<div class="container">
    <h1>Security Beta update for SUSE Manager Client Tools and Salt</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2024:0196-1</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>moderate</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1172110">bsc#1172110</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1176460">bsc#1176460</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1180816">bsc#1180816</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1180942">bsc#1180942</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1181119">bsc#1181119</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1181935">bsc#1181935</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1183684">bsc#1183684</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1187725">bsc#1187725</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1188061">bsc#1188061</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1188571">bsc#1188571</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1189520">bsc#1189520</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1191454">bsc#1191454</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1192154">bsc#1192154</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1192383">bsc#1192383</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1192696">bsc#1192696</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1192763">bsc#1192763</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1193492">bsc#1193492</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1193686">bsc#1193686</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1193688">bsc#1193688</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1197507">bsc#1197507</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1198903">bsc#1198903</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1199810">bsc#1199810</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1200142">bsc#1200142</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1200480">bsc#1200480</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1200591">bsc#1200591</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1200968">bsc#1200968</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1200970">bsc#1200970</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1201003">bsc#1201003</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1201059">bsc#1201059</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1201535">bsc#1201535</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1201539">bsc#1201539</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1202614">bsc#1202614</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1202945">bsc#1202945</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1203283">bsc#1203283</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1203596">bsc#1203596</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1203597">bsc#1203597</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1203599">bsc#1203599</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1204032">bsc#1204032</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1204126">bsc#1204126</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1204302">bsc#1204302</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1204303">bsc#1204303</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1204304">bsc#1204304</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1204305">bsc#1204305</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1204501">bsc#1204501</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1205207">bsc#1205207</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1205225">bsc#1205225</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1205227">bsc#1205227</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1205599">bsc#1205599</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1205759">bsc#1205759</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1207352">bsc#1207352</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1207749">bsc#1207749</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1207750">bsc#1207750</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1207830">bsc#1207830</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208046">bsc#1208046</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208049">bsc#1208049</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208060">bsc#1208060</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208062">bsc#1208062</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208065">bsc#1208065</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208270">bsc#1208270</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208293">bsc#1208293</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208298">bsc#1208298</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208612">bsc#1208612</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208692">bsc#1208692</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208719">bsc#1208719</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208819">bsc#1208819</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208821">bsc#1208821</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208965">bsc#1208965</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209113">bsc#1209113</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209645">bsc#1209645</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210458">bsc#1210458</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210640">bsc#1210640</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210907">bsc#1210907</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211525">bsc#1211525</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212099">bsc#1212099</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212100">bsc#1212100</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212279">bsc#1212279</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212641">bsc#1212641</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218843">bsc#1218843</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218844">bsc#1218844</a>
                        </li>
                    
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/MSQA-718">jsc#MSQA-718</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-2145">jsc#PED-2145</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-2617">jsc#PED-2617</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-3576">jsc#PED-3576</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-3694">jsc#PED-3694</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-4556">jsc#PED-4556</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-5405">jsc#PED-5405</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-5406">jsc#PED-5406</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/SLE-23422">jsc#SLE-23422</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/SLE-23439">jsc#SLE-23439</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/SLE-23631">jsc#SLE-23631</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/SLE-24133">jsc#SLE-24133</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/SLE-24565">jsc#SLE-24565</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/SLE-24791">jsc#SLE-24791</a>
                        </li>
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2020-7753.html">CVE-2020-7753</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2021-20178.html">CVE-2021-20178</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2021-20180.html">CVE-2021-20180</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2021-20191.html">CVE-2021-20191</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2021-20228.html">CVE-2021-20228</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2021-3447.html">CVE-2021-3447</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2021-3583.html">CVE-2021-3583</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2021-3620.html">CVE-2021-3620</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2021-36222.html">CVE-2021-36222</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2021-3711.html">CVE-2021-3711</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2021-3807.html">CVE-2021-3807</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2021-3918.html">CVE-2021-3918</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2021-41174.html">CVE-2021-41174</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2021-41244.html">CVE-2021-41244</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2021-43138.html">CVE-2021-43138</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2021-43798.html">CVE-2021-43798</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2021-43813.html">CVE-2021-43813</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2021-43815.html">CVE-2021-43815</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-0155.html">CVE-2022-0155</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-23552.html">CVE-2022-23552</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-27664.html">CVE-2022-27664</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-29170.html">CVE-2022-29170</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-31097.html">CVE-2022-31097</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-31107.html">CVE-2022-31107</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-31123.html">CVE-2022-31123</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-31130.html">CVE-2022-31130</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-32149.html">CVE-2022-32149</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-35957.html">CVE-2022-35957</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-36062.html">CVE-2022-36062</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-39201.html">CVE-2022-39201</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-39229.html">CVE-2022-39229</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-39306.html">CVE-2022-39306</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-39307.html">CVE-2022-39307</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-39324.html">CVE-2022-39324</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-41715.html">CVE-2022-41715</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-41723.html">CVE-2022-41723</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-46146.html">CVE-2022-46146</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-0507.html">CVE-2023-0507</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-0594.html">CVE-2023-0594</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-1387.html">CVE-2023-1387</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-1410.html">CVE-2023-1410</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-2183.html">CVE-2023-2183</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-2801.html">CVE-2023-2801</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-3128.html">CVE-2023-3128</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2020-7753</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-20178</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-20178</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-20180</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-20180</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-20191</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-20191</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-20228</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-20228</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-3447</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-3447</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-3583</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.6</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-3583</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-3620</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-3620</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-36222</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-36222</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-3711</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">9.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-3711</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">9.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-3807</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-3807</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-3807</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-3918</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">8.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-3918</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">9.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-41174</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.9</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-41174</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.9</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-41244</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">9.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-41244</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.2</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-43138</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-43138</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-43798</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-43798</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-43813</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-43813</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-43815</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-43815</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-0155</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-23552</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-23552</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-27664</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-27664</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-29170</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.6</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-29170</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">8.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-31097</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-31097</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">8.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-31107</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-31107</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-31123</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-31123</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-31130</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-31130</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-32149</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-32149</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-35957</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.6</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-35957</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.6</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-36062</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-36062</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.6</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-39201</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-39201</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-39229</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-39229</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-39306</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-39306</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-39307</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-39307</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-39324</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-39324</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-41715</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.2</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-41715</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-41723</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-41723</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-46146</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">8.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-46146</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">8.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-0507</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-0507</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-0594</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-0594</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1387</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.2</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1387</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.2</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1410</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1410</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.2</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-2183</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-2183</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-2801</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-2801</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3128</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">9.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3128</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">9.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">openSUSE Leap 15.3</li>
                    
                        <li class="list-group-item">openSUSE Leap 15.4</li>
                    
                        <li class="list-group-item">openSUSE Leap 15.5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.0</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Manager Client Tools Beta for SLE 15</li>
                    
                        <li class="list-group-item">SUSE Manager Client Tools Beta for SLE Micro 5</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves 44 vulnerabilities, contains 14 features and has 35 security fixes can now be installed.</p>

    


