suse-su-2025:02476-1
Vulnerability from csaf_suse
Published
2025-07-23 12:37
Modified
2025-07-23 12:37
Summary
Security update 4.3.16 for Multi-Linux Manager Server
Notes
Title of the patch
Security update 4.3.16 for Multi-Linux Manager Server
Description of the patch
This update fixes the following issues:
release-notes-susemanager:
- Update to SUSE Manager 4.3.16
* Important Salt Security Update
* Added support for SUSE Linux Enterprise 15 SP7 as a client
using the Salt Bundle
* CVE Fixed
CVE-2025-23392, CVE-2025-23393, CVE-2024-38824, CVE-2025-22239
CVE-2025-22236, CVE-2025-22237, CVE-2024-38825, CVE-2025-22240
CVE-2024-38823, CVE-2025-22241, CVE-2025-22238, CVE-2025-22242
CVE-2024-38822, CVE-2025-46811, CVE-2025-46809
* Bugs mentioned:
bsc#1157520, bsc#1191142, bsc#1209060, bsc#1211373, bsc#1213952
bsc#1216187, bsc#1221031, bsc#1225740, bsc#1230403, bsc#1230908
bsc#1233371, bsc#1234608, bsc#1236635, bsc#1236779, bsc#1236810
bsc#1236877, bsc#1236910, bsc#1237060, bsc#1237082, bsc#1237294
bsc#1237403, bsc#1237581, bsc#1237694, bsc#1237770, bsc#1238922
bsc#1238924, bsc#1239102, bsc#1239154, bsc#1239604, bsc#1239743
bsc#1239826, bsc#1239868, bsc#1239907, bsc#1240038, bsc#1240386
bsc#1240666, bsc#1240842, bsc#1241239, bsc#1241286, bsc#1241455
bsc#1241490, bsc#1242004, bsc#1242030, bsc#1242148, bsc#1242554
bsc#1242911, bsc#1243239, bsc#1243460, bsc#1243724, bsc#1243825
bsc#1244065, bsc#1244290, bsc#1245027, bsc#1245222, bsc#1245368
bsc#1245005, bsc#1246119
Patchnames
SUSE-2025-2476,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-2476,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-2476
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update 4.3.16 for Multi-Linux Manager Server", "title": "Title of the patch" }, { "category": "description", "text": "This update fixes the following issues:\n \nrelease-notes-susemanager:\n\n- Update to SUSE Manager 4.3.16\n * Important Salt Security Update\n * Added support for SUSE Linux Enterprise 15 SP7 as a client\n using the Salt Bundle\n * CVE Fixed\n CVE-2025-23392, CVE-2025-23393, CVE-2024-38824, CVE-2025-22239\n CVE-2025-22236, CVE-2025-22237, CVE-2024-38825, CVE-2025-22240\n CVE-2024-38823, CVE-2025-22241, CVE-2025-22238, CVE-2025-22242\n CVE-2024-38822, CVE-2025-46811, CVE-2025-46809\n * Bugs mentioned:\n bsc#1157520, bsc#1191142, bsc#1209060, bsc#1211373, bsc#1213952\n bsc#1216187, bsc#1221031, bsc#1225740, bsc#1230403, bsc#1230908\n bsc#1233371, bsc#1234608, bsc#1236635, bsc#1236779, bsc#1236810\n bsc#1236877, bsc#1236910, bsc#1237060, bsc#1237082, bsc#1237294\n bsc#1237403, bsc#1237581, bsc#1237694, bsc#1237770, bsc#1238922\n bsc#1238924, bsc#1239102, bsc#1239154, bsc#1239604, bsc#1239743\n bsc#1239826, bsc#1239868, bsc#1239907, bsc#1240038, bsc#1240386\n bsc#1240666, bsc#1240842, bsc#1241239, bsc#1241286, bsc#1241455\n bsc#1241490, bsc#1242004, bsc#1242030, bsc#1242148, bsc#1242554\n bsc#1242911, bsc#1243239, bsc#1243460, bsc#1243724, bsc#1243825\n bsc#1244065, bsc#1244290, bsc#1245027, bsc#1245222, bsc#1245368\n bsc#1245005, bsc#1246119\n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-2476,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-2476,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-2476", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02476-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:02476-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502476-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:02476-1", "url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040893.html" }, { "category": "self", "summary": "SUSE Bug 1157520", "url": "https://bugzilla.suse.com/1157520" }, { "category": "self", "summary": "SUSE Bug 1191142", "url": "https://bugzilla.suse.com/1191142" }, { "category": "self", "summary": "SUSE Bug 1209060", "url": "https://bugzilla.suse.com/1209060" }, { "category": "self", "summary": "SUSE Bug 1211373", "url": "https://bugzilla.suse.com/1211373" }, { "category": "self", "summary": "SUSE Bug 1213952", "url": "https://bugzilla.suse.com/1213952" }, { "category": "self", "summary": "SUSE Bug 1216187", "url": "https://bugzilla.suse.com/1216187" }, { "category": "self", "summary": "SUSE Bug 1221031", "url": "https://bugzilla.suse.com/1221031" }, { "category": "self", "summary": "SUSE Bug 