SUSE-SU-2024:3267-1: important: Security update for SUSE Manager Client Tools
SLE-SECURITY-UPDATES
null at suse.de
Tue Sep 17 08:32:12 UTC 2024
# Security update for SUSE Manager Client Tools
Announcement ID: SUSE-SU-2024:3267-1
Rating: important
References:
* bsc#1220136
* bsc#1224349
* bsc#1225349
* bsc#1226191
* bsc#1226284
* bsc#1226437
* bsc#1226759
* bsc#1226793
* bsc#1226847
* bsc#1226914
* bsc#1227038
* bsc#1227195
* bsc#1227244
* bsc#1227245
* bsc#1227505
* bsc#1227584
* bsc#1227586
* bsc#1227588
* bsc#1227718
* bsc#1227951
* bsc#1228026
* bsc#1228183
* bsc#1228198
* bsc#1228556
* jsc#MSQA-848
* jsc#PED-3577
Cross-References:
* CVE-2023-45142
* CVE-2024-6104
CVSS scores:
* CVE-2023-45142 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-45142 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-6104 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-6104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Leap 15.3
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15
* SUSE Linux Enterprise Desktop 15 SP1
* SUSE Linux Enterprise Desktop 15 SP2
* SUSE Linux Enterprise Desktop 15 SP3
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15
* SUSE Linux Enterprise High Performance Computing 15 SP1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.0
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP1
* SUSE Linux Enterprise Real Time 15 SP2
* SUSE Linux Enterprise Real Time 15 SP3
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15
* SUSE Linux Enterprise Server 15 SP1
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Client Tools for SLE 15
* SUSE Manager Client Tools for SLE Micro 5
An update that solves two vulnerabilities, contains two features and has 22
security fixes can now be installed.
## Description:
This update fixes the following issues:
golang-github-prometheus-prometheus:
* Security issues fixed:
* CVE-2024-6104: Update go-retryablehttp to version 0.7.7 (bsc#1227038)
* CVE-2023-45142: Updated otelhttp to version 0.46.1 (bsc#1228556)
* Require Go > 1.20 for building
* Migrate from `disabled` to `manual` service mode
* Update to 2.45.6 (jsc#PED-3577):
* Security fixes in dependencies
* Update to 2.45.5:
* [BUGFIX] tsdb/agent: ensure that new series get written to WAL on rollback.
* [BUGFIX] Remote write: Avoid a race condition when applying configuration.
* Update to 2.45.4:
* [BUGFIX] Remote read: Release querier resources before encoding the results.
* Update to 2.45.3:
* [BUGFIX] TSDB: Remove double memory snapshot on shutdown.
* Update to 2.45.2:
* [BUGFIX] TSDB: Fix PostingsForMatchers race with creating new series.
* Update to 2.45.1:
* [ENHANCEMENT] Hetzner SD: Support larger ID's that will be used by Hetzner
in September.
* [BUGFIX] Linode SD: Cast InstanceSpec values to int64 to avoid overflows on
386 architecture.
* [BUGFIX] TSDB: Handle TOC parsing failures.
rhnlib:
* Version 5.0.4-0
* Add the old TLS code for very old traditional clients still on python 2.7
(bsc#1228198)
spacecmd:
* Version 5.0.9-0
* Update translation strings
uyuni-tools:
* Version 0.1.21-0
* mgrpxy: Fix typo on Systemd template
* Version 0.1.20-0
* Update the push tag to 5.0.1
* mgrpxy: expose port on IPv6 network (bsc#1227951)
* Version 0.1.19-0
* Skip updating Tomcat remote debug if conf file is not present
* Version 0.1.18-0
* Setup Confidential Computing container during migration (bsc#1227588)
* Add the /etc/uyuni/uyuni-tools.yaml path to the config help
* Split systemd config files to not loose configuration at upgrade
(bsc#1227718)
* Use the same logic for image computation in mgradm and mgrpxy (bsc#1228026)
* Allow building with different Helm and container default registry paths
(bsc#1226191)
* Fix recursion in mgradm upgrade podman list --help
* Setup hub xmlrpc API service in migration to Podman (bsc#1227588)
* Setup disabled hub xmlrpc API service in all cases (bsc#1227584)
* Clean the inspection code to make it faster
* Properly detect IPv6 enabled on Podman network (bsc#1224349)
* Fix the log file path generation
* Write scripts output to uyuni-tools.log file
* Add uyuni-hubxml-rpc to the list of values in mgradm scale --help
* Use path in mgradm support sql file input (bsc#1227505)
* On Ubuntu build with go1.21 instead of go1.20
* Enforce Cobbler setup (bsc#1226847)
* Expose port on IPv6 network (bsc#1227951)
* show output of podman image search --list-tags command
