rpm package
suse/release-notes-susemanager&distro=SUSE Manager Server 4.3
pkg:rpm/suse/release-notes-susemanager&distro=SUSE%20Manager%20Server%204.3
Vulnerabilities (49)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-22870 | Med | 4.4 | < 4.3.15.2-150400.3.133.1 | 4.3.15.2-150400.3.133.1 | Mar 12, 2025 | Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied. | |
| CVE-2025-27144 | Med | — | < 4.3.15.2-150400.3.133.1 | 4.3.15.2-150400.3.133.1 | Feb 24, 2025 | Go JOSE provides an implementation of the Javascript Object Signing and Encryption set of standards in Go, including support for JSON Web Encryption (JWE), JSON Web Signature (JWS), and JSON Web Token (JWT) standards. In versions on the 4.x branch prior to version 4.0.5, when par | |
| CVE-2024-11741 | Med | 4.3 | < 4.3.15.2-150400.3.133.1 | 4.3.15.2-150400.3.133.1 | Jan 31, 2025 | Grafana is an open-source platform for monitoring and observability. The Grafana Alerting VictorOps integration was not properly protected and could be exposed to users with Viewer permission. Fixed in versions 11.5.0, 11.4.1, 11.3.3, 11.2.6, 11.1.11, 11.0.11 and 10.4.15 | |
| CVE-2024-45339 | Hig | 7.1 | < 4.3.15.2-150400.3.133.1 | 4.3.15.2-150400.3.133.1 | Jan 28, 2025 | When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process's log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and | |
| CVE-2024-45337 | Cri | 9.1 | < 4.3.15.2-150400.3.133.1 | 4.3.15.2-150400.3.133.1 | Dec 12, 2024 | Applications and libraries which misuse connection.serverAuthenticate (via callback field ServerConfig.PublicKeyCallback) may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that "A call to this function does not guarantee that | |
| CVE-2024-49503 | Low | 3.5 | < 4.3.14-150400.3.122.1 | 4.3.14-150400.3.122.1 | Nov 28, 2024 | A Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in SUSE manager allows attackers to execute Javascript code in the organization credentials sub page. This issue affects Container suse/manager/5.0/x86_64/server:5.0.2.7.8. | |
| CVE-2024-49502 | Low | 3.5 | < 4.3.14-150400.3.122.1 | 4.3.14-150400.3.122.1 | Nov 28, 2024 | A Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in the Setup Wizard, HTTP Proxy credentials pane in spacewalk-web allows attackers to attack users by providing specially crafted URLs to click. This issue affects Containe | |
| CVE-2024-47533 | Cri | 9.8 | < 4.3.14-150400.3.122.1 | 4.3.14-150400.3.122.1 | Nov 18, 2024 | Cobbler, a Linux installation server that allows for rapid setup of network installation environments, has an improper authentication vulnerability starting in version 3.0.0 and prior to versions 3.2.3 and 3.3.7. `utils.get_shared_secret()` always returns `-1`, which allows anyon | |
| CVE-2023-34049 | Med | 6.7 | < 4.3.9-150400.3.90.1 | 4.3.9-150400.3.90.1 | Nov 14, 2024 | The Salt-SSH pre-flight option copies the script to the target at a predictable path, which allows an attacker to force Salt-SSH to run their script. If an attacker has access to the target VM and knows the path to the pre-flight script before it runs they can ensure Salt-SSH run | |
| CVE-2024-9476 | Med | — | < 4.3.15.2-150400.3.133.1 | 4.3.15.2-150400.3.133.1 | Nov 13, 2024 | A vulnerability in Grafana Labs Grafana OSS and Enterprise allows Privilege Escalation allows users to gain access to resources from other organizations within the same Grafana instance via the Grafana Cloud Migration Assistant.This vulnerability will only affect users who utiliz | |
| CVE-2024-47535 | — | < 4.3.15.2-150400.3.133.1 | 4.3.15.2-150400.3.133.1 | Nov 12, 2024 | Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application | ||
| CVE-2024-51744 | Low | 3.1 | < 4.3.15.2-150400.3.133.1 | 4.3.15.2-150400.3.133.1 | Nov 4, 2024 | golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors r | |
| CVE-2024-9264 | — | < 4.3.15.2-150400.3.133.1 | 4.3.15.2-150400.3.133.1 | Oct 18, 2024 | The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user wit | ||
| CVE-2023-32189 | Med | 5.9 | < 4.3.11-150400.3.100.1 | 4.3.11-150400.3.100.1 | Oct 16, 2024 | Insecure handling of ssh keys used to bootstrap clients allows local attackers to potentially gain access to the keys | |
| CVE-2024-22232 | Hig | 7.7 | < 4.3.11-150400.3.100.1 | 4.3.11-150400.3.100.1 | Jun 27, 2024 | A specially crafted url can be created which leads to a directory traversal in the salt file server. A malicious user can read an arbitrary file from a Salt master’s filesystem. | |
| CVE-2024-22231 | Med | 5.0 | < 4.3.11-150400.3.100.1 | 4.3.11-150400.3.100.1 | Jun 27, 2024 | Syndic cache directory creation is vulnerable to a directory traversal attack in salt project which can lead a malicious attacker to create an arbitrary directory on a Salt master. | |
| CVE-2023-45288 | Hig | 7.5 | < 4.3.15.2-150400.3.133.1 | 4.3.15.2-150400.3.133.1 | Apr 4, 2024 | An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed Ma | |
| CVE-2023-51775 | — | < 4.3.12-150400.3.108.2 | 4.3.12-150400.3.108.2 | Dec 25, 2023 | The jose4j component before 0.9.4 for Java allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value. | ||
| CVE-2023-22644 | — | < 4.3.6-150400.3.63.2 | 4.3.6-150400.3.63.2 | Sep 20, 2023 | A user can reverse engineer the JWT token (JSON Web Token) used in authentication for Manager and API access, forging a valid NeuVector Token to perform malicious activity in NeuVector. This can lead to an RCE. | ||
| CVE-2022-1415 | — | < 4.3.4-150400.3.43.1 | 4.3.4-150400.3.43.1 | Sep 11, 2023 | A flaw was found where some utility classes in Drools core did not use proper safeguards when deserializing data. This flaw allows an authenticated attacker to construct malicious serialized objects (usually called gadgets) and achieve code execution on the server. |
- affected < 4.3.15.2-150400.3.133.1fixed 4.3.15.2-150400.3.133.1
Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.
