<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for release-notes-susemanager, release-notes-susemanager-proxy</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2022:3761-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2022-10-26T08:58:54Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2022-10-26T08:58:54Z</InitialReleaseDate>
    <CurrentReleaseDate>2022-10-26T08:58:54Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for release-notes-susemanager, release-notes-susemanager-proxy</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for release-notes-susemanager, release-notes-susemanager-proxy fixes the following issues:

Release notes for SUSE Manager:

- Update to SUSE Manager 4.3.2
  * Containerized proxy and RBS are now fully supported
  * HTTP API is now fully supported
  * Ubuntu 22.04 is now supported as a client
  * Cobbler has been upgraded to version 3.3.3 which also includes building ISOs with UEFI support
  * pip support has been added for the Salt Bundle  
  * Prometheus exporter for Apache has been upgraded to 0.10.0
  * CVEs fixed: CVE-2021-41411, CVE-2021-42740, CVE-2021-43138, CVE-2022-0860, CVE-2022-31129
  * Bugs mentioned:
    bsc#1191857, bsc#1195624, bsc#1196729, bsc#1197027, bsc#1198168
    bsc#1198903, bsc#1199726, bsc#1200480, bsc#1200573, bsc#1200629
    bsc#1201210, bsc#1201220, bsc#1201260, bsc#1201626, bsc#1201753
    bsc#1201788, bsc#1201913, bsc#1201918, bsc#1202271, bsc#1202272
    bsc#1202367, bsc#1202455, bsc#1202464, bsc#1202602, bsc#1202728
    bsc#1202729, bsc#1202805, bsc#1202899, bsc#1203026, bsc#1203049
    bsc#1203056, bsc#1203169, bsc#1203287, bsc#1203288, bsc#1203385
    bsc#1203406, bsc#1203422, bsc#1203449, bsc#1203478, bsc#1203484
    bsc#1203564, bsc#1203585, bsc#1203611 

Release notes for SUSE Manager Proxy:

- Update to SUSE Manager 4.3.2
  * Containerized proxy and RBS are now fully supported
  * CVEs fixed: CVE-2021-42740, CVE-2021-43138, CVE-2022-31129
  * Bugs mentioned:
    bsc#1198168, bsc#1198903, bsc#1200480, bsc#1201589, bsc#1201788
    bsc#1203287, bsc#1203288, bsc#1203585 
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Container suse/manager/4.3/proxy-httpd:latest-2022-3761,Image SLES15-SP4-Manager-Proxy-4-3-BYOS-2022-3761,Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure-2022-3761,Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2-2022-3761,Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE-2022-3761,Image SLES15-SP4-Manager-Server-4-3-2022-3761,Image SLES15-SP4-Manager-Server-4-3-Azure-llc-2022-3761,Image SLES15-SP4-Manager-Server-4-3-Azure-ltd-2022-3761,Image SLES15-SP4-Manager-Server-4-3-BYOS-2022-3761,Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure-2022-3761,Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2-2022-3761,Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE-2022-3761,Image SLES15-SP4-Manager-Server-4-3-EC2-llc-2022-3761,Image SLES15-SP4-Manager-Server-4-3-EC2-ltd-2022-3761,SUSE-2022-3761,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2022-3761,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.3-2022-3761,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2022-3761</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20223761-1/</URL>
      <Description>Link for SUSE-SU-2022:3761-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2022-October/012707.html</URL>
      <Description>E-Mail link for SUSE-SU-2022:3761-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1191857</URL>
      <Description>SUSE Bug 1191857</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1195624</URL>
      <Description>SUSE Bug 1195624</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1196729</URL>
      <Description>SUSE Bug 1196729</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1197027</URL>
      <Description>SUSE Bug 1197027</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1198168</URL>
      <Description>SUSE Bug 1198168</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1198903</URL>
      <Description>SUSE Bug 1198903</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1199726</URL>
      <Description>SUSE Bug 1199726</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1200480</URL>
      <Description>SUSE Bug 1200480</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1200573</URL>
      <Description>SUSE Bug 1200573</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1200629</URL>
      <Description>SUSE Bug 1200629</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1201210</URL>
      <Description>SUSE Bug 1201210</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1201220</URL>
      <Description>SUSE Bug 1201220</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1201260</URL>
      <Description>SUSE Bug 1201260</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1201589</URL>
      <Description>SUSE Bug 1201589</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1201626</URL>
      <Description>SUSE Bug 1201626</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1201753</URL>
      <Description>SUSE Bug 1201753</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1201788</URL>
      <Description>SUSE Bug 1201788</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1201913</URL>
      <Description>SUSE Bug 1201913</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1201918</URL>
      <Description>SUSE Bug 1201918</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1202271</URL>
      <Description>SUSE Bug 1202271</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1202272</URL>
      <Description>SUSE Bug 1202272</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1202367</URL>
      <Description>SUSE Bug 1202367</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1202455</URL>