1225740", "url": "https://bugzilla.suse.com/1225740" }, { "category": "self", "summary": "SUSE Bug 1230403", "url": "https://bugzilla.suse.com/1230403" }, { "category": "self", "summary": "SUSE Bug 1230908", "url": "https://bugzilla.suse.com/1230908" }, { "category": "self", "summary": "SUSE Bug 1233371", "url": "https://bugzilla.suse.com/1233371" }, { "category": "self", "summary": "SUSE Bug 1234608", "url": "https://bugzilla.suse.com/1234608" }, { "category": "self", "summary": "SUSE Bug 1236635", "url": "https://bugzilla.suse.com/1236635" }, { "category": "self", "summary": "SUSE Bug 1236779", "url": "https://bugzilla.suse.com/1236779" }, { "category": "self", "summary": "SUSE Bug 1236810", "url": "https://bugzilla.suse.com/1236810" }, { "category": "self", "summary": "SUSE Bug 1236877", "url": "https://bugzilla.suse.com/1236877" }, { "category": "self", "summary": "SUSE Bug 1236910", "url": "https://bugzilla.suse.com/1236910" }, { "category": "self", "summary": "SUSE Bug 1237060", "url": "https://bugzilla.suse.com/1237060" }, { "category": "self", "summary": "SUSE Bug 1237082", "url": "https://bugzilla.suse.com/1237082" }, { "category": "self", "summary": "SUSE Bug 1237294", "url": "https://bugzilla.suse.com/1237294" }, { "category": "self", "summary": "SUSE Bug 1237403", "url": "https://bugzilla.suse.com/1237403" }, { "category": "self", "summary": "SUSE Bug 1237581", "url": "https://bugzilla.suse.com/1237581" }, { "category": "self", "summary": "SUSE Bug 1237694", "url": "https://bugzilla.suse.com/1237694" }, { "category": "self", "summary": "SUSE Bug 1237770", "url": "https://bugzilla.suse.com/1237770" }, { "category": "self", "summary": "SUSE Bug 1238922", "url": "https://bugzilla.suse.com/1238922" }, { "category": "self", "summary": "SUSE Bug 1238924", "url": "https://bugzilla.suse.com/1238924" }, { "category": "self", "summary": "SUSE Bug 1239102", "url": "https://bugzilla.suse.com/1239102" }, { "category": "self", "summary": "SUSE Bug 1239154", "url": "https://bugzilla.suse.com/1239154" }, { "category": "self", "summary": "SUSE Bug 1239604", "url": "https://bugzilla.suse.com/1239604" }, { "category": "self", "summary": "SUSE Bug 1239743", "url": "https://bugzilla.suse.com/1239743" }, { "category": "self", "summary": "SUSE Bug 1239826", "url": "https://bugzilla.suse.com/1239826" }, { "category": "self", "summary": "SUSE Bug 1239868", "url": "https://bugzilla.suse.com/1239868" }, { "category": "self", "summary": "SUSE Bug 1239907", "url": "https://bugzilla.suse.com/1239907" }, { "category": "self", "summary": "SUSE Bug 1240038", "url": "https://bugzilla.suse.com/1240038" }, { "category": "self", "summary": "SUSE Bug 1240386", "url": "https://bugzilla.suse.com/1240386" }, { "category": "self", "summary": "SUSE Bug 1240666", "url": "https://bugzilla.suse.com/1240666" }, { "category": "self", "summary": "SUSE Bug 1240842", "url": "https://bugzilla.suse.com/1240842" }, { "category": "self", "summary": "SUSE Bug 1241239", "url": "https://bugzilla.suse.com/1241239" }, { "category": "self", "summary": "SUSE Bug 1241286", "url": "https://bugzilla.suse.com/1241286" }, { "category": "self", "summary": "SUSE Bug 1241455", "url": "https://bugzilla.suse.com/1241455" }, { "category": "self", "summary": "SUSE Bug 1241490", "url": "https://bugzilla.suse.com/1241490" }, { "category": "self", "summary": "SUSE Bug 1242004", "url": "https://bugzilla.suse.com/1242004" }, { "category": "self", "summary": "SUSE Bug 1242030", "url": "https://bugzilla.suse.com/1242030" }, { "category": "self", "summary": "SUSE Bug 1242148", "url": "https://bugzilla.suse.com/1242148" }, { "category": "self", "summary": "SUSE Bug 1242554", "url": "https://bugzilla.suse.com/1242554" }, { "category": "self", "summary": "SUSE Bug 1242911", "url": "https://bugzilla.suse.com/1242911" }, { "category": "self", "summary": "SUSE Bug 1243239", "url": "https://bugzilla.suse.com/1243239" }, { "category": "self", "summary": "SUSE Bug 1243460", "url": "https://bugzilla.suse.com/1243460" }, { "category": "self", "summary": "SUSE Bug 1243724", "url": "https://bugzilla.suse.com/1243724" }, { "category": "self", "summary": "SUSE Bug 1243825", "url": "https://bugzilla.suse.com/1243825" }, { "category": "self", "summary": "SUSE Bug 1244065", "url": "https://bugzilla.suse.com/1244065" }, { "category": "self", "summary": "SUSE