    
        <h2>Description:</h2>
    
    <p>This update fixes the following issues:</p>
<p>ansible:</p>
<ul>
<li>Update to version 2.9.27 (jsc#SLE-23631) (jsc#SLE-24133)</li>
<li>bsc#1187725 CVE-2021-3620 ansible-connection module discloses sensitive
    info in traceback error message (in 2.9.27)</li>
<li>bsc#1188061 CVE-2021-3583 Template Injection through yaml multi-line
    strings with ansible facts used in template. (in 2.9.23)</li>
<li>bsc#1176460 gh#ansible/ansible#72094 ansible module nmcli is broken in
    ansible 2.9.13 (in 2.9.15)</li>
<li>Update to 2.9.22:</li>
<li>CVE-2021-3447 (bsc#1183684) multiple modules expose secured values </li>
<li>CVE-2021-20228 (bsc#1181935) basic.py no_log with fallback option</li>
<li>CVE-2021-20191 (bsc#1181119) multiple collections exposes secured values</li>
<li>CVE-2021-20180 (bsc#1180942) bitbucket_pipeline_variable exposes sensitive values</li>
<li>CVE-2021-20178 (bsc#1180816) user data leak in snmp_facts module</li>
</ul>
<p>dracut-saltboot:</p>
<ul>
<li>Update to version 0.1.1681904360.84ef141 </li>
<li>Load network configuration even when missing protocol version
    (bsc#1210640)</li>
<li>Update to verion 0.1.1674034019.a93ff61</li>
<li>Install copied wicked config as client.xml (bsc#1205599)</li>
<li>Update to version 0.1.1673279145.e7616bd</li>
<li>Add failsafe stop file when salt-minion does not stop (bsc#1172110)</li>
<li>Copy existing wicked config instead of generating new (bsc#1205599)</li>
<li>Update to version 0.1.1665997480.587fa10</li>
<li>Add dependencies on xz and gzip to support compressed images</li>
<li>Update to version 0.1.1661440542.6cbe0da</li>
<li>Use standard susemanager.conf</li>
<li>Move image services to dracut-saltboot package</li>
<li>Use salt bundle</li>
<li>Require e2fsprogs (bsc#1202614)</li>
<li>Update to version 0.1.1657643023.0d694ce</li>
<li>Update dracut-saltboot dependencies (bsc#1200970)</li>
<li>Fix network loading when ipappend is used in pxe config</li>
<li>Add new information messages</li>
</ul>
<p>golang-github-QubitProducts-exporter_exporter:</p>
<ul>
<li>Remove license file from %doc</li>
<li>Exclude s390 arch </li>
<li>Adapted to build on Enterprise Linux.</li>
<li>Fix build for RedHat 7</li>
<li>Require Go >= 1.14 also for CentOS</li>
<li>Add support for CentOS</li>
<li>Replace %{?systemd_requires} with %{?systemd_ordering}</li>
</ul>
<p>golang-github-boynux-squid_exporter:</p>
<ul>
<li>Exclude s390 architecture (gh#SUSE/spacewalk#19050)</li>
<li>Enhanced to build on Enterprise Linux 8.</li>
</ul>
<p>golang-github-lusitaniae-apache_exporter:</p>
<ul>
<li>Do not strip if SUSE Linux Enterprise 15 SP3</li>
<li>Exclude debug for RHEL >= 8</li>
<li>Build with Go >= 1.20 when the OS is not RHEL</li>
<li>Spec file clean up</li>
<li>Fix apparmor profile for SLE 12</li>
<li>Do not build with apparmor profile for SLE 12</li>
<li>Upgrade to version 1.0.0 (jsc#PED-5405)</li>
<li>Improved flag parsing</li>
<li>Added support for custom headers</li>
<li>Build with Go 1.19</li>
<li>Build using promu</li>
<li>Add _service file</li>
<li>Fix sandboxing options</li>
<li>Upgrade to version 0.13.4</li>
<li>Fix denial of service vulnerability
    (CVE-2022-32149, bsc#1204501)</li>
<li>Upgrade to version 0.13.3</li>
<li>Fix uncontrolled resource consumption
    (CVE-2022-41723, bsc#1208270)</li>
<li>Upgrade to version 0.13.1</li>
<li>Fix panic caused by missing flagConfig options</li>
<li>Upgrade to version 0.13.0</li>
<li>Fix authentication bypass vulnarability
    (CVE-2022-46146, bsc#1208046)</li>
<li>Corrected comment in AppArmor profile</li>
<li>Added AppArmor profile</li>
<li>Added sandboxing options to systemd service unit</li>
<li>Exclude s390 architecture (gh#SUSE/spacewalk#19050)</li>
<li>Update to upstream release 0.11.0 (jsc#SLE-24791)</li>
<li>Add TLS support</li>
<li>Switch to logger, please check --log.level and --log.format
    flags</li>
<li>Update to version 0.10.1</li>
<li>Bugfix: Reset ProxyBalancer metrics on each scrape to
    remove stale data</li>
<li>Update to version 0.10.0</li>
<li>Add Apache Proxy and other metrics</li>
<li>Update to version 0.8.0</li>
<li>Change commandline flags</li>
<li>Add metrics: Apache version, request duration total</li>
<li>Adapted to build on Enterprise Linux 8</li>
<li>Require building with Go 1.15</li>
<li>Add support for RedHat 8</li>
<li>Adjust dependencies on spec file </li>
<li>Disable dwarf compression in go build</li>
<li>Add support for Red Hat</li>
<li>Add %license macro for LICENSE file </li>
</ul>
<p>golang-github-prometheus-prometheus:</p>
<ul>
<li>Update to 2.45.0 (jsc#PED-5406):</li>
<li>[FEATURE] API: New limit parameter to limit the number of items
    returned by <code>/api/v1/status/tsdb</code> endpoint. </li>
<li>[FEATURE] Config: Add limits to global config. </li>
<li>[FEATURE] Consul SD: Added support for <code>path_prefix</code>. </li>
<li>[FEATURE] Native histograms: Add option to scrape both classic
    and native histograms. </li>
<li>[FEATURE] Native histograms: Added support for two more
    arithmetic operators <code>avg_over_time</code> and <code>sum_over_time</code>.</li>
<li>[FEATURE] Promtool: When providing the block id, only one block
    will be loaded and analyzed. </li>
<li>[FEATURE] Remote-write: New Azure ad configuration to support
    remote writing directly to Azure Monitor workspace. </li>
<li>[FEATURE] TSDB: Samples per chunk are now configurable with
    flag <code>storage.tsdb.samples-per-chunk</code>. By default set to its
    former value 120. </li>
<li>[ENHANCEMENT] Native histograms: bucket size can now be limited
    to avoid scrape fails. </li>
<li>[ENHANCEMENT] TSDB: Dropped series are now deleted from the WAL
    sooner. </li>
<li>[BUGFIX] Native histograms: ChunkSeries iterator now checks if
    a new sample can be appended to the open chunk. </li>
<li>[BUGFIX] Native histograms: Fix Histogram Appender
    <code>Appendable()</code> segfault. </li>
<li>[BUGFIX] Native histograms: Fix setting reset header to gauge
    histograms in seriesToChunkEncoder. </li>
<li>[BUGFIX] TSDB: Tombstone intervals are not modified after Get()
    call. </li>
<li>[BUGFIX] TSDB: Use path/filepath to set the WAL directory.</li>
<li>Update to 2.44.0:</li>
<li>[FEATURE] Remote-read: Handle native histograms. </li>
<li>[FEATURE] Promtool: Health and readiness check of prometheus
    server in CLI. </li>
<li>[FEATURE] PromQL: Add <code>query_samples_total</code> metric, the total
    number of samples loaded by all queries.</li>
<li>[ENHANCEMENT] Storage: Optimise buffer used to iterate through
    samples.</li>
<li>[ENHANCEMENT] Scrape: Reduce memory allocations on target
    labels.</li>
<li>[ENHANCEMENT] PromQL: Use faster heap method for <code>topk()</code> /
    <code>bottomk()</code>.</li>
<li>[ENHANCEMENT] Rules API: Allow filtering by rule name.</li>
<li>[ENHANCEMENT] Native Histograms: Various fixes and
    improvements.</li>
<li>[ENHANCEMENT] UI: Search of scraping pools is now
    case-insensitive.</li>
<li>[ENHANCEMENT] TSDB: Add an affirmative log message for
    successful WAL repair.</li>
<li>[BUGFIX] TSDB: Block compaction failed when shutting down.</li>
<li>[BUGFIX] TSDB: Out-of-order chunks could be ignored if the
    write-behind log was deleted.</li>
<li>Update to 2.43.1</li>
<li>[BUGFIX] Labels: Set() after Del() would be ignored, which
    broke some relabeling rules.</li>
<li>Update to 2.43.0:</li>
<li>[FEATURE] Promtool: Add HTTP client configuration to query
    commands.</li>
<li>[FEATURE] Scrape: Add <code>include_scrape_configs</code> to include
    scrape configs from different files.</li>
<li>[FEATURE] HTTP client: Add <code>no_proxy</code> to exclude URLs from
    proxied requests.</li>
<li>[FEATURE] HTTP client: Add <code>proxy_from_enviroment</code> to read
    proxies from env variables.</li>
<li>[ENHANCEMENT] API: Add support for setting lookback delta per
    query via the API.</li>
<li>[ENHANCEMENT] API: Change HTTP status code from 503/422 to 499
    if a request is canceled.</li>
<li>[ENHANCEMENT] Scrape: Allow exemplars for all metric types.</li>
<li>[ENHANCEMENT] TSDB: Add metrics for head chunks and WAL folders
    size.</li>
<li>[ENHANCEMENT] TSDB: Automatically remove incorrect snapshot
    with index that is ahead of WAL.</li>
<li>[ENHANCEMENT] TSDB: Improve Prometheus parser error outputs to
    be more comprehensible.</li>
<li>[ENHANCEMENT] UI: Scope <code>group by</code> labels to metric in
    autocompletion.</li>
<li>[BUGFIX] Scrape: Fix
    <code>prometheus_target_scrape_pool_target_limit</code> metric not set
    before reloading.</li>
<li>[BUGFIX] TSDB: Correctly update
    <code>prometheus_tsdb_head_chunks_removed_total</code> and
    <code>prometheus_tsdb_head_chunks</code> metrics when reading WAL.</li>
<li>[BUGFIX] TSDB: Use the correct unit (seconds) when recording
    out-of-order append deltas in the
    <code>prometheus_tsdb_sample_ooo_delta</code> metric.</li>
<li>Update to 2.42.0:
  This release comes with a bunch of feature coverage for native
  histograms and breaking changes.
  If you are trying native histograms already, we recommend you
  remove the <code>wal</code> directory when upgrading.
  Because the old WAL record for native histograms is not
  backward compatible in v2.42.0, this will lead to some data
  loss for the latest data.
  Additionally, if you scrape "float histograms" or use recording
  rules on native histograms in v2.42.0 (which writes float
  histograms), it is a one-way street since older versions do not
  support float histograms.</li>
<li>[CHANGE] <strong>breaking</strong> TSDB: Changed WAL record format for the
    experimental native histograms.</li>
<li>[FEATURE] Add &#x27;keep_firing_for&#x27; field to alerting rules.</li>
<li>[FEATURE] Promtool: Add support of selecting timeseries for
    TSDB dump.</li>
<li>[ENHANCEMENT] Agent: Native histogram support.</li>
<li>[ENHANCEMENT] Rules: Support native histograms in recording
    rules.</li>
<li>[ENHANCEMENT] SD: Add container ID as a meta label for pod
    targets for Kubernetes.</li>
<li>[ENHANCEMENT] SD: Add VM size label to azure service
    discovery.</li>
<li>[ENHANCEMENT] Support native histograms in federation.</li>
<li>[ENHANCEMENT] TSDB: Add gauge histogram support.</li>
<li>[ENHANCEMENT] TSDB/Scrape: Support FloatHistogram that
    represents buckets as float64 values.</li>
<li>[ENHANCEMENT] UI: Show individual scrape pools on /targets
    page.</li>
<li>Update to 2.41.0:</li>
<li>[FEATURE] Relabeling: Add keepequal and dropequal relabel
    actions.</li>
<li>[FEATURE] Add support for HTTP proxy headers. </li>
<li>[ENHANCEMENT] Reload private certificates when changed on disk.</li>
<li>[ENHANCEMENT] Add max_version to specify maximum TLS version in
    tls_config.</li>
<li>[ENHANCEMENT] Add goos and goarch labels to
    prometheus_build_info.</li>
<li>[ENHANCEMENT] SD: Add proxy support for EC2 and LightSail SDs.</li>
<li>[ENHANCEMENT] SD: Add new metric
    prometheus_sd_file_watcher_errors_total.</li>
<li>[ENHANCEMENT] Remote Read: Use a pool to speed up marshalling.</li>
<li>[ENHANCEMENT] TSDB: Improve handling of tombstoned chunks in
    iterators.</li>
<li>[ENHANCEMENT] TSDB: Optimize postings offset table reading.</li>
<li>[BUGFIX] Scrape: Validate the metric name, label names, and
    label values after relabeling.</li>
<li>[BUGFIX] Remote Write receiver and rule manager: Fix error
    handling.</li>
<li>Update to 2.40.7:</li>
<li>[BUGFIX] TSDB: Fix queries involving negative buckets of native
    histograms.</li>
<li>Update to 2.40.5:</li>
<li>[BUGFIX] TSDB: Fix queries involving native histograms due to
    improper reset of iterators.</li>
<li>Update to 2.40.3:</li>
<li>[BUGFIX] TSDB: Fix compaction after a deletion is called.</li>
<li>Update to 2.40.2:</li>
<li>[BUGFIX] UI: Fix black-on-black metric name color in dark mode.</li>
<li>Update to 2.40.1:</li>
<li>[BUGFIX] TSDB: Fix alignment for atomic int64 for 32 bit
    architecture.</li>
<li>[BUGFIX] Scrape: Fix accept headers.</li>
<li>Update to 2.40.0:</li>
<li>[FEATURE] Add experimental support for native histograms.
    Enable with the flag --enable-feature=native-histograms.</li>
<li>[FEATURE] SD: Add service discovery for OVHcloud.</li>
<li>[ENHANCEMENT] Kubernetes SD: Use protobuf encoding.</li>
<li>[ENHANCEMENT] TSDB: Use golang.org/x/exp/slices for improved
    sorting speed.</li>
<li>[ENHANCEMENT] Consul SD: Add enterprise admin partitions. Adds
    __meta_consul_partition label. Adds partition config in
    consul_sd_config.</li>
<li>[BUGFIX] API: Fix API error codes for /api/v1/labels and
    /api/v1/series.</li>
<li>Update to 2.39.1:</li>
<li>[BUGFIX] Rules: Fix notifier relabel changing the labels on
    active alerts.</li>
<li>Update to 2.39.0:</li>
<li>[FEATURE] experimental TSDB: Add support for ingesting
    out-of-order samples. This is configured via
    out_of_order_time_window field in the config file; check config
    file docs for more info.</li>
<li>[ENHANCEMENT] API: /-/healthy and /-/ready API calls now also
    respond to a HEAD request on top of existing GET support.</li>
<li>[ENHANCEMENT] PuppetDB SD: Add __meta_puppetdb_query label.</li>
<li>[ENHANCEMENT] AWS EC2 SD: Add __meta_ec2_region label.</li>
<li>[ENHANCEMENT] AWS Lightsail SD: Add __meta_lightsail_region
    label.</li>
<li>[ENHANCEMENT] Scrape: Optimise relabeling by re-using memory.</li>
<li>[ENHANCEMENT] TSDB: Improve WAL replay timings.</li>
<li>[ENHANCEMENT] TSDB: Optimise memory by not storing unnecessary
    data in the memory.</li>
<li>[ENHANCEMENT] TSDB: Allow overlapping blocks by default.
    --storage.tsdb.allow-overlapping-blocks now has no effect.</li>
<li>[ENHANCEMENT] UI: Click to copy label-value pair from query
    result to clipboard.</li>
<li>[BUGFIX] TSDB: Turn off isolation for Head compaction to fix a
    memory leak.</li>
<li>[BUGFIX] TSDB: Fix &#x27;invalid magic number 0&#x27; error on Prometheus
    startup.</li>
<li>[BUGFIX] PromQL: Properly close file descriptor when logging
    unfinished queries.</li>
<li>[BUGFIX] Agent: Fix validation of flag options and prevent WAL
    from growing more than desired.</li>
<li>Update to 2.38.0:</li>
<li>[FEATURE]: Web: Add a /api/v1/format_query HTTP API endpoint
    that allows pretty-formatting PromQL expressions.</li>
<li>[FEATURE]: UI: Add support for formatting PromQL expressions in
    the UI.</li>
<li>[FEATURE]: DNS SD: Support MX records for discovering targets.</li>
<li>[FEATURE]: Templates: Add toTime() template function that
    allows converting sample timestamps to Go time.Time values.</li>
<li>[ENHANCEMENT]: Kubernetes SD: Add
    __meta_kubernetes_service_port_number meta label indicating the
    service port number.
    __meta_kubernetes_pod_container_image meta label indicating the
    container image.</li>
<li>[ENHANCEMENT]: PromQL: When a query panics, also log the query
    itself alongside the panic message.</li>
<li>[ENHANCEMENT]: UI: Tweak colors in the dark theme to improve
    the contrast ratio.</li>
<li>[ENHANCEMENT]: Web: Speed up calls to /api/v1/rules by avoiding
    locks and using atomic types instead.</li>
<li>[ENHANCEMENT]: Scrape: Add a no-default-scrape-port feature
    flag, which omits or removes any default HTTP (:80) or HTTPS
    (:443) ports in the target&#x27;s scrape address.</li>
<li>[BUGFIX]: TSDB: In the WAL watcher metrics, expose the
    type="exemplar" label instead of type="unknown" for exemplar
    records.</li>
<li>[BUGFIX]: TSDB: Fix race condition around allocating series IDs
    during chunk snapshot loading.</li>
<li>Remove npm_licenses.tar.bz2 during "make clean"</li>
<li>Remove web-ui archives during "make clean".</li>
<li>Require promu >= 0.14.0 for building</li>
<li>Drop:</li>
<li>Upgrade to version 2.37.6</li>
<li>Require Go 1.19</li>
<li>Upgrade to version 2.37.5</li>
<li>[SECURITY] Security upgrade from go and upstream dependencies
    that include security fixes to the net/http and os packages.</li>
<li>Upgrade to version 2.37.4</li>
<li>[SECURITY] Fix basic authentication bypass vulnerability
    (CVE-2022-46146, bsc#1208049, jsc#PED-3576).</li>
<li>Upgrade to version 2.37.3</li>
<li>[BUGFIX] Update our regexp library to fix upstream
    CVE-2022-41715.</li>
<li>Upgrade to version 2.37.2</li>
<li>Upgrade to version 2.37.1</li>
<li>[BUGFIX] Properly close file descriptor when logging unfinished
    queries.</li>
<li>[BUGFIX] TSDB: In the WAL watcher metrics, expose the</li>
<li>Upgrade to version 2.37.0</li>
<li>[FEATURE] Nomad SD: New service discovery for Nomad built-in
    service discovery.</li>
<li>[ENHANCEMENT] Kubernetes SD: Allow attaching node labels for
    endpoint role.</li>
<li>[ENHANCEMENT] PromQL: Optimise creation of signature
    with/without labels.</li>
<li>[ENHANCEMENT] TSDB: Memory optimizations.</li>
<li>[ENHANCEMENT] TSDB: Reduce sleep time when reading WAL.</li>
<li>[ENHANCEMENT] OAuth2: Add appropriate timeouts and User-Agent
    header.</li>
<li>[BUGFIX] Alerting: Fix Alertmanager targets not being updated
    when alerts were queued.</li>
<li>[BUGFIX] Hetzner SD: Make authentication files relative to
    Prometheus config file.</li>
<li>[BUGFIX] Promtool: Fix promtool check config not erroring
    properly on failures.</li>
<li>[BUGFIX] Scrape: Keep relabeled scrape interval and timeout on
    reloads.</li>
<li>[BUGFIX] TSDB: Don&#x27;t increment
    prometheus_tsdb_compactions_failed_total when context is
    canceled.</li>
<li>[BUGFIX] TSDB: Fix panic if series is not found when deleting
    series.</li>
<li>[BUGFIX] TSDB: Increase
    prometheus_tsdb_mmap_chunk_corruptions_total on out of sequence
    errors.</li>
<li>[BUGFIX] Uyuni SD: Make authentication files relative to
    Prometheus configuration file and fix default configuration
    values.</li>
<li>Upgrade to version 2.36.2</li>
<li>[BUGFIX] Fix serving of static assets like fonts and favicon.</li>
<li>Upgrade to version 2.36.1</li>
<li>[BUGFIX] promtool: Add --lint-fatal option.</li>
<li>Upgrade to version 2.36.0</li>
<li>[FEATURE] Add lowercase and uppercase relabel action.</li>
<li>[FEATURE] SD: Add IONOS Cloud integration.</li>
<li>[FEATURE] SD: Add Vultr integration.</li>
<li>[FEATURE] SD: Add Linode SD failure count metric.</li>
<li>[FEATURE] Add prometheus_ready metric.</li>
<li>[ENHANCEMENT] Add stripDomain to template function.</li>
<li>[ENHANCEMENT] UI: Enable active search through dropped targets.</li>
<li>[ENHANCEMENT] promtool: support matchers when querying label</li>
<li>[ENHANCEMENT] Add agent mode identifier.</li>
<li>[BUGFIX] Changing TotalQueryableSamples from int to int64.</li>
<li>[BUGFIX] tsdb/agent: Ignore duplicate exemplars.</li>
<li>[BUGFIX] TSDB: Fix chunk overflow appending samples at a
    variable rate.</li>
<li>[BUGFIX] Stop rule manager before TSDB is stopped.</li>
<li>Upgrade to version 2.35.0</li>
<li>[CHANGE] TSDB: Delete *.tmp WAL files when Prometheus starts.</li>
<li>[CHANGE] promtool: Add new flag --lint (enabled by default) for
    the commands check rules and check config, resulting in a new
    exit code (3) for linter errors.</li>
<li>[FEATURE] Support for automatically setting the variable
    GOMAXPROCS to the container CPU limit. Enable with the flag
    --enable-feature=auto-gomaxprocs.</li>
<li>[FEATURE] PromQL: Extend statistics with total and peak number
    of samples in a query. Additionally, per-step statistics are
    available with --enable-feature=promql-per-step-stats and using
    stats=all in the query API. Enable with the flag
    --enable-feature=per-step-stats.</li>
<li>[ENHANCEMENT] TSDB: more efficient sorting of postings read from
    WAL at startup.</li>
<li>[ENHANCEMENT] Azure SD: Add metric to track Azure SD failures.</li>
<li>[ENHANCEMENT] Azure SD: Add an optional resource_group
    configuration.</li>
<li>[ENHANCEMENT] Kubernetes SD: Support discovery.k8s.io/v1
    EndpointSlice (previously only discovery.k8s.io/v1beta1
    EndpointSlice was supported).</li>
<li>[ENHANCEMENT] Kubernetes SD: Allow attaching node metadata to
    discovered pods.</li>
<li>[ENHANCEMENT] OAuth2: Support for using a proxy URL to fetch
    OAuth2 tokens.</li>
<li>[ENHANCEMENT] Configuration: Add the ability to disable HTTP2.</li>
<li>[ENHANCEMENT] Config: Support overriding minimum TLS version.</li>
<li>[BUGFIX] Kubernetes SD: Explicitly include gcp auth from k8s.io.</li>
<li>[BUGFIX] Fix OpenMetrics parser to sort uppercase labels
    correctly.</li>
<li>[BUGFIX] UI: Fix scrape interval and duration tooltip not
    showing on target page.</li>
<li>[BUGFIX] Tracing/GRPC: Set TLS credentials only when insecure is
    false.</li>
<li>[BUGFIX] Agent: Fix ID collision when loading a WAL with
    multiple segments.</li>
<li>[BUGFIX] Remote-write: Fix a deadlock between Batch and flushing
    the queue.</li>
<li>Upgrade to version 2.34.0</li>
<li>[CHANGE] UI: Classic UI removed.</li>
<li>[CHANGE] Tracing: Migrate from Jaeger to OpenTelemetry based
    tracing.</li>
<li>[ENHANCEMENT] TSDB: Disable the chunk write queue by default and
    allow configuration with the experimental flag
    --storage.tsdb.head-chunks-write-queue-size.</li>
<li>[ENHANCEMENT] HTTP SD: Add a failure counter.</li>
<li>[ENHANCEMENT] Azure SD: Set Prometheus User-Agent on requests.</li>
<li>[ENHANCEMENT] Uyuni SD: Reduce the number of logins to Uyuni.</li>
<li>[ENHANCEMENT] Scrape: Log when an invalid media type is
    encountered during a scrape.</li>
<li>[ENHANCEMENT] Scrape: Accept
    application/openmetrics-text;version=1.0.0 in addition to
    version=0.0.1.</li>
<li>[ENHANCEMENT] Remote-read: Add an option to not use external
    labels as selectors for remote read.</li>
<li>[ENHANCEMENT] UI: Optimize the alerts page and add a search bar.</li>
<li>[ENHANCEMENT] UI: Improve graph colors that were hard to see.</li>
<li>[ENHANCEMENT] Config: Allow escaping of $ with $$ when using
    environment variables with external labels.</li>
<li>[BUGFIX] PromQL: Properly return an error from
    histogram_quantile when metrics have the same labelset.</li>
<li>[BUGFIX] UI: Fix bug that sets the range input to the
    resolution.</li>
<li>[BUGFIX] TSDB: Fix a query panic when
    memory-snapshot-on-shutdown is enabled.</li>
<li>[BUGFIX] Parser: Specify type in metadata parser errors.</li>
<li>[BUGFIX] Scrape: Fix label limit changes not applying.</li>
<li>Upgrade to version 2.33.5</li>
<li>[BUGFIX] Remote-write: Fix deadlock between adding to queue and
     getting batch.</li>
<li>Upgrade to version 2.33.4</li>
<li>[BUGFIX] TSDB: Fix panic when m-mapping head chunks onto the
