<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update 4.3.16.1 for SUSE Manager Server Release Notes</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:3827-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-10-28T07:26:58Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-10-28T07:26:58Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-10-28T07:26:58Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update 4.3.16.1 for SUSE Manager Server Release Notes</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update fixes the following issues:
    
release-notes-susemanager:

- Update to SUSE Manager 4.3.16.1
  * CVEs Fixed:
    CVE-2025-53883, CVE-2025-53880, CVE-2025-53192
  * Bugs mentioned:
    bsc#1246439, bsc#1246277, bsc#1248252
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Container suse/manager/4.3/proxy-httpd:latest-2025-3827,SUSE-2025-3827,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-3827,SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3827</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20253827-1/</URL>
      <Description>Link for SUSE-SU-2025:3827-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-October/023067.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:3827-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246277</URL>
      <Description>SUSE Bug 1246277</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246439</URL>
      <Description>SUSE Bug 1246439</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248252</URL>
      <Description>SUSE Bug 1248252</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-53192/</URL>
      <Description>SUSE CVE CVE-2025-53192 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-53880/</URL>
      <Description>SUSE CVE CVE-2025-53880 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-53883/</URL>
      <Description>SUSE CVE CVE-2025-53883 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Container suse/manager/4.3/proxy-httpd:latest">
      <Branch Type="Product Name" Name="Container suse/manager/4.3/proxy-httpd:latest">
        <FullProductName ProductID="Container suse/manager/4.3/proxy-httpd:latest">Container suse/manager/4.3/proxy-httpd:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Proxy LTS 4.3">
      <Branch Type="Product Name" Name="SUSE Manager Proxy LTS 4.3">
        <FullProductName ProductID="SUSE Manager Proxy LTS 4.3" CPE="cpe:/o:suse:suse-manager-proxy-lts:4.3">SUSE Manager Proxy LTS 4.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Server LTS 4.3">
      <Branch Type="Product Name" Name="SUSE Manager Server LTS 4.3">
        <FullProductName ProductID="SUSE Manager Server LTS 4.3" CPE="cpe:/o:suse:suse-manager-server-lts:4.3">SUSE Manager Server LTS 4.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="release-notes-susemanager-proxy-4.3.16.1-150400.3.101.2">
      <FullProductName ProductID="release-notes-susemanager-proxy-4.3.16.1-150400.3.101.2">release-notes-susemanager-proxy-4.3.16.1-150400.3.101.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="release-notes-susemanager-4.3.16.1-150400.3.143.2">
      <FullProductName ProductID="release-notes-susemanager-4.3.16.1-150400.3.143.2">release-notes-susemanager-4.3.16.1-150400.3.143.2</FullProductName>
    </Branch>
    <Relationship ProductReference="release-notes-susemanager-proxy-4.3.16.1-150400.3.101.2" RelationType="Default Component Of" RelatesToProductReference="Container suse/manager/4.3/proxy-httpd:latest">
      <FullProductName ProductID="Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.16.1-150400.3.101.2">release-notes-susemanager-proxy-4.3.16.1-150400.3.101.2 as a component of Container suse/manager/4.3/proxy-httpd:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-proxy-4.3.16.1-150400.3.101.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Proxy LTS 4.3">
      <FullProductName ProductID="SUSE Manager Proxy LTS 4.3:release-notes-susemanager-proxy-4.3.16.1-150400.3.101.2">release-notes-susemanager-proxy-4.3.16.1-150400.3.101.2 as a component of SUSE Manager Proxy LTS 4.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-4.3.16.1-150400.3.143.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Server LTS 4.3">
      <FullProductName ProductID="SUSE Manager Server LTS 4.3:release-notes-susemanager-4.3.16.1-150400.3.143.2">release-notes-susemanager-4.3.16.1-150400.3.143.2 as a component of SUSE Manager Server LTS 4.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Expression/Command Delimiters vulnerability in Apache Commons OGNL.

This issue affects Apache Commons OGNL: all versions.



When using the API Ognl.getValue, the OGNL engine parses and evaluates the provided expression with powerful capabilities, including accessing and invoking related methods,
 etc. Although OgnlRuntime attempts to restrict certain dangerous classes and methods (such as java.lang.Runtime) through a blocklist, these restrictions are not comprehensive. 
Attackers may be able to bypass the restrictions by leveraging class objects that are not covered by the blocklist and potentially achieve arbitrary code execution.

As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.


NOTE: This vulnerability only affects products that are no longer supported by the maintainer.</Note>
    </Notes>
    <CVE>CVE-2025-53192</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.16.1-150400.3.101.2</ProductID>
        <ProductID>SUSE Manager Proxy LTS 4.3:release-notes-susemanager-proxy-4.3.16.1-150400.3.101.2</ProductID>
        <ProductID>SUSE Manager Server LTS 4.3:release-notes-susemanager-4.3.16.1-150400.3.143.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20253827-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-53192.html</URL>
        <Description>CVE-2025-53192</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248252</URL>
        <Description>SUSE Bug 1248252</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">unknown</Note>
    </Notes>
    <CVE>CVE-2025-53880</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.16.1-150400.3.101.2</ProductID>
        <ProductID>SUSE Manager Proxy LTS 4.3:release-notes-susemanager-proxy-4.3.16.1-150400.3.101.2</ProductID>
        <ProductID>SUSE Manager Server LTS 4.3:release-notes-susemanager-4.3.16.1-150400.3.143.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20253827-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-53880.html</URL>
        <Description>CVE-2025-53880</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246277</URL>
        <Description>SUSE Bug 1246277</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">unknown</Note>
    </Notes>
    <CVE>CVE-2025-53883</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.16.1-150400.3.101.2</ProductID>
        <ProductID>SUSE Manager Proxy LTS 4.3:release-notes-susemanager-proxy-4.3.16.1-150400.3.101.2</ProductID>
        <ProductID>SUSE Manager Server LTS 4.3:release-notes-susemanager-4.3.16.1-150400.3.143.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20253827-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-53883.html</URL>
        <Description>CVE-2025-53883</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246439</URL>
        <Description>SUSE Bug 1246439</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