Bug 1244290", "url": "https://bugzilla.suse.com/1244290" }, { "category": "self", "summary": "SUSE Bug 1245005", "url": "https://bugzilla.suse.com/1245005" }, { "category": "self", "summary": "SUSE Bug 1245027", "url": "https://bugzilla.suse.com/1245027" }, { "category": "self", "summary": "SUSE Bug 1245222", "url": "https://bugzilla.suse.com/1245222" }, { "category": "self", "summary": "SUSE Bug 1245368", "url": "https://bugzilla.suse.com/1245368" }, { "category": "self", "summary": "SUSE Bug 1246119", "url": "https://bugzilla.suse.com/1246119" }, { "category": "self", "summary": "SUSE CVE CVE-2024-38822 page", "url": "https://www.suse.com/security/cve/CVE-2024-38822/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-38823 page", "url": "https://www.suse.com/security/cve/CVE-2024-38823/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-38824 page", "url": "https://www.suse.com/security/cve/CVE-2024-38824/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-38825 page", "url": "https://www.suse.com/security/cve/CVE-2024-38825/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22236 page", "url": "https://www.suse.com/security/cve/CVE-2025-22236/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22237 page", "url": "https://www.suse.com/security/cve/CVE-2025-22237/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22238 page", "url": "https://www.suse.com/security/cve/CVE-2025-22238/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22239 page", "url": "https://www.suse.com/security/cve/CVE-2025-22239/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22240 page", "url": "https://www.suse.com/security/cve/CVE-2025-22240/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22241 page", "url": "https://www.suse.com/security/cve/CVE-2025-22241/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22242 page", "url": "https://www.suse.com/security/cve/CVE-2025-22242/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-23392 page", "url": "https://www.suse.com/security/cve/CVE-2025-23392/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-23393 page", "url": "https://www.suse.com/security/cve/CVE-2025-23393/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-46809 page", "url": "https://www.suse.com/security/cve/CVE-2025-46809/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-46811 page", "url": "https://www.suse.com/security/cve/CVE-2025-46811/" } ], "title": "Security update 4.3.16 for Multi-Linux Manager Server", "tracking": { "current_release_date": "2025-07-23T12:37:12Z", "generator": { "date": "2025-07-23T12:37:12Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:02476-1", "initial_release_date": "2025-07-23T12:37:12Z", "revision_history": [ { "date": "2025-07-23T12:37:12Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "release-notes-susemanager-4.3.16-150400.3.140.1.noarch", "product": { "name": "release-notes-susemanager-4.3.16-150400.3.140.1.noarch", "product_id": "release-notes-susemanager-4.3.16-150400.3.140.1.noarch" } }, { "category": "product_version", "name": "release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "product": { "name": "release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "product_id": "release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Manager Proxy 4.3", "product": { "name": "SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.3" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.3", "product": { "name": "SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch" }, "product_reference": "release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "release-notes-susemanager-4.3.16-150400.3.140.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" }, "product_reference": "release-notes-susemanager-4.3.16-150400.3.140.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-38822" } ], "notes": [ { "category": "general", "text": "Multiple methods in the salt master skip minion token validation. Therefore a misbehaving minion can impersonate another minion.