    disk.</li>
<li>Upgrade to version 2.33.3</li>
<li>[BUGFIX] Azure SD: Fix a regression when public IP Address isn&#x27;t
    set.</li>
<li>Upgrade to version 2.33.2</li>
<li>[BUGFIX] Azure SD: Fix panic when public IP Address isn&#x27;t set.</li>
<li>[BUGFIX] Remote-write: Fix deadlock when stopping a shard.</li>
<li>Upgrade to version 2.33.1</li>
<li>[BUGFIX] SD: Fix no such file or directory in K8s SD when not
    running inside K8s.</li>
<li>Upgrade to version 2.33.0</li>
<li>[CHANGE] PromQL: Promote negative offset and @ modifer to stable
    features.</li>
<li>[CHANGE] Web: Promote remote-write-receiver to stable.</li>
<li>[FEATURE] Config: Add stripPort template function.</li>
<li>[FEATURE] Promtool: Add cardinality analysis to check metrics,
    enabled by flag --extended.</li>
<li>[FEATURE] SD: Enable target discovery in own K8s namespace.</li>
<li>[FEATURE] SD: Add provider ID label in K8s SD.</li>
<li>[FEATURE] Web: Add limit field to the rules API.</li>
<li>[ENHANCEMENT] Remote-write: Avoid allocations by buffering
    concrete structs instead of interfaces.</li>
<li>[ENHANCEMENT] Remote-write: Log time series details for
    out-of-order samples in remote write receiver.</li>
<li>[ENHANCEMENT] Remote-write: Shard up more when backlogged.</li>
<li>[ENHANCEMENT] TSDB: Use simpler map key to improve exemplar
    ingest performance.</li>
<li>[ENHANCEMENT] TSDB: Avoid allocations when popping from the
    intersected postings heap.</li>
<li>[ENHANCEMENT] TSDB: Make chunk writing non-blocking, avoiding
    latency spikes in remote-write.</li>
<li>[ENHANCEMENT] TSDB: Improve label matching performance.</li>
<li>[ENHANCEMENT] UI: Optimize the service discovery page and add a search bar.</li>
<li>[ENHANCEMENT] UI: Optimize the target page and add a search bar.</li>
<li>[BUGFIX] Promtool: Make exit codes more consistent.</li>
<li>[BUGFIX] Promtool: Fix flakiness of rule testing.</li>
<li>[BUGFIX] Remote-write: Update
    prometheus_remote_storage_queue_highest_sent_timestamp_seconds
    metric when write irrecoverably fails.</li>
<li>[BUGFIX] Storage: Avoid panic in BufferedSeriesIterator.</li>
<li>[BUGFIX] TSDB: CompactBlockMetas should produce correct
    mint/maxt for overlapping blocks.</li>
<li>[BUGFIX] TSDB: Fix logging of exemplar storage size.</li>
<li>[BUGFIX] UI: Fix overlapping click targets for the alert state
    checkboxes.</li>
<li>[BUGFIX] UI: Fix Unhealthy filter on target page to actually
    display only Unhealthy targets.</li>
<li>[BUGFIX] UI: Fix autocompletion when expression is empty.</li>
<li>[BUGFIX] TSDB: Fix deadlock from simultaneous GC and write.</li>
<li>Fix authentication bypass by updating Prometheus Exporter Toolkit
  to version 0.7.3 (CVE-2022-46146, bsc#1208049)</li>
<li>Fix uncontrolled resource consumption by updating Go to version
  1.20.1 (CVE-2022-41723, bsc#1208298)</li>
<li>Restructure the spec to build web assets online</li>
<li>Makefile</li>
</ul>
<p>grafana:</p>
<ul>
<li>Update to version 9.5.8:</li>
<li>Features and enhancements
    GenericOAuth: Set sub as auth id</li>
<li>Bug fixes:
    DataSourceProxy: Fix url validation error handling</li>
<li>Update to version 9.5.7:
    Alerting: Sort NumberCaptureValues in EvaluationString
    Alerting: Improve performance of matching captures
    Alerting: No longer silence paused alerts during legacy
              migration
    Alerting: Remove and revert flag alertingBigTransactions
    Alerting: Migrate unknown NoData\Error settings to the default
    Tracing: supply Grafana build version
    Tempo: Escape regex-sensitive characters in span name before
           building promql query
    Plugins: Only configure plugin proxy transport once
    Alerting: Fix unique violation when updating rule group with
              title chains/cycles
    Prometheus: Version detect bug
    Prometheus: Fix heatmap format with no data
    Database: Change getExistingDashboardByTitleAndFolder to get
              dashboard by title, not slug 
    Alerting: Convert &#x27;Both&#x27; type Prometheus queries to &#x27;Range&#x27; in
    SQLStore: Fix Postgres dialect treating "false" migrator
              default as true
    Alerting: Support newer http_config struct
    InfluxDB: Interpolate retention policies
    StatusHistory: Fix rendering of value-mapped null
    Alerting: Fix provenance guard checks for Alertmanager
              configuration to not cause panic when compared nested
              objects
    AnonymousAuth: Fix concurrent read-write crash
    AzureMonitor: Ensure legacy properties containing template
                  variables are correctly migrated
    Explore: Remove data source onboarding page
    Dashboard: Re-align Save form
    Azure Monitor: Fix bug that did not show alert rule preview
    Histogram: Respect min/max panel settings for x-axis
    Heatmap: Fix color rendering for value ranges < 1
    Heatmap: Handle unsorted timestamps in calculate mode
    Google Cloud Monitor: Fix mem usage for dropdown
    AzureMonitor: Fix logs query multi-resource and timespan values
    Utils: Reimplement util.GetRandomString to avoid modulo bias
    Alerting: Fix matching labels with spaces in their values
    Dashboard: Fix applying timezone to datetime variables
    Dashboard: Fix panel description event triggering every time
               panel is rendered
    Tempo: Fix get label values based on CoreApp type
    Heatmap: Fix log scale editor
    Dashboard: Fix disappearing panel when viewed panel is
               refreshed
    Prometheus: Fix bug in creating autocomplete queries with
                labels
    Prometheus: Fix Query Inspector expression range value
    Alerting: Fix migration failing if alert_configuration table is
              not empty
    InfluxDB: Fix querying retention policies on flux mode</li>
<li>Update to version 9.5.6:</li>
<li>Bug fixes
    Dashboard: Fix library panels in collapsed rows not getting
               updated
    Auth: Add and document option for enabling email lookup</li>
<li>Update to version 9.5.5:
    Security: Fix authentication bypass using Azure AD OAuth
              (bsc#1212641, CVE-2023-3128, jsc#PED-3694).
    Auth: Show invite button if disable login form is set to false.
    Azure: Fix Kusto auto-completion for Azure datasources.
    RBAC: Remove legacy AC editor and admin role on new dashboard
          route.
    API: Revert allowing editors to access GET /datasources. 
    Settings: Add ability to override skip_org_role_sync with Env
              variables.</li>
<li>Update to version 9.5.3:
    Query: Prevent crash while executing concurrent mixed queries
           (bsc#1212099, CVE-2023-2801).
    Alerting: Require alert.notifications:write permissions to test
              receivers and templates (bsc#1212100, CVE-2023-2183).</li>
<li>Update to version 9.5.2:
    Alerting: Scheduler use rule fingerprint instead of version.
    Explore: Update table min height.
    DataLinks: Encoded URL fixed.
    TimeSeries: Fix leading null-fill for missing intervals.
    Dashboard: Revert fixed header shown on mobile devices in the
               new panel header.
    PostgreSQL: Fix TLS certificate issue by downgrading lib/pq.
    Provisioning: Fix provisioning issues with legacy alerting and
                  data source permissions.
    Alerting: Fix misleading status code in provisioning API.
    Loki: Fix log samples using <code>instant</code> queries.
    Panel Header: Implement new Panel Header on Angular Panels.
    Azure Monitor: Fix bug that was not showing resources for
                   certain locations.
    Alerting: Fix panic when reparenting receivers to groups
              following an attempted rename via Provisioning.
    Cloudwatch Logs: Clarify Cloudwatch Logs Limits.</li>
<li>Update to 9.5.1
    Loki Variable Query Editor: Fix bug when the query is updated
    Expressions: Fix expression load with legacy UID -100</li>
<li>Update to 9.5.0 (CVE-2023-1387, bsc#1210907, jsc#PED-3694)</li>
<li>Breaking changes<ul>
<li>default named retention policies won&#x27;t be used to query.
  Users who have a default named retention policy in their
  influxdb database, have to rename it to something else.
  Having default named retention policy is not breaking
  anything. We will make sure to use the actual default
  retention policy under the hood. To change the hardcoded
  retention policy in the dashboard.json, users must they
  select the right retention policy from dropdown and save the
  panel/dashboard.</li>
<li>Grafana Alerting rules with NoDataState configuration set to
  Alerting will now respect "For" duration.</li>
<li>Users who use LDAP role sync to only sync Viewer, Editor and
  Admin roles, but grant Grafana Server Admin role manually
  will not be able to do that anymore. After this change, LDAP
  role sync will override any manual changes to Grafana Server
  Admin role assignments. If grafana_admin is left unset in
  LDAP role mapping configuration, it will default to false.
API keys: Add deprecation to api keys.
API: Enable serving Swagger UI by default and add docs and
     guidelines.
API: Permit Cache-Control (browser caching) for datasource
     resources.
Accessibility: Make row actions keyboard accessible.
Admin/Plugins: Set category filter in connections link.
Alerting: Add CustomDetails field in PagerDuty contact point.
Alerting: Add dashboard and panel links to rule and instance
          annotations.
Alerting: Add filter and remove funcs for custom labels and
Alerting: Add fuzzy search to alert list view.
Alerting: Add metrics for active receiver and integrations.
Alerting: Better printing of labels.
Alerting: Create new state history "fanout" backend that
          dispatches to multiple other backends at once.
Alerting: Enable preview for recording rules.
Alerting: Fetch all applied alerting configurations.
Alerting: Introduce proper feature toggles for common state
          history backend combinations.
Alerting: Make time range query parameters not required when
          querying Loki.
Alerting: New notification policies view.
Alerting: No longer index state history log streams by
          instance labels.
Alerting: Respect "For" Duration for NoData alerts.
Alerting: Support filtering rules by multiple datasources.
Alerting: Switch to snappy-compressed-protobuf for outgoing
          push requests to Loki.
Angular: Prevent angular from loading when disabled.
Auth: Add Generic oauth skip org role sync setting.
Auth: Add feature flag to move token rotation to client.
Auth: Show user sync external Authentication status.
Backend: Use sdk version 0.148.0.
Chore: Add stat for remote cache config.
Chore: Replace short UID generation with more standard UUIDs.
Chore: Use DOMPurify to sanitize strings rather than js-xss.
CloudMonitoring: Add possibility to use path for private key.
CloudWatch Logs: Update default timeout to 30m.
CloudWatch: Add AWS/IotSiteWise namespace and metrics.
CloudWatch: Add account support to variable queries.
CloudWatch: Make deeplinks work for us-gov and china regions.
Cloudwatch: Add MeteredIOBytes metric for EFS.
Command Palette: Display dashboard location.
Command palette: Enable folder searching.
Connections: Turn on feature toggle by default.
Cookies: Provide a mechanism for per user control over cookies.
Dashboard Datasource: Update Query List & Improve UX.
Dashboard: Add a feature that creates a table panel when a
           spreadsheet file is dropped on the dashboard.
Dashboard: Add new visualization/row/library panel/pasted
           panel is now a dropdown menu.
Dashboard: Add value format for requests per minute.
Dashboard: Empty/No Panels dashboard with a new design.
Dashboard: When dashboard is not found show message instead
           of empty page.
Dashboards: Enable feature flag newPanelChromeUI by default.
Dataplane: Support timeSeriesLong without transform.
Datasources: Add user_agent header customization for outgoing
             HTTP requests.
Datasources: Use getDefaultQuery in annotations editors.
Docs: Add documentation on how to debug backend plugins.
Docs: Deprecate dashboard previews.
Elasticsearch: Detect Elasticsearch version.
Elasticsearch: Run Explore queries trough data source backend.
Explore: Add range option to internal data links.
Explore: Add transformations to correlation data links.
Explore: Support mixed data sources for supplementary query.
Extensions: Expose an enum for available placements.
Feat: Changing link destination for get more plugins.
Feat: Linking to plugin details page rather than externally
      for new datasources.
FieldMatchers: Add match by value (reducer).
Flame graph: Add context menu.
Flame graph: Add metadata above flame graph.
Geomap: Improve tooltip url for photos layer.
Geomap: Release night / day layer.
InfluxDB: Move database information into jsondata.
Jaeger and Zipkin: Config & docs upgrade.
LDAP: Allow setting minimum TLS version and accepted ciphers.
Live: Remove (alpha) ability to configure live pipelines.
Logger: Add feature toggle for errors in HTTP request logs.
Login: Allow custom name and icon for social providers.
Logs Panel: Refactor style generation to improve rendering
            performance.
Logs: Add millisecond to timestamp in log line.
Logs: Rename dedup to deduplicate.
Loki Query Editor: Make Monaco the default editor.
Loki: Add unpack query builder hint.
Loki: Add descriptions to query builder operations.
Loki: Add placeholder to the loki query editor.
Loki: Always fetch for new label keys in the QueryBuilder.
Loki: Display error with label filter conflicts.
Loki: Improve the display of loki query stats.
MSSQL/Postgres: List views in table dropdown as well.
MSSQL: Update forked go-mssqldb dependency.
Metrics: Update comment to mention folders instead of
         dashboards.
Navigation: Enable new navigation by default.
NodeGraph: Support icons for nodes.
Notifications: Enable display of trace ID by default.
Packaging: Start Grafana service after InfluxDB.
Panel Header: Add CancelQuery option to panel header.
Panel: Show multiple errors info in the inspector.
PanelChrome: Add option to show actions on the right side
             (actions = leftItems).
Phlare: Allow variables in labelSelector (in query).
Plugin: Skip preloading disabled app plugins.
Plugins: Add optional logger for plugin requests sent to backend
         plugins.
Plugins: Extend panel menu with commands from plugins.
Plugins: Extend panel menu with links from plugins.
Plugins: Improve instrumentation by adding metrics and tracing.
Plugins: Support for distributed tracing in backend plugins SDK.
Plugins: Support for link extensions.
Profiling: Enable flame graph & Phlare/Parca data sources for
           all users.
Prometheus Datasource: Improve Prom query variable editor.
Prometheus Metrics: Add missing stat_total_teams metric.
Prometheus/Loki: Run query explicitly instead of onblur in panel
                 edit.
Prometheus: Browser resource caching.
Prometheus: Improve prometheus query variable editor.
Prometheus: Use $__rate_interval for rate queries generated by
            metric browser.
Pubdash: Email sharing handle dashboard deleted.
PublicDashboards: Backfills share column with default value.
PublicDashboards: Configuration modal redesign.
PublicDashboards: Email sharing.
PublicDashboards: Enable creation when dashboard has template
                  variables.
PublicDashboards: Paused or deleted public dashboard screen.
QueryHistory: Improve handling of mixed datasource entries.
Rendering: Experimental support to use JWTs as auth method.
SQL Datasources: Add back help content.
Schema: Remove exclusion for timeseries and update imports.
Search: Improvements for starred dashboard search.
Select: Show icon in the grafana/ui Select component.
Service accounts: Creation logic simplification.
Service accounts: Remove Add API keys buttons and remove one
                  state of migrating for API keys tab.
SplitOpen: Update API to accept multiple queries.
Stat Panel: Add an option for a non-gradient/solid background.
Stat: Add ability to remove default single-color background
      gradient.
SupportBundles: Add OAuth bundle collectors.
Table Panel: Add ability to use text color for value or hide
             value in gauge cell.
Table: Introduce sparkline cell type.
Tempo: Config and doc updates.
Tempo: Update service graph view and docs.
TraceView: Add key and url escaping of json tag values.
TraceView: Reworked header.
Tracing: Add more detail to HTTP Outgoing Request.
Tracing: Docs and config improvements for Tempo/Jaeger/Zipkin.
Tracing: Support multiple OTel propagators.
Transformations: Support time format when converting time to
                 strings.
Transformers: Support adding the row index using calculate
              field transformer.
Units: Format currency with negative before the symbol.
API: Fix "Updated by" Column in dashboard versions table.
AccessControl: Allow editors to access GET /api/datasources.
Alerting: Add "backend" label to state history writes metrics.
Alerting: Add alert instance labels to Loki log lines in
          addition to stream labels.
Alerting: Elide requests to Loki if nothing should be recorded.
Alerting: Fix DatasourceUID and RefID missing for
          DatasourceNoData alerts.
Alerting: Fix ambiguous handling of equals in labels when
          bucketing Loki state history streams.
Alerting: Fix attachment of external labels to Loki state
          history log streams.
Alerting: Fix creating a recording rule when having multiple
          datasources.
Alerting: Fix explore link in alert detail view.
Alerting: Fix share URL for Prometheus rules on subpath.
Alerting: Fix stats that display alert count when using unified
          alerting.
Alerting: Hide mute timing actions when dealing with vanilla
          prometheus.
Alerting: Paginate result previews.
Alerting: Prometheus-compatible Alertmanager timings editor.
Alerting: Update scheduler to get updates only from database.
Alerting: Use a completely isolated context for state history
          writes.
Alerting: Use displayNameFromDS if available in preview.
Annotation List: Fix panel not updating when variable is
                 changed.
Annotations: Ignore unique constraint violations for tags.
Auth: Fix orgrole picker disabled if isSynced user.
AzureMonitor: Fix Log Analytics portal links.
BrowseDashboards: Fix move to General folder not working.
Catalog: Show install error with incompatible version.
Chore: Update Grafana to use Alertmanager
       v0.25.1-0.20230308154952-78fedf89728b.
CloudMonitoring: Add project selector for MQL editor[fix].
CloudWatch Logs: Fix running logs queries with expressions.
CloudWatch Logs: Fix to make log queries use a relative time if
                 available.
CloudWatch Logs: Revert "Queries in an expression should run
                 synchronously".
CloudWatch: Fix cachedQueries insights not being updated for
            metric queries.
Cloudwatch: Pass refId from query for expression queries.
Dashboards: Evaluate provisioned dashboard titles in a
            backwards compatible way.
Dashboards: Fix broken internal data links.
Database: Don&#x27;t sleep 10ms before every request.
Elasticsearch: Fix processing of response with multiple group
               by for alerting.
Elasticsearch: Handle multiple annotation structures.
Email: Mark HTML comments as "safe" in email templates.
ErrorHandling: Fixes issues with bad error messages.
ErrorView: Better detection of no-data responses.
Explore: Make DataSourcePicker visible on small screens.
Fix: DataLinks from data sources override user defined data
     link.
Fix: Top table rendering and update docs.
Frontend: Fix broken links in /plugins when pathname has a
          trailing slash.
Geomap: Fix route layer zoom behavior.
Google Cloud Monitoring: Fix project variable.
HeatMap: Sort y buckets when all bucket names are numeric.
InfluxDB: Fix querying with hardcoded retention policy.
InfluxDB: Fix sending retention policy with InfluxQL queries.
KVStore: Include database field in migration.
LDAP: Always synchronize Server Admin role through role sync if
      role sync is enabled.
Library panels: Ensure pagination controls are always correctly
                displayed.
Loki: Fix autocomplete situations with multiple escaped quotes.
MegaMenu: Fixes mega menu showing scroll indicator when it
          shouldn&#x27;t.
Navigation: Redirect to root page when switching organization.
Navigation: Scrolled hamburger menu links now navigate correctly
            in Safari.
NestedFolders: Fix nested folder deletion.
New Panel Header: Fix when clicking submenu item the parent
                  menu item onClick get&#x27;s triggered.
Phlare: Fix error when there are no profileTypes to send from
        backend.
PieChart: Show long labels properly.
PluginExtensions: Fixed issue with incorrect type being
                  exposed when configuring an extension.
Plugins: Ensure proxy route bodies are valid JSON.
Plugins: Fix width for README pages with tables.
Plugins: Markdown fetch retry with lowercase.
Plugins: Skip instrumenting plugin build info for core and
         bundled plugins.
PublicDashboards: Query collapsed panels inside rows.
Query Splitting: Fix for handling queries with no requestId.
SQL Datasources: Fix variable throwing error if query returns no
                 data.
SQL Datasources: Prevent Call Stack Overflows with Large
                 Numbers of Values for Variable.
SQLStore: Fix SQLite error propagation if query retries are
          disabled.
Stat Panel: Fix issue with clipping text values.
Table Panel: Fix panel migration for options cell type.
Table: Fix migrations from old angular table for cell color
       modes.
Table: Fixes issue with pagination summary causing scrollbar.
Table: Fixes table panel gauge alignment.
TablePanel: Fix table cells overflowing when there are
            multiple data links.
TablePanel: fix footer bug; no footer calculated values after
            "hidden" column override.
Templating: Allow percent encoding of variable with custom all.
Tempo: Set default limit if none is provided for traceql
       queries.
TimeSeries: Don&#x27;t extend stepped interpolation to graph edges.
TimeSeries: Improve stacking direction heuristic.
Trace View: Update the queryType to traceql for checking if
            same trace when clicking span link.
TraceView: Don&#x27;t require preferredVisualisationType to render.
Utils: Reimplement util.GetRandomString to avoid modulo bias.