      <Description>SUSE Bug 1202455</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1202464</URL>
      <Description>SUSE Bug 1202464</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1202602</URL>
      <Description>SUSE Bug 1202602</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1202728</URL>
      <Description>SUSE Bug 1202728</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1202729</URL>
      <Description>SUSE Bug 1202729</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1202805</URL>
      <Description>SUSE Bug 1202805</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1202899</URL>
      <Description>SUSE Bug 1202899</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1203026</URL>
      <Description>SUSE Bug 1203026</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1203049</URL>
      <Description>SUSE Bug 1203049</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1203056</URL>
      <Description>SUSE Bug 1203056</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1203169</URL>
      <Description>SUSE Bug 1203169</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1203287</URL>
      <Description>SUSE Bug 1203287</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1203288</URL>
      <Description>SUSE Bug 1203288</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1203385</URL>
      <Description>SUSE Bug 1203385</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1203406</URL>
      <Description>SUSE Bug 1203406</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1203422</URL>
      <Description>SUSE Bug 1203422</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1203449</URL>
      <Description>SUSE Bug 1203449</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1203478</URL>
      <Description>SUSE Bug 1203478</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1203484</URL>
      <Description>SUSE Bug 1203484</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1203564</URL>
      <Description>SUSE Bug 1203564</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1203585</URL>
      <Description>SUSE Bug 1203585</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1203611</URL>
      <Description>SUSE Bug 1203611</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-41411/</URL>
      <Description>SUSE CVE CVE-2021-41411 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-42740/</URL>
      <Description>SUSE CVE CVE-2021-42740 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-43138/</URL>
      <Description>SUSE CVE CVE-2021-43138 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0860/</URL>
      <Description>SUSE CVE CVE-2022-0860 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-31129/</URL>
      <Description>SUSE CVE CVE-2022-31129 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Container suse/manager/4.3/proxy-httpd:latest">
      <Branch Type="Product Name" Name="Container suse/manager/4.3/proxy-httpd:latest">
        <FullProductName ProductID="Container suse/manager/4.3/proxy-httpd:latest">Container suse/manager/4.3/proxy-httpd:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Proxy-4-3-BYOS">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Proxy-4-3-BYOS">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Proxy-4-3-BYOS">Image SLES15-SP4-Manager-Proxy-4-3-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure">Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2">Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE">Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Server-4-3">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Server-4-3">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3">Image SLES15-SP4-Manager-Server-4-3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Server-4-3-Azure-llc">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Server-4-3-Azure-llc">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-Azure-llc">Image SLES15-SP4-Manager-Server-4-3-Azure-llc</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Server-4-3-Azure-ltd">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Server-4-3-Azure-ltd">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-Azure-ltd">Image SLES15-SP4-Manager-Server-4-3-Azure-ltd</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Server-4-3-BYOS">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Server-4-3-BYOS">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-BYOS">Image SLES15-SP4-Manager-Server-4-3-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure">Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2">Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE">Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Server-4-3-EC2-llc">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Server-4-3-EC2-llc">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-EC2-llc">Image SLES15-SP4-Manager-Server-4-3-EC2-llc</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Server-4-3-EC2-ltd">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Server-4-3-EC2-ltd">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-EC2-ltd">Image SLES15-SP4-Manager-Server-4-3-EC2-ltd</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Proxy 4.3">
      <Branch Type="Product Name" Name="SUSE Manager Proxy 4.3">
        <FullProductName ProductID="SUSE Manager Proxy 4.3" CPE="cpe:/o:suse:suse-manager-proxy:4.3">SUSE Manager Proxy 4.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Retail Branch Server 4.3">
      <Branch Type="Product Name" Name="SUSE Manager Retail Branch Server 4.3">
        <FullProductName ProductID="SUSE Manager Retail Branch Server 4.3" CPE="cpe:/o:suse:suse-manager-retail-branch-server:4.3">SUSE Manager Retail Branch Server 4.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Server 4.3">
      <Branch Type="Product Name" Name="SUSE Manager Server 4.3">
