">
        <FullProductName ProductID="Container suse/manager/4.3/proxy-httpd:latest">Container suse/manager/4.3/proxy-httpd:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Proxy 4.3">
      <Branch Type="Product Name" Name="SUSE Manager Proxy 4.3">
        <FullProductName ProductID="SUSE Manager Proxy 4.3" CPE="cpe:/o:suse:suse-manager-proxy:4.3">SUSE Manager Proxy 4.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Server 4.3">
      <Branch Type="Product Name" Name="SUSE Manager Server 4.3">
        <FullProductName ProductID="SUSE Manager Server 4.3" CPE="cpe:/o:suse:suse-manager-server:4.3">SUSE Manager Server 4.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="release-notes-susemanager-proxy-4.3.16-150400.3.98.1">
      <FullProductName ProductID="release-notes-susemanager-proxy-4.3.16-150400.3.98.1">release-notes-susemanager-proxy-4.3.16-150400.3.98.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="release-notes-susemanager-4.3.16-150400.3.140.1">
      <FullProductName ProductID="release-notes-susemanager-4.3.16-150400.3.140.1">release-notes-susemanager-4.3.16-150400.3.140.1</FullProductName>
    </Branch>
    <Relationship ProductReference="release-notes-susemanager-proxy-4.3.16-150400.3.98.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/manager/4.3/proxy-httpd:latest">
      <FullProductName ProductID="Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.16-150400.3.98.1">release-notes-susemanager-proxy-4.3.16-150400.3.98.1 as a component of Container suse/manager/4.3/proxy-httpd:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-proxy-4.3.16-150400.3.98.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Proxy 4.3">
      <FullProductName ProductID="SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1">release-notes-susemanager-proxy-4.3.16-150400.3.98.1 as a component of SUSE Manager Proxy 4.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-4.3.16-150400.3.140.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Server 4.3">
      <FullProductName ProductID="SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1">release-notes-susemanager-4.3.16-150400.3.140.1 as a component of SUSE Manager Server 4.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple methods in the salt master skip minion token validation. Therefore a misbehaving minion can impersonate another minion.</Note>
    </Notes>
    <CVE>CVE-2024-38822</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502476-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38822.html</URL>
        <Description>CVE-2024-38822</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244561</URL>
        <Description>SUSE Bug 1244561</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Salt's request server is vulnerable to replay attacks when not using a TLS encrypted transport.</Note>
    </Notes>
    <CVE>CVE-2024-38823</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502476-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38823.html</URL>
        <Description>CVE-2024-38823</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244564</URL>
        <Description>SUSE Bug 1244564</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Directory traversal vulnerability in recv_file method allows arbitrary files to be written to the master cache directory.</Note>
    </Notes>
    <CVE>CVE-2024-38824</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502476-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38824.html</URL>
        <Description>CVE-2024-38824</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244565</URL>
        <Description>SUSE Bug 1244565</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The salt.auth.pki module does not properly authenticate callers. The "password" field contains a public certificate which is validated against a CA certificate by the module. This is not pki authentication, as the caller does not need access to the corresponding private key for the authentication attempt to be accepted.</Note>
    </Notes>
    <CVE>CVE-2024-38825</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502476-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38825.html</URL>
        <Description>CVE-2024-38825</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244566</URL>
        <Description>SUSE Bug 1244566</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Minion event bus authorization bypass. An attacker with access to a minion key can craft a message which may be able to execute a job on other minions (&gt;= 3007.0).</Note>
    </Notes>
    <CVE>CVE-2025-22236</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502476-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-22236.html</URL>
        <Description>CVE-2025-22236</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244568</URL>
        <Description>SUSE Bug 1244568</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An attacker with access to a minion key can exploit the 'on demand' pillar functionality with a specially crafted git url which could cause and arbitrary command to be run on the master with the same privileges as the master process.</Note>
    </Notes>
    <CVE>CVE-2025-22237</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502476-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-22237.html</URL>
        <Description>CVE-2025-22237</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244571</URL>
        <Description>SUSE Bug 1244571</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Directory traversal attack in minion file cache creation. The master's default cache is vulnerable to a directory traversal attack. Which could be leveraged to write or overwrite 'cache' files outside of the cache directory.</Note>