XYChart: Add all dataset columns in tooltip.</li>
</ul>
</li>
<li>Plugin development fixes & changes
    DateTimePicker: Can now select time correctly.
    Grafana UI: Fix tooltip prop of button component.
    DateTimePicker: Add min date support to calendar.
    GrafanaUI: Implement new component Toggletip.
    ContextMenu: Fix padding and show border based on items.</li>
<li>Update to 9.4.7 (2023-03-16)
    Alerting: Update scheduler to receive rule updates only from
              database.
    Influxdb: Re-introduce backend migration feature toggle.
    Security: Fixes for CVE-2023-1410.
    The InfluxDB backend migration feature toggle
    (influxdbBackendMigration) has been reintroduced in this
    version as issues were discovered with backend processing of
    InfluxDB data. Unless this feature toggle is enabled, all
    InfluxDB data will be parsed in the frontend. This frontend
    processing is the default behavior.
    In Grafana 9.4.4, InfluxDB data parsing started to be handled
    in the backend. If you have upgraded to 9.4.4 and then added
    new transformations on InfluxDB data, those panels will fail to
    render. To resolve this either:
    Remove the affected panel and re-create it or
    edit the <code>time</code> field as <code>Time</code> in <code>panel.json</code> or
    <code>dashboard.json</code>
  as the exporter toolkit has been updated by upstream</li>
<li>Install wrapper scripts under /usr/sbin</li>
<li>Install actual binaries under /usr/libexec/grafana (or /usr/lib
  under older distributions) and create a simlink for wrapper
  scripts and the service (which expect the binary to be under
  /usr/share/grafana/bin)</li>
<li>Update to 9.4.3
    Alerting: Use background context for maintenance function.</li>
<li>Update to 9.4.2
    Alerting: Fix boolean default in migration from false to 0.</li>
<li>Update to 9.4.0
    Alerting: Add endpoint for querying state history.
    Alerting: Add label query parameters to state history endpoint.
    Alerting: Add static label to all state history entries.
    Alerting: Mark AM configuration as applied.
    Azure Monitor: Enable multiple resource queries.
    Query Caching: Add per-panel query caching TTL.
    Table: Add row number column option.
    Tempo: Remove tempoApmTable feature flag.
    Transformations: Selectively apply transformation to queries.
    AccessControl: Clear user permission cache for update org user
                   role.
    Alerting: Fix handling of special floating-point cases
              when writing observed values to annotations.
    Auth: Rotate token patch.
    ContextMenu: Consider y coord when determining bottom
                 collision.
    Elasticsearch: Fix consistent label order in alerting.
    Explore: Fix graph not updating when changing config.
    Heatmap: Support heatmap rows with non-timeseries X axis.
    Login: Fix panic when a user is upserted by a background
           process.
    MSSQL: Add support for macro function calls.
    MySQL: Quote identifiers that include special characters.
    Navigation: Sign in button now works correctly when
                served under a sub path.
    Nested Folder: Fix for SQLite not to overwrite the parent on
                   restarts.
    PanelChrome: Adds display mode to support transparent option.
    Plugins: Case-sensitive routes for standalone pages.
    Plugins: Prefer to use the data source UID when querying.
    SQLStore: Fix folder migration for MySQL < 5.7.
    Search: Fix not being able to clear sort value.
    Tempo: Fix span name being dropped from the query.
    PanelChrome: Implement hover header.</li>
<li>Update to 9.3.7
    Alerting: Validate that tags are 100 characters or less.
    Expressions: Fixes the issue showing expressions editor.
    Logs: Fix stats not being updated when log results change.
    Plugins: Fix circular reference in customOptions leading
             to MarshalJSON errors.
    Time Series Panel: Fix legend text selection in Firefox.</li>
<li>Update to 9.3.6
    QueryEditorRow: Fixes issue loading query editor when
                    data source variable selected.</li>
<li>Update to 9.3.4
    Prometheus: Add default editor configuration.
    TextPanel: Refactor to functional component.
    Alerting: Fix webhook to use correct key for decrypting token.
    Alerting: Set error annotation on EvaluationError regardless of
              underlying error type.
    Datasources: Fix Proxy by UID Failing for UIDs with a Hyphen.
    Fix creating of span link with no tags.
    Elasticsearch: Fix failing requests when using SigV4.
    Elasticsearch: Fix toggle-settings are not shown correctly.
    Explore: Be sure time range key bindings are mounted after
             clear.
    Explore: Unsync time ranges when a pane is closed.
    Logs: Lines with long words do not break properly.
    Loki: Fix misaligned derived fields settings.
    Query Builder: Fix max width of input component to prevent
                   overflows.
    Search: Auto focus input elements.
    Search: Fix empty folder message showing when by starred
            dashboards.
    Table Panel: Fix image of image cell overflowing table cell and
                 cells ignoring text alignment setting when a data
                 link is added.</li>
<li>Update to 9.3.2
    Graphite: Process multiple queries to Graphite plugin.
    API: Fix delete user failure due to quota not enabled.
    Accessibility: Improved keyboard accessibility in BarGauge.
    Accessibility: Improved keyboard accessibility in BigValue.
    Alerting: Use the QuotaTargetSrv instead of the QuotaTarget in
              quota check.
    AzureMonitor: Automate location retrieval.
    AzureMonitor: Fix bad request when setting dimensions.
    BarChart: Fix value mappings.
    Build: Streamline and sync dockerfiles.
    Build: Unified dockerfile for all builds.
    CloudWatch: Fix - make sure dimensions are propagated to alert
                query editor.
    Cloudwatch: Fix deeplink with default region.
    Command Palette: Fix not being able to type if triggered
      whilst another modal is open.
    Command Palette: Maintain page state when changing theme.
    Dashboards: Fix &#x27;Make Editable&#x27; button not working in
      Dashboard Settings.
    Dashboards: Show error when data source is missing.
    Datasource: Fix - apply default query also to queries in new
                panels.
    Dropdown: Menu now closes correctly when selecting
              options on touch devices.
    Influx: Query segment menus now position correctly near
            the bottom of the screen.
    Login: Fix failure to login a new user via an external
           provider if quota are enabled.
    Loki/Prometheus: Fix wrong queries executed in split view.
    Loki: Fix wrongly escaped label values when using LabelFilter.
    Navigation: Prevent app crash when importing a dashboard with a
                uid of <code>home</code>.
    Panel Edit: Fix data links edit icons being off screen when
                provided title is too long.
    Prometheus: Fix exemplar fill color to match series color in
                time series.
    Prometheus: Fix exemplars not respecting corresponding series
                display status.
    StateTimeline: Fix negative infinity legend/tooltip from
                   thresholds.
    Table: Fixes row border style not showing and colored
           rows blending together.
    Tempo: Fix TraceQL autocomplete issues.
    TimePicker: Prevent TimePicker overflowing viewport on small
                screens.
    TimeRangePicker: Fix recently ranges only not showing all recent
                     ranges.
    TimeZonePicker: Scroll menu correctly when using keyboard
                    controls.</li>
<li>Update to 9.3.1
    Connections: Update "Your connections/Data sources" page.
    Accessibility: Increase badge constrast to be WCAG AA compliant.</li>
<li>Update to 9.3.0
    Alerting: Enable interpolation for notification policies in file
              provisioning.
    Azure Monitor Logs: Avoid warning when the response is empty.
    Azure Monitor: Add support to customized routes.
    Canvas: Add icon value mapping.
    CloudWatch: Cross-account querying support.
    Docs: Update <code>merge-pull-request.md</code> regarding backport
          policies.
    GaugePanel: Setting the neutral-point of a gauge.
    Geomap: Improve location editor.
    Internationalization: Enable internationalization by default.
    Logs: Add <code>Download logs</code> button to log log-browser.
    Loki: Add <code>gzip</code> compression to resource calls.
    Loki: Add improvements to loki label browser.
    Loki: Make label browser accessible in query builder.
    Loki: Remove raw query toggle.
    Middleware: Add CSP Report Only support.
    Navigation: Prevent viewer role accessing dashboard
                creation, import and folder creation.
    OAuth: Refactor OAuth parameters handling to support
           obtaining refresh tokens for Google OAuth.
    Oauth: Display friendly error message when
           role_attribute_strict=true and no valid role found.
    Preferences: Add confirmation modal when saving org preferences.
    PublicDashboards: Orphaned public dashboard deletion script
                      added.
    Query Editor: Hide overflow for long query names.
    Solo Panel: Configurable timezone.
    TablePanel: Add support for Count calculation per column
                or per entire dataset.
    Tempo: Send the correct start time when making a TraceQL query.
    Various Panels: Remove beta label from Bar Chart, Candlestick,
                    Histogram, State Timeline, & Status History
                    Panels.
    Access Control: Clear user&#x27;s permission cache after resource
                    creation.
    Accessibility: Improve keyboard accessibility in
                   <code>AnnoListPanel</code>.
    Accessibility: Improve keyboard accessibility in <code>Collapse</code>.
                   <code>GettingStarted</code> panel.
    Accessibility: Improve keyboard accessibility of <code>FilterPill</code>.
    Admin: Fix broken links to image assets in email templates.
    Azure Monitor: Fix namespace selection for storageaccounts.
    Calcs: Fix difference percent in legend.
    DataLinks: Improve Data-Links AutoComplete Logic.
    Explore: Fix a11y issue with logs navigation buttons.
    Heatmap: Fix blurry text & rendering.
    Heatmap: Fix tooltip y range of top and bottom buckets in
             calculated heatmaps.
    Logs: Fix misalignment of LogRows.
    Navigation: Stop clearing search state when opening a
                result in a new tab.
    OptionsUI: SliderValueEditor does not get auto focused on
               slider change.
    PanelEdit: Fixes bug with not remembering panel options
               pane collapse/expand state.
    Quota: Fix failure in store due to missing scope parameters.
    Quota: Fix failure when checking session limits.
    StateTimeline: Prevent label text from overflowing state rects.
    Tempo: Fix search table duration unit.
    TraceView: Fix broken rendering when scrolling in Dashboard
               panel in Firefox.
    GrafanaUI: Add disabled option for menu items.</li>
<li>Update to 9.2.4
    Access Control: Add an endpoint for setting several managed
                    resource permissions.
    Accessibility: Increase <code>Select</code> placeholder contrast to
                   be WCAG AA compliant.
    Alerting: Append org ID to alert notification URLs.
    Alerting: Make the Grouped view the default one for Rules.
    Build: Remove unnecessary alpine package updates.
    Google Cloud Monitoring: Set frame interval to draw null values.
    Instrumentation: Expose when the binary was built as a gauge.
    Loki: Preserve <code>X-ID-Token</code> header.
    Search: Reduce requests in folder view.
    TimeSeries: More thorough detection of negative values for
                auto-stacking direction.
    Alerting: Attempt to preserve UID from migrated legacy channel.
    Alerting: Fix response is not returned for invalid Duration in
              Provisioning API.
    Alerting: Fix screenshot is not taken for stale series.
    Auth: Fix admins not seeing pending invites.
    MSSQL/Postgres: Fix visual query editor filter disappearing.
    Tempo: Fix dropdown issue on tag field focus.
    Timeseries: Fix null pointer when matching fill below to field.
    Toolkit: Fix Webpack less-loader config.</li>
<li>Update to 9.2.3
    Docs: Add information about DB version support to upgrade guide.
    Footer: Update footer release notes link to Github changelog.
    Prometheus: Do not drop errors in streaming parser.
    Prometheus: Flavor/version configuration.
    Prometheus: Provide label values match parameter API when
                supported prometheus instance is configured.
    Security: Upgrade x/text to version unaffected by
              CVE-2022-32149.
    Auth: Fix GF_AUTH_JWT_URL_LOGIN env variable doesn&#x27;t work.
    Live: Explicitly reply with http 200.
    Prometheus: Fix builder operation mode changing
                multiselect to single select behaviour.
    Security: Fix vulnerabilities in webpack loader-utils.</li>
<li>Update to 9.2.2
    Alerting: Add support for wecom apiapp.
    Canvas: Improve resource picker initialization.
    Canvas: Improve text element readability.
    CloudWatch: Make sure adoption tracking is done on valid,
                migrated queries.
    Dashboard: Alerts user to incorrect tag format for JSON import.
    MSSQL: Support tables from all schemas.
    Opentsdb: Allow template variables for filter keys.
    QueryEditor: Revert components from grafana-ui.
    Browse: Fix General folder not showing in FolderPicker.
    Elasticsearch: Fix calculation of trimEdges in alert mode.
    Elasticsearch: Fix trimEdges delete logic in alert mode.
    GoogleOAuth: Unlock User Admin UI.
    LogContext: Fix wrong color of <code>show context</code> icon in light
                theme.
    Loki: Fix adding of adhoc filters to stream selector when query
          with empty stream selector.
    Loki: Fix double stringified log-lines when copied via Copy
          button.
    Loki: Fix explain section about $__interval variable.
    Loki: Remove already selected options from next label filter
          options in builder.
    NodeGraph: Fix rendering issues when values of arc are over 1.
    PublicDashboards: Fix hidden queries execution.
    Tempo: Fix Node Graph visualization type in dashboard.
    TimeSeries: Fix stacking when first value is negative zero.
    TimeseriesPanel: Fix variables in data links.
    User: Fix externalUserId not being populated.
    We added some components a bit too early to @grafana/ui in 9.2
    so we are moving them back to @grafana/experimental. If you
    used any of these components
    AccessoryButton
    EditorFieldGroup
    EditorHeader
    EditorField
    EditorRow
    EditorList
    EditorRows
    EditorSwitch
    FlexItem
    Stack
    InlineSelect
    InputGroup
    Space
    Please use them from grafana/experimental from now on.</li>
<li>Update to 9.2.1
    Alerting: Improve notification policies created during
              migration.
    AzureAD: Add option to force fetch the groups from the
             Graph API.
    Docs: Note end of release notes publication.
    Inspect: Handle JSON tab crash when the provided object
             is too big to stringify.
    TablePanel: Footer now updates values on column filtering.
    Alerting: Fix email image embedding on Windows.
    Alerting: Fix mathexp.NoData for ConditionsCmd.
    Legacy Alerting: Fix duration calculation when testing a rule.
    Loki: Propagate additional headers from Grafana to Loki
          when querying data.
    Search: Sort alphabetically in the folder view, increase
            the limit of the folder search from 50 to 1000.
    TablePanel: Fix last table column to be centered.
    Grafana UI: Export prop types for queryfield, modal and field
                components.
    Toolkit: Fix <code>Cannot use import statement outside...</code> error in
             tests.</li>
<li>Update to 9.2.0
    Alerting: Add Notification error feedback on contact points
              view.
    Alerting: Allow created by to be manually set when
              there&#x27;s no creator for silences.
    Alerting: Expose info about notification delivery errors
              in a new /receivers endpoint.
    Alerting: Update imported prometheus alertmanager version.
    Alerting: Write and Delete multiple alert instances.
    Core: Implement aria attributes for query rows, improve a11y.
    DevEnv: Adds docker block for clickhouse.
    Docker: removes unneccesary use of edge repo.
    Explore: Revert split pane resize feature.
    Frontend: Make local storage items propagate to different tabs
              immediately.
    PublicDashboards: Allow disabling an existent public dashboard
                      if it.
    QueryEditorRow: Only pass error to query editor if panel
                    is not in a loading state.
    XYChart: Beta release.
    Alerting: Start ticker only when scheduler starts.
    Alerting: Fix pq: missing FROM-clause for table "a".
    AzureMonitor: Correctly update subscriptions value in ARG
                  editor.
    Chore: Regenerate swagger specification and fix validation
           failures.
    Correlations: Only return correlation for which both
                  source and target datasources exist.
    Explore: Prevent panes from disappearing when resizing
             window in split view.
    Links: Fix opening links from different orgs on the same tab.
    LogContext: Fix scroll position in upper context group.
    Logs: Show copy button independently from context.
    Loki/Prometheus: Fix adding of ad hoc filters when
                     jumping from dashboard to explore.
    Loki: Add support for range aggregations with by grouping.
    Loki: Fix label-value escaping in context query.
    Loki: Fix redundant escaping in adhoc filter with regex match.
    PanelEdit: Fixes resize pane border and spacing issues.
    RBAC: Redirect to /login when forceLogin is set.
    Security: Fix CVE-2022-27664.
    StateTimeline: Fix tooltip showing erroneously in shared
                   crosshair dashboards.
    Tempo: Fix unexpected trimming of leading zeroes in traceID.
    Tracing: Fix bug where errors are not reported to OpenTelemetry.</li>
<li>Update to 9.1.8
    Alerting: Fix evaluation interval validation.
    Alerting: Fix migration to create rules with group index 1.
    Alerting: Fix migration to not add label "alertname".
    Azure Monitor: Fix empty Logs response for Alerting.
    Azure Monitor: Fix subscription selector when changing data
                   sources.
    Google Cloud Monitoring: Fix bucket bound for distributions.</li>
<li>Update to 9.1.7
    CloudWatch: Add missing AWS/Prometheus metrics.
    Explore: Add feature tracking events.
    Graphite: Add error information to graphite queries tracing.
    Prometheus: Restore FromAlert header.
    Search: Add search index configuration options.
    Thresholds: Add option for dashed line style.
    Alerting: Fix default query&#x27;s data source when no default
              datasource specified.
    Alerting: Fix mathexp.NoData cannot be reduced.
    Alerting: Skip unsupported file types on provisioning.
    AzureMonitor: Ensure resourceURI template variable is migrated.
    Dashboard: Fix plugin dashboard save as button.
    Docs: Fix decimals: auto docs for panel edit.
    Fix: RBAC handle <code>error no resolver</code> found.
    LibraryPanelSearch: Refactor and fix hyphen issue.
    Live: Fix live streaming with <code>live-service-web-worker</code> feature
          flag enabled.
    QueryField: Fix wrong cursor position on autocomplete.</li>
<li>Update to 9.1.6
    DataSource: Adding possibility to hide queries from the
                inspector.
    Inspect: Hide Actions tab when it is empty.
    PanelMenu: Remove hide legend action as it was showing on
               all panel types.
    Provisioning Contact points: Support disableResolveMessage via
                                 YAML.
    PublicDashboards: Support subpaths when generating pubdash url.
    Alerting: Fix legacy migration crash when rule name is too long.
    Alerting: Fix send resolved notifications.
    Azure Monitor: Fix migration issue with MetricDefinitionsQuery
                   template variable query types.
    Browse: Hide dashboard actions if user does not have enough
            permission.
    ElasticSearch: Fix dispatching queries at a wrong time.
    Panel: Disable legends when showLegend is false prior to
           schema v37.
    Prometheus: Fix metadata requests for browser access mode.
    Search: Avoid requesting all dashboards when in Folder View.
    TablePanel/StatPanel: Fix values not being visible when
                          background transparent.</li>
<li>Update to 9.1.5
    Alerting: Sanitize invalid label/annotation names for external
              alertmanagers.
    Alerting: Telegram: Truncate long messages to avoid send error.
    DisplayProcessor: Handle reverse-ordered data when auto-showing
                      millis.
    Heatmap: Add option to reverse color scheme.
    PluginLoader: Alias slate-react as @grafana/slate-react.
    Search: Add substring matcher, to bring back the old
            dashboard search behavior.
    Traces: More visible span colors.
    Alerting: Fix incorrect propagation of org ID and other
              fields in rule provisioning endpoints.
    Alerting: Resetting the notification policy tree to the default
              policy will also restore default contact points.
    AzureMonitor: Fix custom namespaces.
    AzureMonitor: Fix issue where custom metric namespaces
                  are not included in the metric namespace list.
    CloudWatch: Fix display name of metric and namespace.
    Cloudwatch: Fix annotation query serialization issue.
    Dashboard: Fix issue where unsaved changes warning would appear
               even after save, and not being able to change library
               panels.
    Dashboard: Hide overflow content for single left pane.
    Loki: Fix a bug where adding adhoc filters was not possible.</li>
<li>Update to 9.1.4
    GrafanaUI: Fixes Chrome issue for various query fields.</li>
<li>Update to 9.1.3