* Implement mgrpxy support config command
* During migration, ignore /etc/sysconfig/tomcat and /etc/tomcat/tomcat.conf
(bsc#1228183)
* During migration, remove java.annotation,com.sun.xml.bind and
UseConcMarkSweepGC settings
* Disable node exporter port for Kubernetes
* Fix start, stop and restart in Kubernetes
* Increase start timeout in Kubernetes
* Fix traefik query
* Fix password entry usability (bsc#1226437)
* Add --prepare option to migrate command
* Fix random error during installation of CA certificate (bsc#1227245)
* Clarify and fix distro name guessing when not provided (bsc#1226284)
* Replace not working Fatal error by plain error return (bsc#1220136)
* Allow server installation with preexisting storage volumes
* Do not report error when purging mounted volume (bsc#1225349)
* Preserve PAGER settings from the host for interactive sql usage
(bsc#1226914)
* Add mgrpxy command to clear the Squid cache
* Use local images for Confidential Computing and Hub containers (bsc#1227586)
* Version 0.1.17-0
* Allow GPG files to be loaded from the local file (bsc#1227195)
* Version 0.1.16-0
* Prefer local images in all migration steps (bsc#1227244)
* Version 0.1.15-0
* Define --registry flag behaviour (bsc#1226793)
* Version 0.1.14-0
* Do not rely on hardcoded registry, remove any FQDN
* Version 0.1.13-0
* Fix mgradm support config tarball creation (bsc#1226759)
* Version 0.1.12-0
* Detection of k8s on Proxy was wrongly influenced by Server setting
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3267=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3267=1
* SUSE Manager Client Tools for SLE 15
zypper in -t patch SUSE-SLE-Manager-Tools-15-2024-3267=1
* SUSE Manager Client Tools for SLE Micro 5
zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2024-3267=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* spacecmd-5.0.9-150000.3.124.1
* openSUSE Leap 15.6 (noarch)
* spacecmd-5.0.9-150000.3.124.1
* SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64)
* mgrctl-debuginfo-0.1.21-150000.1.8.2
* mgrctl-0.1.21-150000.1.8.2
* firewalld-prometheus-config-0.1-150000.3.56.1
* golang-github-prometheus-prometheus-2.45.6-150000.3.56.1
* SUSE Manager Client Tools for SLE 15 (noarch)
* mgrctl-bash-completion-0.1.21-150000.1.8.2
* python3-rhnlib-5.0.4-150000.3.46.1
* mgrctl-zsh-completion-0.1.21-150000.1.8.2
* mgrctl-lang-0.1.21-150000.1.8.2
* spacecmd-5.0.9-150000.3.124.1
* SUSE Manager Client Tools for SLE Micro 5 (aarch64 s390x x86_64)
* mgrctl-debuginfo-0.1.21-150000.1.8.2
* mgrctl-0.1.21-150000.1.8.2
* SUSE Manager Client Tools for SLE Micro 5 (noarch)
* mgrctl-bash-completion-0.1.21-150000.1.8.2
* mgrctl-lang-0.1.21-150000.1.8.2
* mgrctl-zsh-completion-0.1.21-150000.1.8.2
## References:
* https://www.suse.com/security/cve/CVE-2023-45142.html
* https://www.suse.com/security/cve/CVE-2024-6104.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220136
* https://bugzilla.suse.com/show_bug.cgi?id=1224349
* https://bugzilla.suse.com/show_bug.cgi?id=1225349
* https://bugzilla.suse.com/show_bug.cgi?id=1226191
* https://bugzilla.suse.com/show_bug.cgi?id=1226284
* https://bugzilla.suse.com/show_bug.cgi?id=1226437
* https://bugzilla.suse.com/show_bug.cgi?id=1226759
* https://bugzilla.suse.com/show_bug.cgi?id=1226793
* https://bugzilla.suse.com/show_bug.cgi?id=1226847
* https://bugzilla.suse.com/show_bug.cgi?id=1226914
* https://bugzilla.suse.com/show_bug.cgi?id=1227038
* https://bugzilla.suse.com/show_bug.cgi?id=1227195
* https://bugzilla.suse.com/show_bug.cgi?id=1227244
* https://bugzilla.suse.com/show_bug.cgi?id=1227245
* https://bugzilla.suse.com/show_bug.cgi?id=1227505
* https://bugzilla.suse.com/show_bug.cgi?id=1227584
* https://bugzilla.suse.com/show_bug.cgi?id=1227586
* https://bugzilla.suse.com/show_bug.cgi?id=1227588
* https://bugzilla.suse.com/show_bug.cgi?id=1227718
* https://bugzilla.suse.com/show_bug.cgi?id=1227951
* https://bugzilla.suse.com/show_bug.cgi?id=1228026
* https://bugzilla.suse.com/show_bug.cgi?id=1228183
* https://bugzilla.suse.com/show_bug.cgi?id=1228198
* https://bugzilla.suse.com/show_bug.cgi?id=1228556
* https://jira.suse.com/browse/MSQA-848
* https://jira.suse.com/browse/PED-3577
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20240917/2b550711/attachment.htm>
More information about the sle-security-updates
mailing list