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-38822", "url": "https://www.suse.com/security/cve/CVE-2024-38822" }, { "category": "external", "summary": "SUSE Bug 1244561 for CVE-2024-38822", "url": "https://bugzilla.suse.com/1244561" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T12:37:12Z", "details": "low" } ], "title": "CVE-2024-38822" }, { "cve": "CVE-2024-38823", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-38823" } ], "notes": [ { "category": "general", "text": "Salt\u0027s request server is vulnerable to replay attacks when not using a TLS encrypted transport.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-38823", "url": "https://www.suse.com/security/cve/CVE-2024-38823" }, { "category": "external", "summary": "SUSE Bug 1244564 for CVE-2024-38823", "url": "https://bugzilla.suse.com/1244564" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T12:37:12Z", "details": "moderate" } ], "title": "CVE-2024-38823" }, { "cve": "CVE-2024-38824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-38824" } ], "notes": [ { "category": "general", "text": "Directory traversal vulnerability in recv_file method allows arbitrary files to be written to the master cache directory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-38824", "url": "https://www.suse.com/security/cve/CVE-2024-38824" }, { "category": "external", "summary": "SUSE Bug 1244565 for CVE-2024-38824", "url": "https://bugzilla.suse.com/1244565" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T12:37:12Z", "details": "critical" } ], "title": "CVE-2024-38824" }, { "cve": "CVE-2024-38825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-38825" } ], "notes": [ { "category": "general", "text": "The salt.auth.pki module does not properly authenticate callers. The \"password\" field contains a public certificate which is validated against a CA certificate by the module. This is not pki authentication, as the caller does not need access to the corresponding private key for the authentication attempt to be accepted.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-38825", "url": "https://www.suse.com/security/cve/CVE-2024-38825" }, { "category": "external", "summary": "SUSE Bug 1244566 for CVE-2024-38825", "url": "https://bugzilla.suse.com/1244566" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T12:37:12Z", "details": "moderate" } ], "title": "CVE-2024-38825" }, { "cve": "CVE-2025-22236", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22236" } ], "notes": [ { "category": "general", "text": "Minion event bus authorization bypass. An attacker with access to a minion key can craft a message which may be able to execute a job on other minions (\u003e= 3007.0).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22236", "url": "https://www.suse.com/security/cve/CVE-2025-22236" }, { "category": "external", "summary": "SUSE Bug 1244568 for CVE-2025-22236", "url": "https://bugzilla.suse.com/1244568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L", "version": "3.1" }, "products": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T12:37:12Z", "details": "important" } ], "title": "CVE-2025-22236" }, { "cve": "CVE-2025-22237", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22237" } ], "notes": [ { "category": "general", "text": "An attacker with access to a minion key can exploit the \u0027on demand\u0027 pillar functionality with a specially crafted git url which could cause and arbitrary command to be run on the master with the same privileges as the master process.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22237", "url": "https://www.suse.com/security/cve/CVE-2025-22237" }, { "category": "external", "summary": "SUSE Bug 1244571 for CVE-2025-22237", "url": "https://bugzilla.suse.com/1244571" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T12:37:12Z", "details": "moderate" } ], "title": "CVE-2025-22237" }, { "cve": "CVE-2025-22238", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22238" } ], "notes": [ { "category": "general", "text": "Directory traversal attack in minion file cache creation. The master\u0027s default cache is vulnerable to a directory traversal attack. Which could be leveraged to write or overwrite \u0027cache\u0027 files outside of the cache directory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22238", "url": "https://www.suse.com/security/cve/CVE-2025-22238" }, { "category": "external", "summary": "SUSE Bug 1244572 for CVE-2025-22238", "url": "https://bugzilla.suse.com/1244572" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T12:37:12Z", "details": "moderate" } ], "title": "CVE-2025-22238" }, { "cve": "CVE-2025-22239", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22239" } ], "notes": [ { "category": "general", "text": "Arbitrary event injection on Salt Master. The master\u0027s \"_minion_event\" method can be used by and authorized minion to send arbitrary events onto the master\u0027s event bus.