    API: Do not expose user input in datasource error responses.
    Library Panel: Allow to delete them when deprecated.
    Plugins Catalog: Allow to filter plugins using special
                     characters.
    Alerting: Fix UI bug when setting custom notification
              policy group by.
    AppRootPage: Fix issue navigating between two app plugin pages.
    Correlations: Use correct fallback handlers.
    RBAC: Fix deleting empty snapshots.
    LibraryElements: Fix inability to delete library panels
                     under MySQL.
    Metrics: fix <code>grafana_database_conn_*</code> metrics, and add
             new <code>go_sql_stats_*</code> metrics as eventual replacement.
    TestData DB: Fix node graph not showing when the <code>Data type</code>
                 field is set to <code>random</code>.</li>
<li>Deprecations
    The <code>grafana_database_conn_*</code> metrics are deprecated, and will
    be removed in a future version of Grafana. Use the
    <code>go_sql_stats_*</code> metrics instead.</li>
<li>Update to 9.1.2
    AdHoc variable: Correctly preselect datasource when provisioning.
    AzureMonitor: Added ARG query function for template variables.
    Dashboards: Persist details message when navigating through
               dashboard save drawer&#x27;s tabs.
    Dashboards: Correctly migrate mixed data source targets.
    Elasticsearch: Use millisecond intervals for alerting.
    Elasticsearch: Use millisecond intervals in frontend.
    Geomap: Local color range.
    Plugins Catalog: Use appSubUrl to generate plugins catalog urls.
    Rendering: Add support for renderer token.
    Alerting: Fix saving of screenshots uploaded with a signed url.
    AngularPanels: Fixing changing angular panel options not taking
                   having affect when coming back from panel edit.
    Explore: Improve a11y of query row collapse button.
    Geomap: Fix tooltip display.
    QueryEditorRow: Filter data on mount.
    Search: Show all dashboards in the folder view.
    Tracing: Fix the event attributes in opentelemetry tracing.
    GrafanaUI: Fix styles for invalid selects & DataSourcePicker.</li>
<li>Update to 9.1.1
    Cloud Monitoring: Support SLO burn rate.
    Schema: Restore "hidden" in LegendDisplayMode.
    Timeseries: Revert the timezone(s) property name change back to
                singular.
    Alerting: Fix links in Microsoft Teams notifications.
    Alerting: Fix notifications for Microsoft Teams.
    Alerting: Fix width of Adaptive Cards in Teams notifications.
    ColorPickerInput: Fix popover in disabled state.
    Decimals: Fixes auto decimals to behave the same for
              positive and negative values.
    Loki: Fix unique log row id generation.
    Plugins: Fix file extension in development authentication guide.
    TimeSeries: Fix jumping legend issue.
    TimeSeries: Fix memory leak on viz re-init caused by
                KeyboardPlugin.
    TimePicker: Fixes relative timerange of less than a day not
                displaying.
    GrafanaUI: Fixes ClipboardButton to always keep multi line
               content.</li>
<li>Update to 9.1.0
    API: Allow creating teams with a user defined identifier.
    Alerting: Adds interval and For to alert rule details.
    Alerting: Extend PUT rule-group route to write the entire
              rule group rather than top-level fields only.
    Alerting: Use Adaptive Cards in Teams notifications.
    Azure Monitor: Add Network Insights Dashboard.
    Chore: Improve logging of unrecoverable errors.
    Correlations: Add UpdateCorrelation HTTP API.
    Dashboard: Reverted the changes of hiding multi-select
               and all variable in the datasource picker.
    Geomap: Add alpha day/night layer.
    Geomap: Add measuring tools.
    GrafanaUI: Add success state to ClipboardButton.
    Heatmap: Replace the heatmap panel with new implementation.
    KVStore: Allow empty value in kv_store.
    Prometheus: Promote Azure auth flag to configuration.
    Search: Display only dashboards in General folder of
            Search Folder View.
    Status history/State timeline: Support datalinks.
    Transform: Add a limit transform.
    Transformations: Add standard deviation and variance reducers.
    API: Fix snapshot responses.
    Access Control: Fix permission error during dashboard
                    creation flow.
    Access Control: Set permissions for Grafana&#x27;s test data source.
    Alerting: Fix migration failure.
    BarGauge: Show empty bar when value, minValue and
              maxValue are all equal.
    Dashboard: Fix color of bold and italics text in panel
               description tooltip.
    Loki: Fix passing of query with defaults to code mode.
    Loki: Fix producing correct log volume query for query
          with comments.
    Loki: Fix showing of unusable labels field in detected fields.
    Tracing: Fix OpenTelemetry Jaeger context propagation.
    Alerting: AlertingProxy to elevate permissions for request
              forwarded to data proxy when RBAC enabled.
    Plugins: Only pass <code>rootUrls</code> field in request when not empty.
    Alert notifications to Microsoft Teams now use Adaptive Cards
      instead of Office 365 Connector Cards.
    Starting at 9.1.0, existing heatmap panels will start using a
      new implementation. This can be disabled by setting the
      <code>useLegacyHeatmapPanel</code> feature flag to true. It can be
      tested on a single dashbobard by adding
      <code>?__feature.useLegacyHeatmapPanel=true</code> to any dashboard URL.
      The most notable changes are:
      Significantly improved rendering performance
      When calculating heatmaps, the buckets are now placed on
        reasonable borders (1m, 5m, 30s etc)
      Round cells are no longer supported</li>
<li>Update to 9.0.9
    AuthNZ: Security fixes for CVE-2022-35957 and CVE-2022-36062.</li>
<li>Update to 9.0.8
    Alerting: Hide "no rules" message when we are fetching
              from data sources.
    Alerting: AlertingProxy to elevate permissions for
              request forwarded to data proxy when RBAC enabled.</li>
<li>Update to 9.0.7
    CloudMonitoring: Remove link setting for SLO queries.
    GrafanaUI: Render PageToolbar&#x27;s leftItems regardless of
               title&#x27;s presence.</li>
<li>Update to 9.0.6
    Access Control: Allow org admins to invite new users to
                    their organization.
    Grafana/toolkit: Fix incorrect image and font generation
                     for plugin builds.
    Prometheus: Fix adding of multiple values for regex operator.
    UI/Card: Fix card items always having pointer cursor.</li>
<li>Update to 9.0.5
    Access control: Show dashboard settings to users who can
                    edit dashboard.
    Alerting: Allow the webhook notifier to support a custom
              Authorization header.
    Plugins: Add signature wildcard globbing for dedicated
             private plugin type.
    Prometheus: Don&#x27;t show errors from unsuccessful API
                checks like rules or exemplar checks.
    Access control: Allow organisation admins to add existing
                    users to org.
    Alerting: Fix alert panel instance-based rules filtering.
    Apps: Fixes navigation between different app plugin pages.
    Cloudwatch: Upgrade grafana-aws-sdk to fix auth issue
                with secret keys.
    Loki: Fix <code>show context</code> not working in some occasions.
    RBAC: Fix permissions on dashboards and folders created
          by anonymous users.</li>
<li>Update to 9.0.4
    Browse/Search: Make browser back work properly when
                   visiting Browse or search.
    Logs: Improve getLogRowContext API.
    Loki: Improve handling of empty responses.
    Plugins: Always validate root URL if specified in
             signature manfiest.
    Preferences: Get home dashboard from teams.
    SQLStore: Support Upserting multiple rows.
    Traces: Add more template variables in Tempo & Zipkin.
    Traces: Remove serviceMap feature flag.
    Access Control: Fix missing folder permissions.
    Access control: Fix org user removal for OSS users.
    Alerting: Fix Slack notifications.
    Alerting: Preserve new-lines from custom email templates
              in rendered email.
    Log: Fix text logging for unsupported types.
    Loki: Fix incorrect TopK value type in query builder.</li>
<li>Update to 9.0.3
    Access Control: Allow dashboard admins to query org users.
    Alerting: Add method to provisioning API for obtaining a
              group and its rules.
    Alerting: Allow filtering of contact points by name.
    Alerting: Disable /api/admin/pause-all-alerts with
              Unified Alerting.
    Annotations: Use point marker for short time range annotations.
    AzureMonitor: Update UI to experimental package.
    AzureMonitor: Update resource and namespace metadata.
    CloudWatch: Remove simplejson in favor of &#x27;encoding/json&#x27;.
    DashboardRow: Collapse shortcut prevent to move the
                  collapsed rows.
    Navigation: Highlight active nav item when Grafana is
                served from subpath.
    Plugins: InfluxDB datasource - set epoch query param
             value as "ms".
    Plugins: InfluxDB update time range query.
    StateTimeline: Try to sort time field.
    API: Do not validate/save legacy alerts when saving a
         dashboard if legacy alerting is disabled.
    Alerting: Add method to reset notification policy tree
              back to the default.
    Alerting: Fix Teams notifier not failing on 200 response
              with error.
    Alerting: Fix bug where state did not change between
              Alerting and Error.
    Alerting: Fix consistency errors in OpenAPI documentation.
    Alerting: Fix normalization of alert states for panel
    Alerting: Provisioning API respects global rule quota.
    CSRF: Fix additional headers option.
    Chore: Bump parse-url to 6.0.2 to fix security vulnerabilities.
    Chore: Fix CVE-2020-7753.
    Chore: Fix CVE-2021-3807.
    Chore: Fix CVE-2021-3918.
    Chore: Fix CVE-2021-43138.
    Chore: Fix CVE-2022-0155.
    Dashboard: Fixes tooltip issue with TimePicker and Setting buttons.
    Dashboard: Prevent unnecessary scrollbar when viewing
               single panel.
    Logs: Fixed wrapping log lines from detected fields.
    Loki: Add missing operators in label filter expression.
    Loki: Fix error when changing operations with different parameters.
    Loki: Fix suggesting of correct operations in query builder.
    Plugins: InfluxDB variable interpolation fix for
             influxdbBackendMigration feature flag.
    SQLstore: Fix fetching an inexistent playlist.
    Security: Fixes for CVE-2022-31107 and CVE-2022-31097.
    Snapshots: Fix deleting external snapshots when using RBAC.
    Table: Fix scrollbar being hidden by pagination.
    Templating: Changing between variables with the same name
                now correctly triggers a dashboard refresh.
    Time series panel: Fix an issue with stacks being not complete
                       due to the incorrect data frame length.</li>
<li>Update to 9.0.2
    Alerting: Add support for images in Pushover alerts.
    Alerting: Don&#x27;t stop the migration when alert rule tags
              are invalid.
    Alerting: Skip the default data source if incompatible.
    AzureMonitor: Parse non-fatal errors for Logs.
    OAuth: Restore debug log behavior.
    Plugins: Improved handling of symlinks.
    Alerting: Code-gen parsing of URL parameters and fix
              related bugs.
    Annotations: Fix annotation autocomplete causing panels
                 to crash.
    Barchart: Fix warning not showing.
    CloudWatch: Enable custom session duration in AWS plugin auth.
    Dashboards: Fixes issue with the initial panel layout
                counting as an unsaved change.
    Plugins: Use a Grafana specific SDK logger implementation
             for core plugins.
    Search: Fix pagination in the new search page.</li>
<li>Update to 9.0.1
    Alerting: Add support for image annotation in
              Alertmanager alerts.
    Alerting: Add support for images in SensuGo alerts.
    Alerting: Add support for images in Threema alerts.
    Alerting: Adds Mimir to Alertmanager data source implementation.
    Alerting: Invalid setting of enabled for unified alerting
              should return error.
    AzureMonitor: Clean namespace when changing the resource.
    AzureMonitor: Update supported namespaces and filter
                  resources by the right type.
    CLI: Allow relative symlinks in zip archives when
         installing plugins.
    Dashboard: Don&#x27;t show unsaved changes modal for automatic
               schema changes.
    Dashboard: Unsaved changes warning should not trigger
               when only pluginVersion has changed.
    Expression: Execute hidden expressions.
    Geomap: Support showing tooltip content on click (not
            just hover).
    Heatmap: Remove alpha flag from new heatmap panel.
    Instrumentation: Define handlers for requests that are
                     not handled with named handlers.
    Log Panel: Improve log row hover contrast and visibility.
    Logs: Handle backend-mode errors in histogram.
    Loki: Do not show histogram for instant queries.
    Loki: Handle data source configs with path in the url.
    Loki: Handle invalid query type values.
    OAuth: Redirect to login if no oauth module is found or
           if module is not configured.
    OptionsUI: Move internal options editors out of @grafana/ui.
    Prometheus: Don&#x27;t show undefined for step in collapsed
                options in query editor when value is "auto".
    Prometheus: Show query patterns in all editor modes for
                Prometheus and Loki.
    Tempo: Add link to Tempo Search with node service selected.
    Time Series Panel: Add Null Filling and "No Value" Support.
    TimeSeries: Add an option to set legend width.
    Timeseries: Improve cursor Y sync behavior.
    Traces: Do not use red in span colors as this looks like
            an error.
    Alerting: Fix AM config overwrite when SQLite db is
              locked during sync.
    Alerting: Fix alert instances filtering for prom rules.
    Alerting: Fix alert rule page crashing when datasource
              contained URL unsafe characters.
    Alerting: Fix automatically select newly created folder option.
    Alerting: Fix removal of notification policy without
              labels matchers.
    CloudWatch: Allow hidden queries to be executed in case
                an ID is provided.
    Dashboard: Prevent non-repeating panels being dropped
               from repeated rows when collapsed/expanded.
    Dashboards: Fix folder picker not showing correct results
                when typing too fast.
    Datasource: Prevent panic when proxying for non-existing
                data source.
    Explore: Fix log context scroll to bottom.
    Explore: Revert "Remove support for compact format URLs".
    Expressions: Fixes dashboard schema migration issue that casued
                 Expression datasource to be set on panel level.
    Formatting: Fixes valueFormats for a value of 0.
    GrafanaData: Fix week start for non-English browsers.
    LibraryPanel: Resizing a library panel to 6x3 no longer
                  crashes the dashboard on startup.
    LogRow: Fix placement of icon.
    Loki: Fix bug in labels framing.
    Loki: Fix issues with using query patterns.
    Loki: Fix showing of duplicated label values in dropdown
          in query builder.
    MSSQL: Fix ParseFloat error.
    Panels: Fixes issue with showing &#x27;Cannot visualize data&#x27;
            when query returned 0 rows.
    Playlists: Disable Create Playlist buttons for users with
               viewer role.
    Plugins: Fix typo in plugin data frames documentation.
    Prometheus: Fix body not being included in resource calls
                if they are POST.
    RolePicker: Fix submenu position on horizontal space overflow.
    Tracing: Fix trace links in traces panel.
    Support for compact Explore URLs is deprecated and will be
      removed in a future release. Until then, when navigating to
      Explore using the deprecated format the URLs are
      automatically converted. If you have existing links pointing
      to Explore update them using the format generated by Explore
      upon navigation. You can identify a compact URL by its
      format. Compact URLs have the left (and optionally right) url
      parameter as an array of strings, for example
      <code>&amp;left=[&quot;now-1h&quot;,&quot;now&quot;...]</code>. The standard explore URLs follow
      a key/value pattern, for example
      <code>&amp;left={&quot;datasource&quot;:&quot;test&quot;...}</code>. Please be sure to check
      your dashboards for any hardcoded links to Explore and update
      them to the standard URL pattern.</li>
<li>Update to 9.0.0
    API: Add GET /api/annotations/:annotationId endpoint.
    API: Add endpoint for updating a data source by its UID.
    AccessControl: Add enterprise only setting for rbac
                   permission cache.
    AccessControl: Document basic roles changes and provisioning V2.
    AccessControl: Enable RBAC by default.
    AddDataSourceConfig: Remove deprecated checkHealth prop.
    Alerting: Add Image URLs to Microsoft Teams notifier.
    Alerting: Add RBAC actions and role for provisioning API routes.
    Alerting: Add Screenshot URLs to Pagerduty Notifier.
    Alerting: Add a "Reason" to Alert Instances to show
              underlying cause of state.
    Alerting: Add a general screenshot service and
              alerting-specific image service.
    Alerting: Add image url or file attachment to email
              notifications.
    Alerting: Add image_urls to OpsGenie notification details.
    Alerting: Add notification policy flow chart.
    Alerting: Attach image URL to alerts in Webhook notifier format.
    Alerting: Attach image URLs or upload files to Discord
    Alerting: Attach image URLs to Google Chat notifications.
    Alerting: Attach screenshot data to Unified Alerting
    Alerting: Create folder for alerting when start from the
              scratch.
    Alerting: Modify alertmanager endpoints for proxying
              using the datasource UID.
    Alerting: Modify endpoint for testing a datasource rule
              using the UID.
    Alerting: Modify prometheus endpoints for proxying using
              the datasource UID.
    Alerting: State Manager takes screenshots.
    Alerting: Use UID scope for folders authorization.
    Alerting: modify ruler endpoints for proxying using the
              datasource UID.
    Angular: Adds back two angular directives that are still
             used by remaining angular bits and plugins.
    Azure Monitor: Add Resource Picker to Metrics Queries.
    Azure Monitor: Add search feature to resource picker.
    AzureMonitor: Add support for selecting multiple options when
                  using the equals and not equals dimension filters.
    AzureMonitor: Remove deprecated code.
    Build: Change names to PascalCase to match.
    Chore: Remove deprecated DataSourceAPI methods.
    Chore: Upgrade typescript to 4.6.4.
    Cloud Monitoring: Use new annotation API.
    CloudMonitoring: Allow to set a custom value or disable
                     graph_period.
    CloudWatch: Add generic filter component to variable editor.
    CloudWatch: Added missing AWS/AppRunner metrics.
    CloudWatch: Enable support for dynamic labels with
                migrated alias patterns.
    Cloudwatch: Pass label in deep link.
    Cloudwatch: Use new annotation API.
    Dashboard: Validate dashboards against schema on save.
    DashboardPickerByID: Add option to exclude dashboards.
    DashboardPickerById: Add optionLabel prop.
    Dashboards: Display values of 0 with the configured
                decimal places.
    Data: Remove deprecated types and functions from valueMappings.
    Elasticsearch: Remove browser access mode.
    Elasticsearch: Remove support for versions after their
                   end of the life (<7.10.0).
    Encryption: Add support for multiple data keys per day.
    Encryption: Enable envelope encryption by default.
    Explore: Remove support for legacy, compact format URLs.
    Explore: Skip Angular error handling when Angular support
             is disabled.
    Explore: simplify support for multiple query editors.
    FeatureToggles: Support changing feature toggles with URL
                    parameters.
    FileUpload: Make component accessible by keyboard navigation.
    Formatting: Make SI number formats more robust.
    Graph: Deprecate Graph (old) and make it no longer a
           visualization option for new panels.
    IconButton: IconButtons are now correctly aligned in Safari.
    Logger: Enable new logging format by default.
    Loki: Add more query patterns.
    Loki: Enable new visual query builder by default.
    Loki: use the same dataframe-format for both live and
          normal queries.
    OAuth: Make allowed email domain case insensitive.
    Panels: Use the No value option when showing the no data
            message.
    Plugins: Remove plugin list panel.
    Query History: Enable new query history by default.
    QueryEditorRow: Show query errors next to query in a
                    consistent way across Grafana.
    SAML: Implement Name Templates for
          assertion_attribute_name option.
    Service accounts: Do not display service accounts
                      assigned to team.
    Settings: Use Grafana Azure SDK to pass Azure env vars
              for external plugins.
    Shortcuts: Add shortcut to show shortcuts to the list of
               shortcuts.
    Traces Panel: Add new Traces Panel visualization.
    Traces: Filter by service/span name and operation in
            Tempo and Jaeger.
    Transformations: Allow more complex regex expressions
                     in <code>Rename by regex</code>.
    grafana/ui: Add default type="button" to <Button>.
    Alerting: Fix database unavailable removes rules from scheduler.
    AzureMonitor: Fix auto-selection of time-grain for metrics.
    DataSources: Fixes issue with expressions not being queried.
    GraphNG: Fix thresholds by color not following data update.
    Jaeger: Update operations dropdown.
    Login: Fix mismatching label on auth_module in user list.
