SUSE-SU-2023:4758-1: important: Security update for SUSE Manager 4.3.10 Release Notes

null at suse.de null at suse.de
Wed Dec 13 12:33:17 UTC 2023



# Security update for SUSE Manager 4.3.10 Release Notes

Announcement ID: SUSE-SU-2023:4758-1  
Rating: important  
References:

  * bsc#1191143
  * bsc#1204235
  * bsc#1207012
  * bsc#1207532
  * bsc#1210928
  * bsc#1210930
  * bsc#1211355
  * bsc#1211560
  * bsc#1211649
  * bsc#1212695
  * bsc#1212904
  * bsc#1213469
  * bsc#1214186
  * bsc#1214471
  * bsc#1214601
  * bsc#1214759
  * bsc#1215209
  * bsc#1215514
  * bsc#1215949
  * bsc#1216030
  * bsc#1216041
  * bsc#1216085
  * bsc#1216128
  * bsc#1216380
  * bsc#1216506
  * bsc#1216555
  * bsc#1216690
  * bsc#1216754
  * bsc#1217038
  * bsc#1217223
  * bsc#1217224
  * jsc#MSQA-708

  
Cross-References:

  * CVE-2023-22644

  
CVSS scores:

  * CVE-2023-22644 ( NVD ):  3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N

  
Affected Products:

  * openSUSE Leap 15.4
  * SUSE Manager Proxy 4.3
  * SUSE Manager Retail Branch Server 4.3
  * SUSE Manager Server 4.3

  
  
An update that solves one vulnerability, contains one feature and has 30
security fixes can now be installed.

## Security update for SUSE Manager Proxy and Retail Branch Server 4.3

### Description:

This update fixes the following issues:

release-notes-susemanager-proxy:

  * Update to SUSE Manager 4.3.10
  * Bugs mentioned: bsc#1216506, bsc#1216754

## Security update for SUSE Manager Server 4.3

### Description:

This update fixes the following issues:

release-notes-susemanager:

  * Update to SUSE Manager 4.3.10
  * SUSE Linux Enterprise Server Micro 5.5 support
  * CLM filter by package build date
  * Enhanced Errata.getDetails API endpoint
  * CVEs fixed: CVE-2023-22644
  * Bugs mentioned: bsc#1191143, bsc#1204235, bsc#1207012, bsc#1207532,
    bsc#1210928, bsc#1210930, bsc#1211355, bsc#1211560, bsc#1211649,
    bsc#1212695, bsc#1212904, bsc#1213469, bsc#1214186, bsc#1214471,
    bsc#1214601, bsc#1214759, bsc#1215209, bsc#1215514, bsc#1215949,
    bsc#1216030, bsc#1216041, bsc#1216085, bsc#1216128, bsc#1216380,
    bsc#1216506, bsc#1216555, bsc#1216690, bsc#1216754, bsc#1217038,
    bsc#1217223, bsc#1217224

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * openSUSE Leap 15.4  
    zypper in -t patch SUSE-2023-4758=1

  * SUSE Manager Proxy 4.3  
    zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2023-4758=1

  * SUSE Manager Retail Branch Server 4.3  
    zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2023-4758=1

  * SUSE Manager Server 4.3  
    zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2023-4758=1

## Package List:

  * openSUSE Leap 15.4 (noarch)
    * release-notes-susemanager-4.3.10-150400.3.93.1
    * release-notes-susemanager-proxy-4.3.10-150400.3.72.1
  * SUSE Manager Proxy 4.3 (noarch)
    * release-notes-susemanager-proxy-4.3.10-150400.3.72.1
  * SUSE Manager Retail Branch Server 4.3 (noarch)
    * release-notes-susemanager-proxy-4.3.10-150400.3.72.1
  * SUSE Manager Server 4.3 (noarch)
    * release-notes-susemanager-4.3.10-150400.3.93.1

## References:

  * https://www.suse.com/security/cve/CVE-2023-22644.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1191143
  * https://bugzilla.suse.com/show_bug.cgi?id=1204235
  * https://bugzilla.suse.com/show_bug.cgi?id=1207012
  * https://bugzilla.suse.com/show_bug.cgi?id=1207532
  * https://bugzilla.suse.com/show_bug.cgi?id=1210928
  * https://bugzilla.suse.com/show_bug.cgi?id=1210930
  * https://bugzilla.suse.com/show_bug.cgi?id=1211355
  * https://bugzilla.suse.com/show_bug.cgi?id=1211560
  * https://bugzilla.suse.com/show_bug.cgi?id=1211649
  * https://bugzilla.suse.com/show_bug.cgi?id=1212695
  * https://bugzilla.suse.com/show_bug.cgi?id=1212904
  * https://bugzilla.suse.com/show_bug.cgi?id=1213469
  * https://bugzilla.suse.com/show_bug.cgi?id=1214186
  * https://bugzilla.suse.com/show_bug.cgi?id=1214471
  * https://bugzilla.suse.com/show_bug.cgi?id=1214601
  * https://bugzilla.suse.com/show_bug.cgi?id=1214759
  * https://bugzilla.suse.com/show_bug.cgi?id=1215209
  * https://bugzilla.suse.com/show_bug.cgi?id=1215514
  * https://bugzilla.suse.com/show_bug.cgi?id=1215949
  * https://bugzilla.suse.com/show_bug.cgi?id=1216030
  * https://bugzilla.suse.com/show_bug.cgi?id=1216041
  * https://bugzilla.suse.com/show_bug.cgi?id=1216085
  * https://bugzilla.suse.com/show_bug.cgi?id=1216128
  * https://bugzilla.suse.com/show_bug.cgi?id=1216380
  * https://bugzilla.suse.com/show_bug.cgi?id=1216506
  * https://bugzilla.suse.com/show_bug.cgi?id=1216555
  * https://bugzilla.suse.com/show_bug.cgi?id=1216690
  * https://bugzilla.suse.com/show_bug.cgi?id=1216754
  * https://bugzilla.suse.com/show_bug.cgi?id=1217038
  * https://bugzilla.suse.com/show_bug.cgi?id=1217223
  * https://bugzilla.suse.com/show_bug.cgi?id=1217224
  * https://jira.suse.com/browse/MSQA-708

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20231213/50c12b08/attachment.htm>


More information about the sle-security-updates mailing list