- affected < 4.3.15.2-150400.3.133.1fixed 4.3.15.2-150400.3.133.1
Go JOSE provides an implementation of the Javascript Object Signing and Encryption set of standards in Go, including support for JSON Web Encryption (JWE), JSON Web Signature (JWS), and JSON Web Token (JWT) standards. In versions on the 4.x branch prior to version 4.0.5, when par
- affected < 4.3.15.2-150400.3.133.1fixed 4.3.15.2-150400.3.133.1
Grafana is an open-source platform for monitoring and observability. The Grafana Alerting VictorOps integration was not properly protected and could be exposed to users with Viewer permission. Fixed in versions 11.5.0, 11.4.1, 11.3.3, 11.2.6, 11.1.11, 11.0.11 and 10.4.15
- affected < 4.3.15.2-150400.3.133.1fixed 4.3.15.2-150400.3.133.1
When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process's log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and
- affected < 4.3.15.2-150400.3.133.1fixed 4.3.15.2-150400.3.133.1
Applications and libraries which misuse connection.serverAuthenticate (via callback field ServerConfig.PublicKeyCallback) may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that "A call to this function does not guarantee that
- affected < 4.3.14-150400.3.122.1fixed 4.3.14-150400.3.122.1
A Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in SUSE manager allows attackers to execute Javascript code in the organization credentials sub page. This issue affects Container suse/manager/5.0/x86_64/server:5.0.2.7.8.
- affected < 4.3.14-150400.3.122.1fixed 4.3.14-150400.3.122.1
A Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in the Setup Wizard, HTTP Proxy credentials pane in spacewalk-web allows attackers to attack users by providing specially crafted URLs to click. This issue affects Containe
- affected < 4.3.14-150400.3.122.1fixed 4.3.14-150400.3.122.1
Cobbler, a Linux installation server that allows for rapid setup of network installation environments, has an improper authentication vulnerability starting in version 3.0.0 and prior to versions 3.2.3 and 3.3.7. `utils.get_shared_secret()` always returns `-1`, which allows anyon
- affected < 4.3.9-150400.3.90.1fixed 4.3.9-150400.3.90.1
The Salt-SSH pre-flight option copies the script to the target at a predictable path, which allows an attacker to force Salt-SSH to run their script. If an attacker has access to the target VM and knows the path to the pre-flight script before it runs they can ensure Salt-SSH run
- affected < 4.3.15.2-150400.3.133.1fixed 4.3.15.2-150400.3.133.1
A vulnerability in Grafana Labs Grafana OSS and Enterprise allows Privilege Escalation allows users to gain access to resources from other organizations within the same Grafana instance via the Grafana Cloud Migration Assistant.This vulnerability will only affect users who utiliz
- CVE-2024-47535Nov 12, 2024affected < 4.3.15.2-150400.3.133.1fixed 4.3.15.2-150400.3.133.1
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application
- affected < 4.3.15.2-150400.3.133.1fixed 4.3.15.2-150400.3.133.1
golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors r
- CVE-2024-9264Oct 18, 2024affected < 4.3.15.2-150400.3.133.1fixed 4.3.15.2-150400.3.133.1
The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user wit
- affected < 4.3.11-150400.3.100.1fixed 4.3.11-150400.3.100.1
Insecure handling of ssh keys used to bootstrap clients allows local attackers to potentially gain access to the keys
- affected < 4.3.11-150400.3.100.1fixed 4.3.11-150400.3.100.1
A specially crafted url can be created which leads to a directory traversal in the salt file server. A malicious user can read an arbitrary file from a Salt master’s filesystem.
- affected < 4.3.11-150400.3.100.1fixed 4.3.11-150400.3.100.1
Syndic cache directory creation is vulnerable to a directory traversal attack in salt project which can lead a malicious attacker to create an arbitrary directory on a Salt master.
- affected < 4.3.15.2-150400.3.133.1fixed 4.3.15.2-150400.3.133.1
An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed Ma
- CVE-2023-51775Dec 25, 2023affected < 4.3.12-150400.3.108.2fixed 4.3.12-150400.3.108.2
The jose4j component before 0.9.4 for Java allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value.
- CVE-2023-22644Sep 20, 2023affected < 4.3.6-150400.3.63.2fixed 4.3.6-150400.3.63.2
A user can reverse engineer the JWT token (JSON Web Token) used in authentication for Manager and API access, forging a valid NeuVector Token to perform malicious activity in NeuVector. This can lead to an RCE.
- CVE-2022-1415Sep 11, 2023affected < 4.3.4-150400.3.43.1fixed 4.3.4-150400.3.43.1
A flaw was found where some utility classes in Drools core did not use proper safeguards when deserializing data. This flaw allows an authenticated attacker to construct malicious serialized objects (usually called gadgets) and achieve code execution on the server.
Page 2 of 3