    Playlists: Save button now correctly creates a new playlist.
    RBAC: Fix migrations running in the wrong order causing
          inheritance problem in enterprise.
    ServiceAccounts: Add identifiable token prefix to service
                     account tokens.
    Traces: Fix missing CopyButton on KeyValueTables and
            overlapping of panels.
    <code>setExploreQueryField</code>, <code>setExploreMetricsQueryField</code> and
      <code>setExploreLogsQueryField</code> are now deprecated and will be
      removed in a future release. If you need to set a different
      query editor for Explore, conditionally render based on
      <code>props.app</code> in your regular query editor.
    Chore: Remove react-testing-lib from bundles.
    Select: Portal menu by default.
    The <code>@grafana/ui</code> package helper function
      <code>selectOptionInTest</code> used in frontend tests has been removed
      as it caused testing libraries to be bundled in the
      production code of Grafana. If you were using this helper
      function in your tests please update your code accordingly:
      <code>js
      // before
      import { selectOptionInTest } from &#x27;@grafana/ui&#x27;;
      // ...test usage
      await selectOptionInTest(selectEl, &#x27;Option 2&#x27;);
      // after
      import { select } from &#x27;react-select-event&#x27;;
      await select(selectEl, &#x27;Option 2&#x27;,
        { container: document.body });</code>
    Removed deprecated <code>checkHealth</code> prop from the <code>@grafana/e2e</code>
      <code>addDataSource</code> config. Previously this value defaulted to
      <code>false</code>, and has not been used in end-to-end tests since
      Grafana 8.0.3.
    Removes the deprecated <code>LegacyBaseMap</code>, <code>LegacyValueMapping</code>,
      <code>LegacyValueMap</code>, and <code>LegacyRangeMap</code> types, and
      <code>getMappedValue</code> function from grafana-data. Migration is as
      follows:
      | Old                  | New                     |
      | -------------------- | ----------------------- |
      | <code>LegacyBaseMap</code>      | <code>MappingType</code>           |
      | <code>LegacyValueMapping</code> | <code>ValueMapping</code>          |
      | <code>LegacyValueMap</code>     | <code>ValueMap</code>              |
      | <code>LegacyRangeMap</code>     | <code>RangeMap</code>              |
      | <code>getMappedValue</code>     | <code>getValueMappingResult</code> |
      This change fixes a bug in Grafana where intermittent failure
      of database, network between Grafana and the database, or
      error in querying the database would cause all alert rules to
      be unscheduled in Grafana. Following this change scheduled
      alert rules are not updated unless the query is successful.
    The <code>get_alert_rules_duration_seconds</code> metric has been
      renamed to <code>schedule_query_alert_rules_duration_seconds</code>.
    Any secret (data sources credential, alert manager
      credential, etc, etc) created or modified with Grafana v9.0
      won&#x27;t be decryptable from any previous version (by default)
      because the way encrypted secrets are stored into the
      database has changed. Although secrets created or modified
      with previous versions will still be decryptable by Grafana
      v9.0.
    If required, although generally discouraged, the
      <code>disableEnvelopeEncryption</code> feature toggle can be enabled to
      keep envelope encryption disabled once updating to Grafana
    In case of need to rollback to an earlier version of Grafana
      (i.e. Grafana v8.x) for any reason, after being created or
      modified any secret with Grafana v9.0, the
      <code>envelopeEncryption</code> feature toggle will need to be enabled
      to keep backwards compatibility (only from <code>v8.3.x</code> a bit
      unstable, from <code>8.5.x</code> stable).
    As a final attempt to deal with issues related with the
      aforementioned situations, the <code>grafana-cli admin
      secrets-migration rollback</code> command has been designed to
      move back all the Grafana secrets encrypted with envelope
      encryption to legacy encryption. So, after running that
      command it should be safe to disable envelope encryption
      and/or roll back to a previous version of Grafana.
    Alternatively or complementarily to all the points above,
      backing up the Grafana database before updating could be a
      good idea to prevent disasters (although the risk of getting
      some secrets corrupted only applies to those updates/created
      with after updating to Grafana v9.0).
    According to the dynamic labels documentation, you can use up
      to five dynamic values per label. There’s currently no such
      restriction in the alias pattern system, so if more than 5
      patterns are being used the GetMetricData API will return an
      error.
    Dynamic labels only allow \${LABEL} to be used once per
      query. There’s no such restriction in the alias pattern
      system, so in case more than 1 is being used the
      GetMetricData API will return an error.
    When no alias is provided by the user, Grafana will no longer
      fallback with custom rules for naming the legend.
    In case a search expression is being used and no data is
      returned, Grafana will no longer expand dimension values, for
      instance when using a multi-valued template variable or star
      wildcard <code>*</code> in the dimension value field.
    Time series might be displayed in a different order. Using
      for example the dynamic label <code>${PROP(&#x27;MetricName&#x27;)}</code>, might
      have the consequence that the time series are returned in a
      different order compared to when the alias pattern
      <code>{{metric}}</code> is used
    In Elasticsearch, browser access mode was deprecated in
      grafana 7.4.0 and removed in 9.0.0. If you used this mode,
      please switch to server access mode on the datasource
      configuration page.
    Environment variables passed from Grafana to external Azure
      plugins have been renamed:
      <code>AZURE_CLOUD</code> renamed to <code>GFAZPL_AZURE_CLOUD</code>
      <code>AZURE_MANAGED_IDENTITY_ENABLED</code> renamed to
        <code>GFAZPL_MANAGED_IDENTITY_ENABLED</code>
      <code>AZURE_MANAGED_IDENTITY_CLIENT_ID</code> renamed to
        <code>GFAZPL_MANAGED_IDENTITY_CLIENT_ID</code>
    There are no known plugins which were relying on these
      variables. Moving forward plugins should read Azure settings
      only via Grafana Azure SDK which properly handles old and new
      environment variables.
    Removes support for for ElasticSearch versions after their
      end-of-life, currently versions < 7.10.0. To continue to use
      ElasticSearch data source, upgrade ElasticSearch to version
      7.10.0+.
    Application Insights and Insight Analytics queries in Azure
      Monitor were deprecated in Grafana 8.0 and finally removed in
      9.0. Deprecated queries will no longer be executed.
    grafana/ui: Button now specifies a default type="button"
      The <code>Button</code> component provided by @grafana/ui now specifies
      a default <code>type=&quot;button&quot;</code> when no type is provided.
      In previous versions, if the attribute was not specified for
      buttons associated with a <code>&lt;form&gt;</code> the default value was
      <code>submit</code> per the specification. You can preserve the old
      behavior by explicitly setting the type attribute:
      <code>&lt;Button type=&quot;submit&quot; /&gt;</code>
    The <code>Rename by regex</code> transformation has been improved to
      allow global patterns of the form <code>/&lt;stringToReplace&gt;/g</code>.
      Depending on the regex match used, this may cause some
      transformations to behave slightly differently. You can
      guarantee the same behaviour as before by wrapping the
      <code>match</code> string in forward slashes (<code>/</code>), e.g. <code>(.*)</code> would
      become <code>/(.*)/</code>
    <code>&lt;Select /&gt;</code> menus will now portal to the document body by
      default. This is to give more consistent behaviour when
      positioning and overlaying. If you were setting
      <code>menuShouldPortal={true}</code> before you can safely remove that
      prop and behaviour will be the same. If you weren&#x27;t
      explicitly setting that prop, there should be no visible
      changes in behaviour but your tests may need updating. If you
      were setting <code>menuShouldPortal={false}</code> this will continue to
      prevent the menu from portalling.
    Grafana alerting endpoint prefixed with <code>api/v1/rule/test</code>
      that tests a rule against a Corte/Loki data source now
      expects the data source UID as a path parameter instead of
      the data source numeric identifier.
    Grafana alerting endpoints prefixed with <code>api/prometheus/</code>
      that proxy requests to a Cortex/Loki data source now expect
      the data source UID as a path parameter instead of the data
      source numeric identifier.
    Grafana alerting endpoints prefixed with <code>api/ruler/</code> that
      proxy requests to a Cortex/Loki data source now expect the
      data source UID as a path parameter instead of the data
    Grafana alerting endpoints prefixed with <code>api/alertmanager/</code>
      that proxy requests to an Alertmanager now expect the data
      source UID as a path parameter instead of the data source
      numeric identifier.
    The format of log messages have been updated, <code>lvl</code> is now
      <code>level</code> and <code>eror</code>and <code>dbug</code> has been replaced with <code>error</code>
      and <code>debug</code>. The precision of timestamps has been increased.
      To smooth the transition, it is possible to opt-out of the
      new log format by enabling the feature toggle <code>oldlog</code>.
      This option will be removed in a future minor release.
    In the Loki data source, the dataframe format used to
      represent Loki logs-data has been changed to a more efficient
      format. The query-result is represented by a single dataframe
      with a "labels" column, instead of the separate dataframes
      for every labels-value. When displaying such data in explore,
      or in a logs-panel in the dashboard will continue to work
      without changes, but if the data was loaded into a different
      dashboard-panel, or Transforms were used, adjustments may be
      necessary. For example, if you used the "labels to fields"
      transformation with the logs data, please switch to the
      "extract fields" transformation.</li>
<li>Update to version 8.5.22:</li>
<li>Fix XSS in Graphite functions tooltip
    (bsc#1209645, CVE-2023-1410)</li>
<li>Update to version 8.5.21:</li>
<li>Apply attribute sanitation to GeomapPanel
    (bsc#1208821, CVE-2023-0507)</li>
<li>Avoid storing XSS in TraceView panel
    (bsc#1208819, CVE-2023-0594)</li>
<li>Login: Fix panic when UpsertUser is called without ReqContext </li>
<li>Fix basic authentication bypass by updating the exporter toolkit
  to version 0.7.3 (bsc#1208065, CVE-2022-46146).</li>
<li>Require Go 1.19 or newer (bsc#1208293, CVE-2022-41723)</li>
<li>Update to version 8.5.20:</li>
<li>Security: SVG: Add dompurify preprocessor step
    (bsc#1207749, CVE-2022-23552)</li>
<li>Security: Snapshots: Fix originalUrl spoof security issue
    (bsc#1207750, CVE-2022-39324)</li>
<li>Security: Omit error from http response </li>
<li>Bug fix: Email and username trimming and invitation validation</li>
<li>Update to version 8.5.15 (jsc#PED-2617):</li>
<li>Security: Fix for privilege escalation
    (bsc#1205225, CVE-2022-39306)</li>
<li>Security: Omit error from http response when user does not
    exists (bsc#1205227, CVE-2022-39307)</li>
<li>Update to version 8.5.14:</li>
<li>Security: Fix do not forward login cookie in outgoing requests
    (bsc#1204303, CVE-2022-39201)</li>
<li>Security: Make proxy endpoints not leak sensitive HTTP headers
    (bsc#1204305, CVE-2022-31130)</li>
<li>Security: Fix plugin signature bypass (bsc#1204302, CVE-2022-31123)</li>
<li>Security: Fix blocknig other users from signing in (bsc#1204304,
    CVE-2022-39229)</li>
<li>Update to version 8.5.13 (jsc#PED-2145):</li>
<li>Features and enhancements:<ul>
<li>Plugins: Expose emotion/react to plugins to prevent load
  failures</li>
</ul>
</li>
<li>Bug fix:<ul>
<li>AuthNZ: Security fixes for (bsc#1203596, CVE-2022-36062) and
  (bsc#1203597, CVE-2022-35957)</li>
</ul>
</li>
<li>Update to version 8.5.11:<ul>
<li>Rendering: Add support for renderer token</li>
<li>Alerting: AlertingProxy to elevate permissions for request
  forwarded to data proxy when RBAC enabled</li>
</ul>
</li>
<li>Update to version 8.5.10</li>
<li>Bug fixes (8.5.10):<ul>
<li>RBAC: Fix Anonymous Editors missing dashboard controls.
  #52649, @gamab</li>
</ul>
</li>
<li>Bug fixes (8.5.9):<ul>
<li>Security: Fixes for CVE-2022-31107 and CVE-2022-31097.
  #52238, @xlson</li>
</ul>
</li>
<li>Bug fixes (8.5.6):<ul>
<li>Dashboard: Fixes random scrolling on time range change.
  #50379, @torkelo</li>
<li>Security: Fixes minor code scanning security warnings in old
  vendored javascript libs. #50382, @torkelo</li>
</ul>
</li>
<li>Features and enhancements (8.5.5):<ul>
<li>Azure Monitor: Include datasource ref when interpolating
  variables. #49543, @kevinwcyu</li>
<li>CloudWatch: Add multi-value template variable support for log
  group names in logs query builder. #49737, @kevinwcyu</li>
<li>Cloudwatch: Add template variable query function for listing
  log groups. #50100, @yaelleC</li>
</ul>
</li>
<li>Bug fixes (8.5.5):<ul>
<li>Alerting: Do not overwrite existing alert rule condition.
  #49920, @gillesdemey</li>
<li>Alerting: Remove double quotes from matchers. #50044,
  @alexweav</li>
</ul>
</li>
<li>Features and enhancements (8.5.4):<ul>
<li>Alerting: Remove disabled flag for data source when migrating
  alerts. #48559, @yuri-tceretian</li>
<li>Alerting: Show notification tab of legacy alerting only to
  editor. #49624, @yuri-tceretian</li>
<li>Alerting: Update migration to migrate only alerts that belong
  to existing org\dashboard. #49192, @yuri-tceretian</li>
<li>AzureMonitor: Do not quote variables when a custom "All"
  variable option is used. #49428, @andresmgot</li>
<li>AzureMonitor: Update allowed namespaces. #48468,
  @jcolladokuri</li>
<li>CloudMonitor: Correctly encode default project response.
  #49510, @aangelisc</li>
<li>Cloudwatch: Add support for new AWS/RDS EBS* metrics.
  #48798, @szymonpk</li>
<li>InfluxDB: Use backend for influxDB by default via feature
  toggle. #48453, @yesoreyeram</li>
<li>Legend: Use correct unit for percent and count calculations.
  #49004, @dprokop</li>
<li>LokI: use millisecond steps in Grafana 8.5.x. #48630, @gabor</li>
<li>Plugins: Introduce HTTP 207 Multi Status response to
  api/ds/query. #48550, @wbrowne</li>
<li>Transformations: Add an All Unique Values Reducer. #48653,
  @josiahg</li>
<li>Transformers: avoid error when the ExtractFields source field
  is missing. #49368, @wardbekker</li>
<li>[v8.5.x] Alerting: Update migration to migrate only alerts
  that belong to existing org\dashboard. #49199, @grafanabot</li>
</ul>
</li>
<li>Bug fixes (8.5.4):<ul>
<li>Alerting: Allow disabling override timings for notification
  policies. #48648, @gillesdemey</li>
<li>Alerting: Allow serving images from custom url path. #49022,
  @gillesdemey</li>
<li>Alerting: Apply Custom Headers to datasource queries. #47860,
  @joeblubaugh</li>
<li>Alerting: Fix RBAC actions for notification policies. #49185,
  @yuri-tceretian</li>
<li>Alerting: Fix access to alerts for viewer with editor
  permissions when RBAC is disabled. #49270, @yuri-tceretian</li>
<li>Alerting: Fix anonymous access to alerting. #49203,</li>
<li>Alerting: correctly show all alerts in a folder. #48684,</li>
<li>AzureMonitor: Fixes metric definition for Azure Storage
  queue/file/blob/table resources. #49101, @aangelisc</li>
<li>Dashboard: Fix dashboard update permission check. #48746,
  @IevaVasiljeva</li>
<li>DashboardExport: Fix exporting and importing dashboards where
  query data source ended up as incorrect. #48410, @torkelo</li>
<li>FileUpload: clicking the Upload file button now opens their
  modal correctly. #48766, @ashharrison90</li>
<li>GrafanaUI: Fix color of links in error Tooltips in light
  theme. #49327, @joshhunt</li>
<li>LibraryPanels: Fix library panels not connecting properly in
  imported dashboards. #49161, @joshhunt</li>
<li>Loki: Improve unpack parser handling. #49074, @gabor</li>
<li>RolePicker: Fix menu position on smaller screens. #48429,
  @Clarity-89</li>
<li>TimeRange: Fixes updating time range from url and browser
  history. #48657, @torkelo</li>
<li>TimeSeries: Fix detection & rendering of sparse datapoints.
  #48841, @leeoniya</li>
<li>Timeseries: Fix outside range stale state. #49633, @ryantxu</li>
<li>Tooltip: Fix links not legible in Tooltips when using light
  theme. #48748, @joshhunt</li>
<li>Tooltip: Sort decimals using standard numeric compare.
  #49084, @dprokop</li>
<li>Transforms: Labels to fields, fix label picker layout.
  #49304, @torkelo</li>
<li>Variables: Fixes issue with data source variables not
  updating queries with variable. #49478, @torkelo</li>
<li>[v8.5.x] Alerting: Fix RBAC actions for notification policies
  (#49185). #49348, @yuri-tceretian</li>
<li>[v8.5.x] Alerting: Fix access to alerts for viewer with
  editor permissions when RBAC is disabled. #49427, @konrad147</li>
<li>[v8.5.x] Alerting: Fix anonymous access to alerting. #49268,</li>
</ul>
</li>
<li>Breaking changes (8.5.4):
    For a data source query made via /api/ds/query:
    If the DatasourceQueryMultiStatus feature is enabled and
        The data source response has an error set as part of the
        DataResponse, the resulting HTTP status code is now 207
        Multi Status instead of 400 Bad gateway
    If the DatasourceQueryMultiStatus feature is not enabled and
        DataResponse, the resulting HTTP status code is 400 Bad
        Request (no breaking change)
        --> Issue #48550</li>
<li>Bug fixes (8.5.3):<ul>
<li>Security: fixes CVE-2022-29170. #49240, @xlson</li>
</ul>
</li>
<li>Features and enhancements (8.5.2):<ul>
<li>Alerting: Add safeguard for migrations that might cause
  dataloss. #48526, @JohnnyQQQQ</li>
<li>AzureMonitor: Add support for not equals and startsWith
  operators when creating Azure Metrics dimension filters.
  #48077, @aangelisc</li>
<li>Elasticsearch: Add deprecation notice for < 7.10 versions.</li>
</ul>
<h1>48506, @ivanahuckova</h1>
<ul>
<li>Traces: Filter by service/span name and operation in Tempo
  and Jaeger. #48209, @joey-grafana</li>
</ul>
</li>
<li>Bug fixes (8.5.2):<ul>
<li>AzureAd Oauth: Fix strictMode to reject users without an
  assigned role. #48474, @kyschouv</li>
<li>CloudWatch: Fix variable query tag migration. #48587, @iwysiu</li>
<li>Plugins: Ensure catching all appropriate 4xx api/ds/query
  scenarios. #47565, @wbrowne</li>
</ul>
</li>
<li>Bug fixes (8.5.1):<ul>
<li>Azure Monitor: Fix space character encoding for metrics query
  link to Azure Portal. #48139, @kevinwcyu</li>
<li>CloudWatch: Prevent log groups from being removed on query
  change. #47994, @asimpson</li>
<li>Cloudwatch: Fix template variables in variable queries.
  #48140, @iwysiu</li>
<li>Explore: Prevent direct access to explore if disabled via
  feature toggle. #47714, @Elfo404</li>
<li>InfluxDB: Fixes invalid no data alerts. #48295, @yesoreyeram</li>
<li>Navigation: Prevent navbar briefly showing on login. #47968,
  @ashharrison90</li>
<li>Plugins Catalog: Fix styling of hyperlinks. #48196, @marefr</li>
<li>Table: Fix filter crashes table. #48258, @zoltanbedi</li>
<li>TimeSeries: Properly stack series with missing datapoints.
  #48321, @leeoniya</li>
</ul>
</li>
<li>Features and enhancements (8.5.0):<ul>
<li>Alerting: Add contact points provisioning API. #47197,
  @JohnnyQQQQ</li>
<li>Alerting: Add resolved count to notification title when both
  firing and resolved present. #46697, @JacobsonMT</li>
<li>Alerting: Alert rule should wait For duration when execution
  error state is Alerting. #47052, @grobinson-grafana</li>
<li>Alerting: Classic conditions can now display multiple values.
  #46971, @gotjosh</li>
<li>Alerting: Display query from grafana-managed alert rules on
  /api/v1/rules. #45969, @gotjosh</li>
<li>Alerting: Enhance support for arbitrary group names in
  managed alerts. #47785, @gillesdemey</li>
<li>Alerting: add field for custom slack endpoint. #45751,
  @nathanrodman</li>
<li>Azure Monitor : Adding json formatting of error messages in
  Panel Header Corner and Inspect Error Tab. #44877, @yaelleC</li>
<li>Azure Monitor: Add 2 more Curated Dashboards for VM Insights.
  #45187, @jcolladokuri</li>
<li>CloudWatch: Handle new error codes for MetricInsights.
  #47033, @Gabrielopesantos</li>
<li>Dashboards: show changes in save dialog. #46557, @ryantxu</li>
<li>DataSource: Default data source is no longer a persisted
  state but just the default data source for new panels.
  #45132, @torkelo</li>
<li>DataSourcePlugin API: Allow queries import when changing data
  source type. #47435, @dprokop</li>
<li>Explore: Remove return to panel button. #45018, @gelicia</li>
<li>Explore: allow users to save Explore state to a new panel in
  a new dashboard. #45148, @Elfo404</li>
<li>Instrumentation: Proxy status code correction and various
  improvements. #47473, @marefr</li>
<li>Logging: Introduce feature toggle to activate gokit/log
  format. #47336, @ying-jeanne</li>
<li>NewsPanel: Add support for Atom feeds. #45390, @kaydelaney</li>
<li>Plugins: Add deprecation notice for /api/tsdb/query endpoint.
  #45238, @wbrowne</li>
<li>Plugins: Adding support for traceID field to accept
  variables. #45559, @vinisdl</li>
<li>PostgreSQL: __unixEpochGroup to support arithmetic expression
  as argument. #46764, @s0nik42</li>
<li>Profile/Help: Expose option to disable profile section and
  help menu. #46308, @cameronwaterman</li>
<li>Prometheus: Enable new visual query builder by default.
  #46634, @torkelo</li>
<li>SAML: Allow disabling of SAML signups. #47481, @mmandrus</li>
<li>SAML: Allow disabling of SAML signups. (Enterprise)</li>
<li>Table: New pagination option. #45732, @zoltanbedi</li>
<li>TablePanel: Add cell inspect option. #45620, @dprokop</li>
<li>Tempo / Trace Viewer: Support Span Links in Trace Viewer.