        <FullProductName ProductID="SUSE Manager Server 4.3" CPE="cpe:/o:suse:suse-manager-server:4.3">SUSE Manager Server 4.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="release-notes-susemanager-proxy-4.3.2-150400.3.9.3">
      <FullProductName ProductID="release-notes-susemanager-proxy-4.3.2-150400.3.9.3">release-notes-susemanager-proxy-4.3.2-150400.3.9.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="release-notes-susemanager-4.3.2-150400.3.15.1">
      <FullProductName ProductID="release-notes-susemanager-4.3.2-150400.3.15.1">release-notes-susemanager-4.3.2-150400.3.15.1</FullProductName>
    </Branch>
    <Relationship ProductReference="release-notes-susemanager-proxy-4.3.2-150400.3.9.3" RelationType="Default Component Of" RelatesToProductReference="Container suse/manager/4.3/proxy-httpd:latest">
      <FullProductName ProductID="Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.2-150400.3.9.3">release-notes-susemanager-proxy-4.3.2-150400.3.9.3 as a component of Container suse/manager/4.3/proxy-httpd:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-proxy-4.3.2-150400.3.9.3" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Proxy-4-3-BYOS">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Proxy-4-3-BYOS:release-notes-susemanager-proxy-4.3.2-150400.3.9.3">release-notes-susemanager-proxy-4.3.2-150400.3.9.3 as a component of Image SLES15-SP4-Manager-Proxy-4-3-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-proxy-4.3.2-150400.3.9.3" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure:release-notes-susemanager-proxy-4.3.2-150400.3.9.3">release-notes-susemanager-proxy-4.3.2-150400.3.9.3 as a component of Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-proxy-4.3.2-150400.3.9.3" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2:release-notes-susemanager-proxy-4.3.2-150400.3.9.3">release-notes-susemanager-proxy-4.3.2-150400.3.9.3 as a component of Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-proxy-4.3.2-150400.3.9.3" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE:release-notes-susemanager-proxy-4.3.2-150400.3.9.3">release-notes-susemanager-proxy-4.3.2-150400.3.9.3 as a component of Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-4.3.2-150400.3.15.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Server-4-3">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3:release-notes-susemanager-4.3.2-150400.3.15.1">release-notes-susemanager-4.3.2-150400.3.15.1 as a component of Image SLES15-SP4-Manager-Server-4-3</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-4.3.2-150400.3.15.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Server-4-3-Azure-llc">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-Azure-llc:release-notes-susemanager-4.3.2-150400.3.15.1">release-notes-susemanager-4.3.2-150400.3.15.1 as a component of Image SLES15-SP4-Manager-Server-4-3-Azure-llc</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-4.3.2-150400.3.15.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Server-4-3-Azure-ltd">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-Azure-ltd:release-notes-susemanager-4.3.2-150400.3.15.1">release-notes-susemanager-4.3.2-150400.3.15.1 as a component of Image SLES15-SP4-Manager-Server-4-3-Azure-ltd</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-4.3.2-150400.3.15.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Server-4-3-BYOS">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-BYOS:release-notes-susemanager-4.3.2-150400.3.15.1">release-notes-susemanager-4.3.2-150400.3.15.1 as a component of Image SLES15-SP4-Manager-Server-4-3-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-4.3.2-150400.3.15.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure:release-notes-susemanager-4.3.2-150400.3.15.1">release-notes-susemanager-4.3.2-150400.3.15.1 as a component of Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-4.3.2-150400.3.15.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2:release-notes-susemanager-4.3.2-150400.3.15.1">release-notes-susemanager-4.3.2-150400.3.15.1 as a component of Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-4.3.2-150400.3.15.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE:release-notes-susemanager-4.3.2-150400.3.15.1">release-notes-susemanager-4.3.2-150400.3.15.1 as a component of Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-4.3.2-150400.3.15.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Server-4-3-EC2-llc">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-EC2-llc:release-notes-susemanager-4.3.2-150400.3.15.1">release-notes-susemanager-4.3.2-150400.3.15.1 as a component of Image SLES15-SP4-Manager-Server-4-3-EC2-llc</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-4.3.2-150400.3.15.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Server-4-3-EC2-ltd">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-EC2-ltd:release-notes-susemanager-4.3.2-150400.3.15.1">release-notes-susemanager-4.3.2-150400.3.15.1 as a component of Image SLES15-SP4-Manager-Server-4-3-EC2-ltd</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-proxy-4.3.2-150400.3.9.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Proxy 4.3">
      <FullProductName ProductID="SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.2-150400.3.9.3">release-notes-susemanager-proxy-4.3.2-150400.3.9.3 as a component of SUSE Manager Proxy 4.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-proxy-4.3.2-150400.3.9.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Retail Branch Server 4.3">
      <FullProductName ProductID="SUSE Manager Retail Branch Server 4.3:release-notes-susemanager-proxy-4.3.2-150400.3.9.3">release-notes-susemanager-proxy-4.3.2-150400.3.9.3 as a component of SUSE Manager Retail Branch Server 4.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-4.3.2-150400.3.15.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Server 4.3">