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22239", "url": "https://www.suse.com/security/cve/CVE-2025-22239" }, { "category": "external", "summary": "SUSE Bug 1244574 for CVE-2025-22239", "url": "https://bugzilla.suse.com/1244574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L", "version": "3.1" }, "products": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T12:37:12Z", "details": "important" } ], "title": "CVE-2025-22239" }, { "cve": "CVE-2025-22240", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22240" } ], "notes": [ { "category": "general", "text": "Arbitrary directory creation or file deletion. In the find_file method of the GitFS class, a path is created using os.path.join using unvalidated input from the \"tgt_env\" variable. This can be exploited by an attacker to delete any file on the Master\u0027s process has permissions to.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22240", "url": "https://www.suse.com/security/cve/CVE-2025-22240" }, { "category": "external", "summary": "SUSE Bug 1244567 for CVE-2025-22240", "url": "https://bugzilla.suse.com/1244567" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T12:37:12Z", "details": "moderate" } ], "title": "CVE-2025-22240" }, { "cve": "CVE-2025-22241", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22241" } ], "notes": [ { "category": "general", "text": "File contents overwrite the VirtKey class is called when \"on-demand pillar\" data is requested and uses un-validated input to create paths to the \"pki directory\". The functionality is used to auto-accept Minion authentication keys based on a pre-placed \"authorization file\" at a specific location and is present in the default configuration.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22241", "url": "https://www.suse.com/security/cve/CVE-2025-22241" }, { "category": "external", "summary": "SUSE Bug 1244570 for CVE-2025-22241", "url": "https://bugzilla.suse.com/1244570" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T12:37:12Z", "details": "moderate" } ], "title": "CVE-2025-22241" }, { "cve": "CVE-2025-22242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22242" } ], "notes": [ { "category": "general", "text": "Worker process denial of service through file read operation. .A vulnerability exists in the Master\u0027s \"pub_ret\" method which is exposed to all minions. The un-sanitized input value \"jid\" is used to construct a path which is then opened for reading. An attacker could exploit this vulnerabilities by attempting to read from a filename that will not return any data, e.g. by targeting a pipe node on the proc file system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22242", "url": "https://www.suse.com/security/cve/CVE-2025-22242" }, { "category": "external", "summary": "SUSE Bug 1244575 for CVE-2025-22242", "url": "https://bugzilla.suse.com/1244575" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T12:37:12Z", "details": "moderate" } ], "title": "CVE-2025-22242" }, { "cve": "CVE-2025-23392", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-23392" } ], "notes": [ { "category": "general", "text": "A Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in spacewalk-java allows execution of arbitrary Javascript code on target systems.This issue affects Container suse/manager/5.0/x86_64/server:5.0.4.7.19.1: from ? before 5.0.24-150600.3.25.1; Container suse/manager/5.0/x86_64/server:5.0.4.7.19.1: from ? before 5.0.24-150600.3.25.1; Container suse/manager/5.0/x86_64/server:5.0.4.7.19.1: from ? before 5.0.24-150600.3.25.1; Container suse/manager/5.0/x86_64/server:5.0.4.7.19.1: from ? before 5.0.24-150600.3.25.1; SUSE Manager Server Module 4.3: from ? before 4.3.85-150400.3.105.3; SUSE Manager Server Module 4.3: from ? before 4.3.85-150400.3.105.3; SUSE Manager Server Module 4.3: from ? before 4.3.85-150400.3.105.3; SUSE Manager Server Module 4.3: from ? before 4.3.85-150400.3.105.