  #45632, @Shachi16</li>
<li>Tempo: Download span references in data inspector. #47074,
  @connorlindsey</li>
<li>Tempo: Separate trace to logs and loki search datasource
  config. #46655, @connorlindsey</li>
<li>Trace View: Show number of child spans. #44393, @tharun208</li>
<li>Transformations: Support escaped characters in key-value pair
  parsing. #47901, @aangelisc</li>
</ul>
</li>
<li>Bug fixes (8.5.0):<ul>
<li>Azure Monitor: Bug Fix for incorrect variable cascading for
  template variables. #47478, @jcolladokuri</li>
<li>CloudWatch: List all metrics properly in SQL autocomplete.
  #45898, @sunker</li>
<li>CloudWatch: Run query on blur in logs query field. #47454,
  @fridgepoet</li>
<li>Dashboard: Template variables are now correctly persisted
  when clicking breadcrumb links. #46790, @ashharrison90</li>
<li>DashboardPage: Remember scroll position when coming back
  panel edit / view panel. #47639, @torkelo</li>
<li>Panel Edit: Options search now works correctly when a
  logarithmic scale option is set. #47927, @ashharrison90</li>
<li>Postgres: Return tables with hyphenated schemes. #45754,
  @zuchka</li>
<li>Table panel: Fix horizontal scrolling when pagination is
  enabled. #47776, @dprokop</li>
<li>Variables: Ensure variables in query params are correctly
  recognised. #47049, @ashharrison90</li>
<li>Variables: Fix crash when changing query variable datasource.
  #44957, @joshhunt</li>
<li>Visualizations: Stack negative-valued series downwards.
  #47373, @leeoniya</li>
</ul>
</li>
<li>Breaking changes (8.5.0):
    For a proxied request, e.g. Grafana&#x27;s datasource or plugin
    proxy: If the request is cancelled, e.g. from the browser/by
    the client, the HTTP status code is now 499 Client closed
    request instead of 502 Bad gateway If the request times out,
    e.g. takes longer time than allowed, the HTTP status code is
    now 504 Gateway timeout instead of 502 Bad gateway. Issue
    #47473 The change in behavior is that negative-valued series
    are now stacked downwards from 0 (in their own stacks), rather
    than downwards from the top of the positive stacks. We now
    automatically group stacks by Draw style, Line interpolation,
    and Bar alignment, making it impossible to stack bars on top of
    lines, or smooth lines on top of stepped lines. Issue #47373
    The meaning of the default data source has now changed from
    being a persisted property in a panel. Before when you selected
    the default data source for a panel and later changed the
    default data source to another data source it would change all
    panels who were configured to use the default data source. From
    now on the default data source is just the default for new
    panels and changing the default will not impact any currently
    saved dashboards. Issue #45132 The Tooltip component provided
    by @grafana/ui is no longer automatically interactive (that is
    you can hover onto it and click a link or select text). It will
    from now on by default close automatically when you mouse out
    from the trigger element. To make tooltips behave like before
    set the new interactive property to true.</li>
<li>Deprecations (8.5.0):
    /api/tsdb/query API has been deprecated and will be removed in
    a future release. Use /api/ds/query instead. Issue #45238</li>
<li>Plugin development fixes & changes (8.5.0):<ul>
<li>Card: Increase clickable area when meta items are present.
  #47935, @ashharrison90</li>
<li>Loki: Fix operator description propup from being shortened.
  #46575, @glintik</li>
<li>Tooltips: Make tooltips non interactive by default. #45053,
  @torkelo</li>
</ul>
</li>
<li>Features and enhancements (8.4.7):<ul>
<li>CloudWatch: Added missing MemoryDB Namespace metrics. #47290,
  @james-deee</li>
<li>Histogram Panel: Take decimal into consideration. #47330,
  @mdvictor</li>
<li>TimeSeries: Sort tooltip values based on raw values. #46738,
  @dprokop</li>
</ul>
</li>
<li>Bug fixes (8.4.7):<ul>
<li>API: Include userId, orgId, uname in request logging
  middleware. #47183, @marefr</li>
<li>Elasticsearch: Respect maxConcurrentShardRequests datasource
  setting. #47120, @alexandrst88</li>
</ul>
</li>
<li>Features and enhancements (8.4.5):<ul>
<li>Instrumentation: Make backend plugin metrics endpoints
  available with optional authentication. #46467, @marefr</li>
<li>Table panel: Show datalinks for cell display modes JSON View
  and Gauge derivates. #46020, @mdvictor</li>
</ul>
</li>
<li>Bug fixes (8.4.5):<ul>
<li>Azure Monitor: Small bug fixes for Resource Picker. #46665,
  @sarahzinger</li>
<li>Logger: Use specified format for file logger. #46970, @sakjur</li>
<li>Logs: Handle missing fields in dataframes better. #46963,
  @gabor</li>
<li>ManageDashboards: Fix error when deleting all dashboards from
  folder view. #46877, @joshhunt</li>
</ul>
</li>
<li>Features and enhancements (8.4.4):<ul>
<li>Loki: Add unpack to autocomplete suggestions (#44623).
  #46573, @glintik</li>
<li>Plugins: allow using both Function and Class components for
  app plugins. #46148, @leventebalogh</li>
<li>TimeSeries: Add migration for Graph panel&#x27;s transform series
  override. #46577, @dprokop</li>
<li>TimeSeries: Preserve null/undefined values when performing
  negative y transform. #46584, @dprokop</li>
</ul>
</li>
<li>Bug fixes (8.4.4):<ul>
<li>CloudWatch: Use default http client from aws-sdk-go. #46370,
  @sunker</li>
<li>Dashboards: Fixes repeating by row and no refresh. #46565,</li>
<li>Gauge: Fixes blank viz when data link exists and orientation
  was horizontal. #46335, @torkelo</li>
<li>Search: sort results correctly when using postgres. #46466,
  @xlson</li>
<li>TagsInput: fix tags remove button accessibility issues.
  #46254, @Elfo404</li>
<li>TextPanel: Sanitize after markdown has been rendered to html.
  #46166, @ashharrison90</li>
</ul>
</li>
<li>Features and enhancements (8.4.3):<ul>
<li>Alerting: Grafana uses > instead of >= when checking the For
  duration. #46010</li>
<li>Alerting: Use expanded labels in dashboard annotations.
  #45726, @grobinson-grafana</li>
<li>Logs: Escape windows newline into single newline. #45771,
  @perosb</li>
</ul>
</li>
<li>Bug fixes (8.4.3):<ul>
<li>Alerting: Fix use of > instead of >= when checking the For
  duration. #46011, @grobinson-grafana</li>
<li>Azure Monitor: Fixes broken log queries that use workspace.
  #45820, @sunker</li>
<li>CloudWatch: Remove error message when using multi-valued
  template vars in region field. #45886, @sunker</li>
<li>Middleware: Fix IPv6 host parsing in CSRF check. #45911,
  @ying-jeanne</li>
</ul>
</li>
<li>Plugin development fixes & changes (8.4.3):<ul>
<li>ClipboardButton: Use a fallback when the Clipboard API is
  unavailable. #45831, @ashharrison90</li>
</ul>
</li>
<li>Features and enhancements (8.4.2):<ul>
<li>OAuth: Add setting to skip org assignment for external
  users. #34834, @baez90</li>
<li>Tracing: Add option to map tag names to log label names in
  trace to logs settings. #45178, @connorlindsey</li>
</ul>
</li>
<li>Bug fixes (8.4.2):<ul>
<li>Explore: Fix closing split pane when logs panel is
  used. #45602, @ifrost</li>
</ul>
</li>
<li>Features and enhancements (8.4.1):<ul>
<li>Cloudwatch: Add support for AWS/PrivateLink* metrics and
  dimensions. #45515, @szymonpk</li>
<li>Configuration: Add ability to customize okta login button
  name and icon. #44079, @DanCech</li>
<li>Tempo: Switch out Select with AsyncSelect component to get
  loading state in Tempo Search. #45110, @CatPerry</li>
</ul>
</li>
<li>Bug fixes (8.4.1):<ul>
<li>Alerting: Fix migrations by making send_alerts_to field
  nullable. #45572, @santihernandezc</li>
</ul>
</li>
<li>Features and enhancements (8.4.0):<ul>
<li>API: Extract OpenAPI specification from source code using
  go-swagger. #40528, @papagian</li>
<li>AccessControl: Disable user remove and user update roles when
  they do not have the permissions. #43429, @Jguer</li>
<li>AccessControl: Provisioning for teams. #43767, @gamab</li>
<li>API: Add usage stats preview endpoint. #43899, @Jguer</li>
<li>Alerting: Move slow queries in the scheduler to another
  goroutine. #44423, @grobinson-grafana</li>
<li>Alerting: Use time.Ticker instead of alerting.Ticker in
  ngalert. #44395, @grobinson-grafana</li>
<li>Alerting: add custom grouping to Alert Panel. #44559,</li>
<li>Analytics: Add user id tracking to google analytics.
  #42763, @autoric</li>
<li>Angular: Add AngularJS plugin support deprecation plan to
  docs site. #45149, @torkelo</li>
<li>Auth: implement auto_sign_up for auth.jwt. #43502, @sakjur</li>
<li>Azure Monitor Logs: Order subscriptions in resource picker by
  name. #45228, @sunker</li>
<li>Azure monitor Logs: Optimize data fetching in resource
  picker. #44549, @sunker</li>
<li>AzureMonitor: Filter list of resources by resourceType.
  #43522, @andresmgot</li>
<li>BarChart: color by field, x time field, bar radius, label
  skipping. #43257, @leeoniya</li>
<li>Chore: Implement OpenTelemetry in Grafana. #42674, @idafurjes</li>
<li>Cloud Monitoring: Adds metric type to Metric drop down
  options. #43268, @tw1nk</li>
<li>CloudWatch: Add Data Lifecycle Manager metrics and dimension.
  #43310, @ilyastoli</li>
<li>CloudWatch: Add Missing Elasticache Host-level metrics.
  #43455, @dhendo</li>
<li>CloudWatch: Add all ElastiCache Redis Metrics. #43336,
  @siavashs</li>
<li>CloudWatch: Add new AWS/ES metrics. #43034, @sunker</li>
<li>Cloudwatch: Add syntax highlighting and autocomplete for
  "Metric Search". #43985, @sarahzinger</li>
<li>Explore: Support custom display label for exemplar links for
  Prometheus datasource. #42732, @JokerQueue</li>
<li>Hotkeys: Make time range absolute/permanent. #43802, @davkal</li>
<li>Playlists: Enable sharing direct links to playlists. #44161,</li>
<li>SQLStore: Prevent concurrent migrations. #44101, @papagian</li>
<li>SSE: Add Mode to drop NaN/Inf/Null in Reduction operations.
  #43583, @kylebrandt</li>
<li>Setting: Support configuring feature toggles with bools
  instead of just passing an array. #43326, @bergquist</li>
<li>TimeSeries: Add support for negative Y and constant
  transform. #44774, @dprokop</li>
<li>Transformations: Add &#x27;JSON&#x27; field type to
  ConvertFieldTypeTransformer. #42624, @sd2k</li>
</ul>
</li>
<li>Bug fixes (8.4.0):<ul>
<li>Auth: Guarantee consistency of signed SigV4 headers.
  #45054, @wbrowne</li>
<li>CloudWatch: Fix MetricName resetting on Namespace change.
  #44165, @yaelleC</li>
<li>Cloudwatch : Fixed reseting metric name when changing
  namespace in Metric Query. #44612, @yaelleC</li>
<li>Explore: Avoid locking timepicker when range is inverted.
  #44790, @Elfo404</li>
<li>Instrumentation: Fix HTTP request instrumentation of
  authentication failures. #44234, @marefr</li>
<li>LibraryPanels: Prevent long descriptions and names from
  obscuring the delete button. #45190, @zuchka</li>
<li>OAuth: Fix parsing of ID token if header contains non-string
  value. #44159, @marefr</li>
<li>Panel Edit: Visualization search now works correctly with
  special characters. #45137, @ashharrison90</li>
<li>Provisioning: Fix duplicate validation when multiple
  organizations have been configured. #44151, @marefr</li>
<li>QueryField: Fix issue with undo history when suggestion is
  inserted (#28656). #39114, @glintik</li>
<li>TablePanel: Do not prefix columns with frame name if multiple
  frames and override active. #45174, @mdvictor</li>
</ul>
</li>
<li>Deprecations (8.4.0):
    AngularJS plugin support is now in a deprecated state, meaning
    it will be removed in a future release. Currently, that is
    planned for version 10 (in 2023). The documentation site has an
    article with more details on why, when, and how. Issue #45149</li>
<li>Update to version 8.3.10</li>
<li>Security:<ul>
<li>Fixes XSS vulnerability in the Unified Alerting
  (bsc#1201535, CVE-2022-31097)</li>
<li>Fixes OAuth account takeover vulnerability
  (bsc#1201539, CVE-2022-31107)</li>
</ul>
</li>
<li>Update to version 8.3.9</li>
<li>Bug fixes:<ul>
<li>Geomap: Display legend</li>
<li>Prometheus: Fix timestamp truncation</li>
</ul>
</li>
<li>Update to version 8.3.7<ul>
<li>Provisioning: Ensure that the default value for orgID is set
  when provisioning datasources to be deleted.</li>
</ul>
</li>
<li>Update to version 8.3.6<ul>
<li>Cloud Monitoring: Reduce request size when listing labels.</li>
<li>Explore: Show scalar data result in a table instead of graph.</li>
<li>Snapshots: Updates the default external snapshot server URL.</li>
<li>Table: Makes footer not overlap table content.</li>
<li>Tempo: Add request histogram to service graph datalink.</li>
<li>Tempo: Add time range to tempo search query behind a feature flag.</li>
<li>Tempo: Auto-clear results when changing query type.</li>
<li>Tempo: Display start time in search results as relative time.</li>
<li>CloudMonitoring: Fix resource labels in query editor.</li>
<li>Cursor sync: Apply the settings without saving the dashboard.</li>
<li>LibraryPanels: Fix for Error while cleaning library panels.</li>
<li>Logs Panel: Fix timestamp parsing for string dates without timezone.</li>
<li>Prometheus: Fix some of the alerting queries that use reduce/math operation.</li>
<li>TablePanel: Fix ad-hoc variables not working on default datasources.</li>
<li>Text Panel: Fix alignment of elements.</li>
<li>Variables: Fix for constant variables in self referencing links.</li>
</ul>
</li>
<li>Update _constraints to require at least 5GB, because with less we
  can&#x27;t build it.</li>
<li>Update to version 8.3.5 (jsc#SLE-23439, jsc#SLE-23422,
  jsc#SLE-24565)</li>
<li>Security: Fixes CVE-2021-43813 and CVE-2021-43815,
    bsc#1193686.</li>
<li>Security: Fixes CVE-2021-43798, bsc#1193492.</li>
<li>Security: Fixes CVE-2021-41244, bsc#1192763.</li>
<li>Security: Fixes CVE-2021-41174, bsc#1192383.
      fix CVE-2021-3711, bsc#1189520.<ul>
<li>Security: Update dependencies to fix CVE-2021-36222,
  bsc#1188571.</li>
</ul>
</li>
</ul>
<p>mgr-push:</p>
<ul>
<li>Version 5.0.1-1</li>
<li>Bump version to 5.0.0</li>
<li>Version 4.4.6-1</li>
<li>Remove unused makefiles</li>
<li>Version 4.4.5-1</li>
<li>Use http to connect to localhost server</li>
<li>Use bundle CA certificate in rhnpush</li>
<li>Version 4.4.4-1</li>
<li>remove pylint check at build time</li>
<li>Version 4.4.3-1</li>
<li>Ensure installation of make for building</li>
<li>Version 4.4.2-1</li>
<li>Update translation strings</li>
<li>Version 4.4.1-1</li>
<li>Bump version to 4.4.0</li>
</ul>
<p>prometheus-blackbox_exporter:</p>
<ul>
<li>Use obscpio for go modules service</li>
<li>Set version number</li>
<li>Set build date from SOURCE_DATE_EPOCH</li>
<li>Update to 0.24.0 (bsc#1212279, jsc#PED-4556)</li>
<li>Requires go1.19</li>
<li>Drop:</li>
<li>Avoid empty validation script</li>
<li>Add rc symlink for backwards compatibility</li>
<li>Fix authentication bypass via cache poisoning
  (CVE-2022-46146, bsc#1208062)</li>
<li>Add <code>min_version</code> parameter of <code>tls_config</code> to allow enabling
  TLS 1.0 and 1.1 (bsc#1209113)</li>
<li>On SUSE Linux Enterprise build always with Go >= 1.19 (bsc#1203599)</li>
<li>Build with go1.18 only for SLE-15-SP3 and 
  build with >= go1.19 on higher SP (bsc#1203599)</li>
<li>Require go1.18 (bsc#1203599, GH#19127)</li>
<li>Exclude s390 arch</li>
<li>Fix %pre section to avoid empty content</li>
<li>Updated to allow building on older rpmbuild.</li>
<li>Enhanced to build on Enterprise Linux 8</li>
</ul>
<p>prometheus-postgres_exporter:</p>
<ul>
<li>CVE-2022-46146: Fix authentication bypass via cache poisoning (bsc#1208060)</li>
<li>Remove duplicated call to systemd requirements</li>
<li>Do not build debug if RHEL >= 8</li>
<li>Do not strip if SUSE Linux Enterprise 15 SP3</li>
<li>Build at least with with Go >= 1.18 on RHEL</li>
<li>Build with Go >= 1.20 elsewhere</li>
<li>Adapt the systemd service security configuration
  to be able to start it on RHEL systems and clones</li>
<li>Create the prometheus user for RHEL systems and clones</li>
<li>Fix _service to pull correct version</li>
<li>Use go_modules source service</li>
<li>Upgrade to version 0.10.1:</li>
<li>Fix broken log-level for values other than debug (bsc#1208965)</li>
<li>Version/release lines above first usage of those macros.
  gh#uyuni-project/uyuni#5418</li>
<li>Prevent empty %pre section</li>
<li>Exclude s390 builds </li>
<li>Updated for RHEL8.</li>
</ul>
<p>python-hwdata:</p>
<ul>
<li>Declare the LICENSE file as license and not doc</li>
</ul>
<p>python-pyvmomi:</p>
<ul>
<li>Preparing submission to SUSE:SLE-15-SP3:Update as part of ECO PED-3623.</li>
</ul>
<p>rhnlib:</p>
<ul>
<li>Version 5.0.1-1</li>
<li>Specify a packager for Debian like distros</li>
<li>Version 4.4.6-1</li>
<li>Remove unused makefiles</li>
<li>Version 4.4.5-1</li>
<li>Use bundle CA certificate in rhnpush</li>
<li>Version 4.4.4-1</li>
<li>Only use TLSv1+ for SSL connections</li>
<li>Version 4.4.3-1</li>
<li>Ensure installation of make for building</li>
<li>Version 4.4.2-1</li>
<li>Don&#x27;t get stuck at the end of SSL transfers (bsc#1204032)</li>
<li>Version 4.4.1-1</li>
<li>Bump version to 4.4.0</li>
</ul>
<p>spacecmd:</p>
<ul>
<li>Version 5.0.1-1</li>
<li>Use localhost without ssl when running on the server</li>
<li>Version 4.4.10-1</li>
<li>Update translation strings</li>
<li>Version 4.4.9-1</li>
<li>Version 4.4.8-1</li>
<li>Add spacecmd function: cryptokey_update</li>
<li>Bypass traditional systems check on older SUMA instances (bsc#1208612)</li>
<li>fix argument parsing of distribution_update (bsc#1210458)</li>
<li>Version 4.4.7-1</li>
<li>remove pylint check at build time</li>
<li>Display activation key details after executing the corresponding command (bsc#1208719)</li>
<li>Show targetted packages before actually removing them (bsc#1207830)</li>
<li>Version 4.4.6-1</li>
<li>Fix spacecmd not showing any output for softwarechannel_diff 
    and softwarechannel_errata_diff (bsc#1207352)</li>
<li>Version 4.4.5-1</li>
<li>Prevent string api parameters to be parsed as dates if not in
    ISO-8601 format (bsc#1205759)</li>
<li>Add python-dateutil dependency, required to process date values in
    spacecmd api calls</li>
<li>Remove python3-simplejson dependency</li>
<li>Version 4.4.4-1</li>
<li>Correctly understand &#x27;ssm&#x27; keyword on scap scheduling</li>
<li>Add vendor_advisory information to errata_details call (bsc#1205207)</li>
<li>Change default port of "Containerized Proxy configuration" 8022</li>
<li>Version 4.4.3-1</li>
<li>Added two missing options to schedule product migration: allow-vendor-change
    and remove-products-without-successor (bsc#1204126)</li>
<li>Changed schedule product migration to use the correct API method</li>
<li>Fix dict_keys not supporting indexing in systems_setconfigchannelorger</li>
<li>Added a warning message for traditional stack deprecation</li>
<li>Remove "Undefined return code" from debug messages (bsc#1203283)</li>
<li>Version 4.4.2-1</li>
<li>Stop always showing help for valid proxy_container_config calls</li>
<li>Version 4.4.1-1</li>
<li>Process date values in spacecmd api calls (bsc#1198903)</li>
<li>Improve Proxy FQDN hint message</li>
<li>Version 4.3.14-1</li>
<li>Fix missing argument on system_listmigrationtargets (bsc#1201003)</li>
<li>Show correct help on calling kickstart_importjson with no arguments</li>
<li>Fix tracebacks on spacecmd kickstart_export (bsc#1200591)</li>
<li>Change proxy container config default filename to end with tar.gz</li>
<li>Version 4.3.13-1</li>
<li>Version 4.3.12-1</li>
<li>Version 4.3.11-1</li>
<li>on full system update call schedulePackageUpdate API (bsc#1197507)</li>
</ul>
<p>spacewalk-client-tools:</p>
<ul>
<li>Version 5.0.1-1</li>
<li>Bump version to 5.0.0</li>
<li>Version 4.4.7-1</li>
<li>Remove unused and deprecated/removed platform.dist import.</li>
<li>Version 4.4.6-1</li>
<li>Update translation strings</li>
<li>Tito requires to list the package source as %{name}-%{version}.tar.gz</li>
<li>Version 4.4.5-1</li>
<li>remove mgr-virtualization usage</li>
<li>remove dependency to suseRegisterInfo</li>
<li>Version 4.4.4-1</li>
<li>Version 4.4.3-1</li>
<li>Version 4.4.2-1</li>
<li>Version 4.4.1-1</li>
<li>Version 4.3.11-1</li>
<li>Version 4.3.10-1</li>
</ul>
<p>supportutils-plugin-salt:</p>
<ul>
<li>Update to version 1.2.2</li>
<li>Remove possible passwords from Salt configuration files (bsc#1201059)</li>
<li>Update to version 1.2.1</li>
<li>Remove ERROR messages on Salt client systems</li>
<li>Declare the LICENSE file as license and not doc</li>
<li>Update to version 1.2.0</li>
<li>Add support for Salt Bundle</li>
</ul>
<p>supportutils-plugin-susemanager-client:</p>
<ul>
<li>Version 5.0.1-1</li>
<li>Bump version to 5.0.0</li>
<li>Version 4.4.2-1</li>
<li>write configured crypto-policy in supportconfig</li>
<li>add cloud and payg checks</li>
<li>Version 4.4.1-1</li>
<li>Bump version to 4.4.0</li>
<li>Version 4.3.2-1</li>
<li>Add proxy containers config and logs</li>
</ul>
<p>uyuni-common-libs:</p>
<ul>
<li>Version 5.0.1-1</li>
<li>Bump version to 5.0.0</li>
<li>Version 4.4.4-1</li>
<li>Workaround for python3-debian bug about collecting control file (bsc#1211525, bsc#1208692)</li>
<li>Accept missing rhn.conf file</li>
<li>Use context manager for apache users in fileutils.py.</li>
<li>Version 4.4.3-1</li>
<li>Ensure installation of make for building.</li>
<li>Use versioned Python during packaging.</li>
<li>Version 4.4.2-1</li>
<li>unify user notification code on java side</li>
<li>Version 4.4.1-1</li>
<li>Do not allow creating path if nonexistent user or group in fileutils.</li>
<li>Version 4.3.5-1</li>
<li>Fix reposync issue about &#x27;rpm.hdr&#x27; object has no attribute &#x27;get&#x27;</li>
</ul>
<p>uyuni-proxy-systemd-services:</p>
<ul>
<li>Version 5.0.1-1</li>
<li>Bump version to 5.0.0</li>
<li>Version 4.4.2-1</li>
<li>Fix script for allowing using container images from different registry paths</li>
<li>Allow using container images from different registry paths</li>
<li>Version 4.4.1-1</li>
<li>Expose /etc/sysconfig/proxy variables to container services (bsc#1202945)</li>
<li>Version 4.3.6-1</li>
<li>Expose port 80 (bsc#1200142)</li>
<li>Use volumes rather than bind mounts</li>
<li>TFTPD to listen on udp port (bsc#1200968)</li>
<li>Add TAG variable in configuration </li>
<li>Version 4.3.5-1</li>
<li>Fix containers namespaces in configuration</li>
<li>Version 4.3.4-1</li>
<li>Rename container_images_path specfile macro to less generic one</li>
<li>Version 4.3.3-1</li>
<li>Default to SUSE Manager images only when installed from SUSE Manager</li>
</ul>