      <FullProductName ProductID="SUSE Manager Server 4.3:release-notes-susemanager-4.3.2-150400.3.15.1">release-notes-susemanager-4.3.2-150400.3.15.1 as a component of SUSE Manager Server 4.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drools &lt;=7.59.x is affected by an XML External Entity (XXE) vulnerability in KieModuleMarshaller.java. The Validator class is not used correctly, resulting in the XXE injection vulnerability.</Note>
    </Notes>
    <CVE>CVE-2021-41411</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-llc:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-ltd:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-llc:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-ltd:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>SUSE Manager Retail Branch Server 4.3:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>SUSE Manager Server 4.3:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20223761-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-41411.html</URL>
        <Description>CVE-2021-41411</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200629</URL>
        <Description>SUSE Bug 1200629</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The shell-quote package before 1.7.3 for Node.js allows command injection. An attacker can inject unescaped shell metacharacters through a regex designed to support Windows drive letters. If the output of this package is passed to a real shell as a quoted argument to a command with exec(), an attacker can inject arbitrary commands. This is because the Windows drive letter regex character class is {A-z] instead of the correct {A-Za-z]. Several shell metacharacters exist in the space between capital letter Z and lower case letter a, such as the backtick character.</Note>
    </Notes>
    <CVE>CVE-2021-42740</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-llc:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-ltd:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-llc:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-ltd:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>SUSE Manager Retail Branch Server 4.3:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>SUSE Manager Server 4.3:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20223761-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-42740.html</URL>
        <Description>CVE-2021-42740</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203287</URL>
        <Description>SUSE Bug 1203287</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution.</Note>
    </Notes>
    <CVE>CVE-2021-43138</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-llc:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-ltd:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-llc:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-ltd:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>SUSE Manager Retail Branch Server 4.3:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>SUSE Manager Server 4.3:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20223761-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-43138.html</URL>
        <Description>CVE-2021-43138</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200480</URL>
        <Description>SUSE Bug 1200480</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Improper Authorization in GitHub repository cobbler/cobbler prior to 3.3.2.</Note>
    </Notes>
    <CVE>CVE-2022-0860</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-llc:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-ltd:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-llc:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-ltd:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>SUSE Manager Retail Branch Server 4.3:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>SUSE Manager Server 4.3:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20223761-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0860.html</URL>
        <Description>CVE-2022-0860</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1197027</URL>
        <Description>SUSE Bug 1197027</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found to use an inefficient parsing algorithm. Specifically using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried by default) has quadratic (N^2) complexity on specific inputs. Users may notice a noticeable slowdown is observed with inputs above 10k characters. Users who pass user-provided strings without sanity length checks to moment constructor are vulnerable to (Re)DoS attacks. The problem is patched in 2.29.4, the patch can be applied to all affected versions with minimal tweaking. Users are advised to upgrade. Users unable to upgrade should consider limiting date lengths accepted from user input.</Note>
    </Notes>
    <CVE>CVE-2022-31129</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Proxy-4-3-BYOS:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-llc:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-ltd:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-llc:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-ltd:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>SUSE Manager Retail Branch Server 4.3:release-notes-susemanager-proxy-4.3.2-150400.3.9.3</ProductID>
        <ProductID>SUSE Manager Server 4.3:release-notes-susemanager-4.3.2-150400.3.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20223761-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-31129.html</URL>
        <Description>CVE-2022-31129</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203288</URL>
        <Description>SUSE Bug 1203288</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