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-23392", "url": "https://www.suse.com/security/cve/CVE-2025-23392" }, { "category": "external", "summary": "SUSE Bug 1239826 for CVE-2025-23392", "url": "https://bugzilla.suse.com/1239826" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T12:37:12Z", "details": "moderate" } ], "title": "CVE-2025-23392" }, { "cve": "CVE-2025-23393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-23393" } ], "notes": [ { "category": "general", "text": "A Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in spacewalk-java allows execution of arbitrary Javascript code on users machines.This issue affects Container suse/manager/5.0/x86_64/server:5.0.4.7.19.1: from ? before 5.0.24-150600.3.25.1; SUSE Manager Server Module 4.3: from ? before 4.3.85-150400.3.105.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-23393", "url": "https://www.suse.com/security/cve/CVE-2025-23393" }, { "category": "external", "summary": "SUSE Bug 1240386 for CVE-2025-23393", "url": "https://bugzilla.suse.com/1240386" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T12:37:12Z", "details": "moderate" } ], "title": "CVE-2025-23393" }, { "cve": "CVE-2025-46809", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-46809" } ], "notes": [ { "category": "general", "text": "A Insertion of Sensitive Information into Log File vulnerability in SUSE Multi Linux Manager exposes the HTTP proxy credentials. This issue affects Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1: from ? before 5.0.27-150600.3.33.1; Image SLES15-SP4-Manager-Server-4-3-BYOS: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2: from ? before 4.3.87-150400.3.110.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE: from ? before 4.3.87-150400.3.110.2; SUSE Manager Server Module 4.3: from ? before 4.3.87-150400.3.110.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-46809", "url": "https://www.suse.com/security/cve/CVE-2025-46809" }, { "category": "external", "summary": "SUSE Bug 1245005 for CVE-2025-46809", "url": "https://bugzilla.suse.com/1245005" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T12:37:12Z", "details": "moderate" } ], "title": "CVE-2025-46809" }, { "cve": "CVE-2025-46811", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-46811" } ], "notes": [ { "category": "general", "text": "A Missing Authentication for Critical Function vulnerability in SUSE Manager allows anyone with access to the websocket at /rhn/websocket/minion/remote-commands to execute arbitrary commands as root.\n\n\n\n\nThis issue affects Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1: from ? before 0.3.7-150600.3.6.2; Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1: from ? before 5.0.14-150600.4.17.1; Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1: from ? before 5.0.14-150600.4.17.1; Image SLES15-SP4-Manager-Server-4-3-BYOS: from ? before 4.3.33-150400.3.55.2; Image SLES15-SP4-Manager-Server-4-3-BYOS: from ? before 4.3.33-150400.3.55.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure: from ? before 4.3.33-150400.3.55.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure: from ? before 4.3.33-150400.3.55.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2: from ? before 4.3.33-150400.3.55.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2: from ? before 4.3.33-150400.3.55.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE: from ? before 4.3.33-150400.3.55.2; Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE: from ? before 4.3.33-150400.3.55.2; SUSE Manager Server Module 4.3: from ? before 0.3.7-150400.3.39.4; SUSE Manager Server Module 4.3: from ? before 4.3.33-150400.3.55.2; SUSE Manager Server Module 4.3: from ? before 4.3.33-150400.3.55.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-46811", "url": "https://www.suse.com/security/cve/CVE-2025-46811" }, { "category": "external", "summary": "SUSE Bug 1246119 for CVE-2025-46811", "url": "https://bugzilla.suse.com/1246119" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.16-150400.3.98.1.noarch", "SUSE Manager Server 4.3:release-notes-susemanager-4.3.16-150400.3.140.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T12:37:12Z", "details": "critical" } ], "title": "CVE-2025-46811" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…