    
        <h2>Special Instructions and Notes:</h2>
        <ul>
            
            
            
        </ul>
    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                SUSE Manager Client Tools Beta for SLE Micro 5
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Manager-Tools-Beta-For-Micro-5-2024-196=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Manager Client Tools Beta for SLE 15
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Manager-Tools-15-BETA-2024-196=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    SUSE Manager Client Tools Beta for SLE Micro 5 (noarch)
                    <ul>
                        
                            <li>uyuni-proxy-systemd-services-5.0.1-159000.3.9.1</li>
                        
                            <li>dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Manager Client Tools Beta for SLE Micro 5 (aarch64 s390x x86_64)
                    <ul>
                        
                            <li>golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1</li>
                        
                            <li>prometheus-blackbox_exporter-0.24.0-159000.3.6.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Manager Client Tools Beta for SLE 15 (noarch)
                    <ul>
                        
                            <li>spacewalk-client-tools-5.0.1-159000.6.48.1</li>
                        
                            <li>python3-pyvmomi-6.7.3-159000.3.6.1</li>
                        
                            <li>spacewalk-check-5.0.1-159000.6.48.1</li>
                        
                            <li>python3-rhnlib-5.0.1-159000.6.30.1</li>
                        
                            <li>dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1</li>
                        
                            <li>ansible-doc-2.9.27-159000.3.9.1</li>
                        
                            <li>ansible-2.9.27-159000.3.9.1</li>
                        
                            <li>python3-spacewalk-check-5.0.1-159000.6.48.1</li>
                        
                            <li>spacecmd-5.0.1-159000.6.42.1</li>
                        
                            <li>mgr-push-5.0.1-159000.4.21.1</li>
                        
                            <li>supportutils-plugin-salt-1.2.2-159000.5.9.1</li>
                        
                            <li>uyuni-proxy-systemd-services-5.0.1-159000.3.9.1</li>
                        
                            <li>python3-mgr-push-5.0.1-159000.4.21.1</li>
                        
                            <li>spacewalk-client-setup-5.0.1-159000.6.48.1</li>
                        
                            <li>supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1</li>
                        
                            <li>python3-spacewalk-client-setup-5.0.1-159000.6.48.1</li>
                        
                            <li>python3-spacewalk-client-tools-5.0.1-159000.6.48.1</li>
                        
                            <li>python3-hwdata-2.3.5-159000.5.13.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Manager Client Tools Beta for SLE 15 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>firewalld-prometheus-config-0.1-159000.6.33.1</li>
                        
                            <li>golang-github-boynux-squid_exporter-1.6-159000.4.9.1</li>
                        
                            <li>golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1</li>
                        
                            <li>grafana-9.5.8-159000.4.24.1</li>
                        
                            <li>grafana-debuginfo-9.5.8-159000.4.24.1</li>
                        
                            <li>prometheus-blackbox_exporter-0.24.0-159000.3.6.1</li>
                        
                            <li>prometheus-postgres_exporter-0.10.1-159000.3.6.1</li>
                        
                            <li>golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1</li>
                        
                            <li>golang-github-boynux-squid_exporter-debuginfo-1.6-159000.4.9.1</li>
                        
                            <li>python3-uyuni-common-libs-5.0.1-159000.3.33.1</li>
                        
                            <li>golang-github-lusitaniae-apache_exporter-debuginfo-1.0.0-159000.4.12.1</li>
                        
                            <li>golang-github-prometheus-prometheus-2.45.0-159000.6.33.1</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2020-7753.html">https://www.suse.com/security/cve/CVE-2020-7753.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2021-20178.html">https://www.suse.com/security/cve/CVE-2021-20178.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2021-20180.html">https://www.suse.com/security/cve/CVE-2021-20180.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2021-20191.html">https://www.suse.com/security/cve/CVE-2021-20191.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2021-20228.html">https://www.suse.com/security/cve/CVE-2021-20228.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2021-3447.html">https://www.suse.com/security/cve/CVE-2021-3447.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2021-3583.html">https://www.suse.com/security/cve/CVE-2021-3583.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2021-3620.html">https://www.suse.com/security/cve/CVE-2021-3620.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2021-36222.html">https://www.suse.com/security/cve/CVE-2021-36222.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2021-3711.html">https://www.suse.com/security/cve/CVE-2021-3711.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2021-3807.html">https://www.suse.com/security/cve/CVE-2021-3807.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2021-3918.html">https://www.suse.com/security/cve/CVE-2021-3918.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2021-41174.html">https://www.suse.com/security/cve/CVE-2021-41174.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2021-41244.html">https://www.suse.com/security/cve/CVE-2021-41244.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2021-43138.html">https://www.suse.com/security/cve/CVE-2021-43138.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2021-43798.html">https://www.suse.com/security/cve/CVE-2021-43798.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2021-43813.html">https://www.suse.com/security/cve/CVE-2021-43813.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2021-43815.html">https://www.suse.com/security/cve/CVE-2021-43815.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-0155.html">https://www.suse.com/security/cve/CVE-2022-0155.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-23552.html">https://www.suse.com/security/cve/CVE-2022-23552.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-27664.html">https://www.suse.com/security/cve/CVE-2022-27664.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-29170.html">https://www.suse.com/security/cve/CVE-2022-29170.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-31097.html">https://www.suse.com/security/cve/CVE-2022-31097.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-31107.html">https://www.suse.com/security/cve/CVE-2022-31107.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-31123.html">https://www.suse.com/security/cve/CVE-2022-31123.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-31130.html">https://www.suse.com/security/cve/CVE-2022-31130.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-32149.html">https://www.suse.com/security/cve/CVE-2022-32149.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-35957.html">https://www.suse.com/security/cve/CVE-2022-35957.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-36062.html">https://www.suse.com/security/cve/CVE-2022-36062.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-39201.html">https://www.suse.com/security/cve/CVE-2022-39201.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-39229.html">https://www.suse.com/security/cve/CVE-2022-39229.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-39306.html">https://www.suse.com/security/cve/CVE-2022-39306.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-39307.html">https://www.suse.com/security/cve/CVE-2022-39307.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-39324.html">https://www.suse.com/security/cve/CVE-2022-39324.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-41715.html">https://www.suse.com/security/cve/CVE-2022-41715.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-41723.html">https://www.suse.com/security/cve/CVE-2022-41723.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-46146.html">https://www.suse.com/security/cve/CVE-2022-46146.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-0507.html">https://www.suse.com/security/cve/CVE-2023-0507.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-0594.html">https://www.suse.com/security/cve/CVE-2023-0594.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-1387.html">https://www.suse.com/security/cve/CVE-2023-1387.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-1410.html">https://www.suse.com/security/cve/CVE-2023-1410.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-2183.html">https://www.suse.com/security/cve/CVE-2023-2183.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-2801.html">https://www.suse.com/security/cve/CVE-2023-2801.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-3128.html">https://www.suse.com/security/cve/CVE-2023-3128.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1172110">https://bugzilla.suse.com/show_bug.cgi?id=1172110</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1176460">https://bugzilla.suse.com/show_bug.cgi?id=1176460</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1180816">https://bugzilla.suse.com/show_bug.cgi?id=1180816</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1180942">https://bugzilla.suse.com/show_bug.cgi?id=1180942</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1181119">https://bugzilla.suse.com/show_bug.cgi?id=1181119</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1181935">https://bugzilla.suse.com/show_bug.cgi?id=1181935</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1183684">https://bugzilla.suse.com/show_bug.cgi?id=1183684</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1187725">https://bugzilla.suse.com/show_bug.cgi?id=1187725</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1188061">https://bugzilla.suse.com/show_bug.cgi?id=1188061</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1188571">https://bugzilla.suse.com/show_bug.cgi?id=1188571</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1189520">https://bugzilla.suse.com/show_bug.cgi?id=1189520</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1191454">https://bugzilla.suse.com/show_bug.cgi?id=1191454</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1192154">https://bugzilla.suse.com/show_bug.cgi?id=1192154</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1192383">https://bugzilla.suse.com/show_bug.cgi?id=1192383</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1192696">https://bugzilla.suse.com/show_bug.cgi?id=1192696</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1192763">https://bugzilla.suse.com/show_bug.cgi?id=1192763</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1193492">https://bugzilla.suse.com/show_bug.cgi?id=1193492</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1193686">https://bugzilla.suse.com/show_bug.cgi?id=1193686</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1193688">https://bugzilla.suse.com/show_bug.cgi?id=1193688</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1197507">https://bugzilla.suse.com/show_bug.cgi?id=1197507</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1198903">https://bugzilla.suse.com/show_bug.cgi?id=1198903</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1199810">https://bugzilla.suse.com/show_bug.cgi?id=1199810</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1200142">https://bugzilla.suse.com/show_bug.cgi?id=1200142</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1200480">https://bugzilla.suse.com/show_bug.cgi?id=1200480</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1200591">https://bugzilla.suse.com/show_bug.cgi?id=1200591</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1200968">https://bugzilla.suse.com/show_bug.cgi?id=1200968</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1200970">https://bugzilla.suse.com/show_bug.cgi?id=1200970</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1201003">https://bugzilla.suse.com/show_bug.cgi?id=1201003</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1201059">https://bugzilla.suse.com/show_bug.cgi?id=1201059</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1201535">https://bugzilla.suse.com/show_bug.cgi?id=1201535</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1201539">https://bugzilla.suse.com/show_bug.cgi?id=1201539</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1202614">https://bugzilla.suse.com/show_bug.cgi?id=1202614</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1202945">https://bugzilla.suse.com/show_bug.cgi?id=1202945</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1203283">https://bugzilla.suse.com/show_bug.cgi?id=1203283</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1203596">https://bugzilla.suse.com/show_bug.cgi?id=1203596</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1203597">https://bugzilla.suse.com/show_bug.cgi?id=1203597</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1203599">https://bugzilla.suse.com/show_bug.cgi?id=1203599</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1204032">https://bugzilla.suse.com/show_bug.cgi?id=1204032</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1204126">https://bugzilla.suse.com/show_bug.cgi?id=1204126</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1204302">https://bugzilla.suse.com/show_bug.cgi?id=1204302</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1204303">https://bugzilla.suse.com/show_bug.cgi?id=1204303</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1204304">https://bugzilla.suse.com/show_bug.cgi?id=1204304</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1204305">https://bugzilla.suse.com/show_bug.cgi?id=1204305</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1204501">https://bugzilla.suse.com/show_bug.cgi?id=1204501</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1205207">https://bugzilla.suse.com/show_bug.cgi?id=1205207</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1205225">https://bugzilla.suse.com/show_bug.cgi?id=1205225</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1205227">https://bugzilla.suse.com/show_bug.cgi?id=1205227</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1205599">https://bugzilla.suse.com/show_bug.cgi?id=1205599</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1205759">https://bugzilla.suse.com/show_bug.cgi?id=1205759</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1207352">https://bugzilla.suse.com/show_bug.cgi?id=1207352</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1207749">https://bugzilla.suse.com/show_bug.cgi?id=1207749</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1207750">https://bugzilla.suse.com/show_bug.cgi?id=1207750</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1207830">https://bugzilla.suse.com/show_bug.cgi?id=1207830</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208046">https://bugzilla.suse.com/show_bug.cgi?id=1208046</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208049">https://bugzilla.suse.com/show_bug.cgi?id=1208049</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208060">https://bugzilla.suse.com/show_bug.cgi?id=1208060</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208062">https://bugzilla.suse.com/show_bug.cgi?id=1208062</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208065">https://bugzilla.suse.com/show_bug.cgi?id=1208065</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208270">https://bugzilla.suse.com/show_bug.cgi?id=1208270</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208293">https://bugzilla.suse.com/show_bug.cgi?id=1208293</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208298">https://bugzilla.suse.com/show_bug.cgi?id=1208298</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208612">https://bugzilla.suse.com/show_bug.cgi?id=1208612</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208692">https://bugzilla.suse.com/show_bug.cgi?id=1208692</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208719">https://bugzilla.suse.com/show_bug.cgi?id=1208719</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208819">https://bugzilla.suse.com/show_bug.cgi?id=1208819</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208821">https://bugzilla.suse.com/show_bug.cgi?id=1208821</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208965">https://bugzilla.suse.com/show_bug.cgi?id=1208965</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209113">https://bugzilla.suse.com/show_bug.cgi?id=1209113</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209645">https://bugzilla.suse.com/show_bug.cgi?id=1209645</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210458">https://bugzilla.suse.com/show_bug.cgi?id=1210458</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210640">https://bugzilla.suse.com/show_bug.cgi?id=1210640</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210907">https://bugzilla.suse.com/show_bug.cgi?id=1210907</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211525">https://bugzilla.suse.com/show_bug.cgi?id=1211525</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212099">https://bugzilla.suse.com/show_bug.cgi?id=1212099</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212100">https://bugzilla.suse.com/show_bug.cgi?id=1212100</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212279">https://bugzilla.suse.com/show_bug.cgi?id=1212279</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212641">https://bugzilla.suse.com/show_bug.cgi?id=1212641</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218843">https://bugzilla.suse.com/show_bug.cgi?id=1218843</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218844">https://bugzilla.suse.com/show_bug.cgi?id=1218844</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/MSQA-718">https://jira.suse.com/browse/MSQA-718</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-2145">https://jira.suse.com/browse/PED-2145</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-2617">https://jira.suse.com/browse/PED-2617</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-3576">https://jira.suse.com/browse/PED-3576</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-3694">https://jira.suse.com/browse/PED-3694</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-4556">https://jira.suse.com/browse/PED-4556</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-5405">https://jira.suse.com/browse/PED-5405</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-5406">https://jira.suse.com/browse/PED-5406</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/SLE-23422">https://jira.suse.com/browse/SLE-23422</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/SLE-23439">https://jira.suse.com/browse/SLE-23439</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/SLE-23631">https://jira.suse.com/browse/SLE-23631</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/SLE-24133">https://jira.suse.com/browse/SLE-24133</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/SLE-24565">https://jira.suse.com/browse/SLE-24565</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/SLE-24791">https://jira.suse.com/browse/SLE-24791</a>
                    </li>
                
            
        </ul>
    
</div>