    </Notes>
    <CVE>CVE-2025-22238</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502476-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-22238.html</URL>
        <Description>CVE-2025-22238</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244572</URL>
        <Description>SUSE Bug 1244572</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Arbitrary event injection on Salt Master. The master's "_minion_event" method can be used by and authorized minion to send arbitrary events onto the master's event bus.</Note>
    </Notes>
    <CVE>CVE-2025-22239</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502476-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-22239.html</URL>
        <Description>CVE-2025-22239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244574</URL>
        <Description>SUSE Bug 1244574</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Arbitrary directory creation or file deletion. In the find_file method of the GitFS class, a path is created using os.path.join using unvalidated input from the "tgt_env" variable. This can be exploited by an attacker to delete any file on the Master's process has permissions to.</Note>
    </Notes>
    <CVE>CVE-2025-22240</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502476-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-22240.html</URL>
        <Description>CVE-2025-22240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244567</URL>
        <Description>SUSE Bug 1244567</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">File contents overwrite the VirtKey class is called when "on-demand pillar" data is requested and uses un-validated input to create paths to the "pki directory". The functionality is used to auto-accept Minion authentication keys based on a pre-placed "authorization file" at a specific location and is present in the default configuration.</Note>
    </Notes>
    <CVE>CVE-2025-22241</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502476-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-22241.html</URL>
        <Description>CVE-2025-22241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244570</URL>
        <Description>SUSE Bug 1244570</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Worker process denial of service through file read operation. .A vulnerability exists in the Master's "pub_ret" method which is exposed to all minions. The un-sanitized input value "jid" is used to construct a path which is then opened for reading. An attacker could exploit this vulnerabilities by attempting to read from a filename that will not return any data, e.g. by targeting a pipe node on the proc file system.</Note>
    </Notes>
    <CVE>CVE-2025-22242</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502476-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-22242.html</URL>
        <Description>CVE-2025-22242</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244575</URL>
        <Description>SUSE Bug 1244575</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in spacewalk-java allows execution of arbitrary Javascript code on target systems.This issue affects Container suse/manager/5.0/x86_64/server:5.0.4.7.19.1: from ? before 5.0.24-150600.3.25.1; Container suse/manager/5.0/x86_64/server:5.0.4.7.19.1: from ? before 5.0.24-150600.3.25.1; Container suse/manager/5.0/x86_64/server:5.0.4.7.19.1: from ? before 5.0.24-150600.3.25.1; Container suse/manager/5.0/x86_64/server:5.0.4.7.19.1: from ? before 5.0.24-150600.3.25.1; SUSE Manager Server Module 4.3: from ? before 4.3.85-150400.3.105.3; SUSE Manager Server Module 4.3: from ? before 4.3.85-150400.3.105.3; SUSE Manager Server Module 4.3: from ? before 4.3.85-150400.3.105.3; SUSE Manager Server Module 4.3: from ? before 4.3.85-150400.3.105.3.</Note>
    </Notes>
    <CVE>CVE-2025-23392</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502476-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-23392.html</URL>
        <Description>CVE-2025-23392</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1239826</URL>
        <Description>SUSE Bug 1239826</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in   spacewalk-java allows execution of arbitrary Javascript code on users machines.This issue affects Container suse/manager/5.0/x86_64/server:5.0.4.7.19.1: from ? before 5.0.24-150600.3.25.1; SUSE Manager Server Module 4.3: from ? before 4.3.85-150400.3.105.3.</Note>
    </Notes>
    <CVE>CVE-2025-23393</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502476-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-23393.html</URL>
        <Description>CVE-2025-23393</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1240386</URL>
        <Description>SUSE Bug 1240386</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">unknown</Note>
    </Notes>
    <CVE>CVE-2025-46809</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502476-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-46809.html</URL>
        <Description>CVE-2025-46809</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245005</URL>
        <Description>SUSE Bug 1245005</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">unknown</Note>
    </Notes>
    <CVE>CVE-2025-46811</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1</ProductID>
        <ProductID>SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502476-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-46811.html</URL>
        <Description>CVE-2025-46811</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246119</URL>
        <Description>SUSE Bug 1246119</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
