<div class="container">
    <h1>Security update for Multi-Linux Manager Client Tools</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2025:01987-1</td>
        </tr>
        <tr>
            <th>Release Date:</th>
            <td>2025-06-18T02:09:14Z</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>moderate</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208752">bsc#1208752</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231844">bsc#1231844</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233343">bsc#1233343</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236510">bsc#1236510</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236515">bsc#1236515</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236516">bsc#1236516</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238680">bsc#1238680</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238686">bsc#1238686</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238703">bsc#1238703</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1241683">bsc#1241683</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1241687">bsc#1241687</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1241809">bsc#1241809</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1243672">bsc#1243672</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1243714">bsc#1243714</a>
                        </li>
                    
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/MSQA-992">jsc#MSQA-992</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-11740">jsc#PED-11740</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-12872">jsc#PED-12872</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-12918">jsc#PED-12918</a>
                        </li>
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-45288.html">CVE-2023-45288</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-9264.html">CVE-2024-9264</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-9476.html">CVE-2024-9476</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2025-22870.html">CVE-2025-22870</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2025-22872.html">CVE-2025-22872</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2025-2703.html">CVE-2025-2703</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2025-29923.html">CVE-2025-29923</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2025-3454.html">CVE-2025-3454</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-45288</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.9</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-45288</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-9264</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">9.4</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-9264</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">9.9</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-9264</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">9.4</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-9264</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">9.9</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-9264</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">8.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-9476</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-9476</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.1</span>
                                <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-9476</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">0.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-22870</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.8</span>
                                <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-22870</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-22870</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-22872</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.3</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-22872</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-22872</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-2703</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-2703</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-29923</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-29923</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-3454</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-3454</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 12</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 12 SP1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 12 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 12 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 12 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 12 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 12 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 12 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 12 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 12</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 12 SP1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 12 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 12 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 12 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 12 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 12 SP5 LTSS</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 12</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 12 SP1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 12 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 12 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 12 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 12 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2</li>
                    
                        <li class="list-group-item">SUSE Manager Client Tools for SLE 12</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves eight vulnerabilities, contains four features and has six security fixes can now be installed.</p>

    


    
        <h2>Description:</h2>
    
    <p>This update fixes the following issues:</p>
<p>golang-github-prometheus-prometheus was updated to version 2.53.4:</p>
<ul>
<li>Security issues fixed:</li>
<li>CVE-2023-45288: Require Go >= 1.23 for building (bsc#1236516)</li>
<li>
<p>CVE-2025-22870: Bumped golang.org/x/net to version 0.39.0 (bsc#1238686)</p>
</li>
<li>
<p>Other bugs fixes from version 2.53.4:   </p>
</li>
<li>Runtime: fixed GOGC being set to 0 when installed
    with empty prometheus.yml file resulting high cpu usage</li>
<li>Scrape: fixed dropping valid metrics after previous
    scrape failed</li>
</ul>
<p>prometheus-blackbox_exporter was updated from version 0.24.0 to 0.26.0 (jsc#PED-12872):   </p>
<ul>
<li>Security issues fixed:</li>
<li>CVE-2025-22870: Fixed proxy bypassing using IPv6 zone IDs (bsc#1238680)</li>
<li>
<p>CVE-2023-45288: Fixed closing connections when receiving too many headers (bsc#1236515)</p>
</li>
<li>
<p>Other changes from version 0.26.0:</p>
</li>
<li>Changes:<ul>
<li>Replace go-kit/log with log/slog module.</li>
</ul>
</li>
<li>Features:<ul>
<li>Add metric to record tls ciphersuite negotiated during
  handshake.</li>
<li>Add a way to export labels with content matched by the probe.
  Reports Certificate Serial number.</li>
</ul>
</li>
<li>Enhancement:<ul>
<li>Add stale workflow to start sync with stale.yaml in Prometheus.</li>
</ul>
</li>
<li>
<p>Bug fixes:</p>
<ul>
<li>Only register grpc TLS metrics on successful handshake.</li>
</ul>
</li>
<li>
<p>Other changes from version 0.25.0:</p>
</li>
<li>Features:<ul>
<li>Allow to get Probe logs by target.</li>
<li>Log errors from probe.</li>
</ul>
</li>
<li>Bug fixes:<ul>
<li>Prevent logging confusing error message.</li>
<li>Explicit registration of internal exporter metrics.</li>
</ul>
</li>
</ul>
<p>grafana was updated from version 10.4.15 to 11.5.5 (jsc#PED-12918):</p>
<ul>
<li>Security issues fixed:</li>
<li>CVE-2025-4123: Fix cross-site scripting vulnerability (bsc#1243714).</li>
<li>CVE-2025-22872: Bump golang.org/x/net/html (bsc#1241809)</li>
<li>CVE-2025-3580: Prevent unauthorized server admin deletion (bsc#1243672).</li>
<li>CVE-2025-29923: Bump github.com/redis/go-redis/v9 to 9.6.3.</li>
<li>CVE-2025-3454: Sanitize paths before evaluating access to route (bsc#1241683).</li>
<li>CVE-2025-2703: Fix built-in XY Chart plugin (bsc#1241687).</li>
<li>CVE-2025-22870: Bump golang.org/x/net (bsc#1238703).</li>
<li>CVE-2024-9476: Fix Migration Assistant issue (bsc#1233343)</li>
<li>CVE-2024-9264: SQL Expressions (bsc#1231844)</li>
<li>CVE-2023-45288: Bump golang.org/x/net (bsc#1236510)</li>
<li>
<p>CVE-2025-22870: Bump golang.org/x/net to version 0.37.0 (bsc#1238686)</p>
</li>
<li>
<p>Potential breaking changes in version 11.5.0:</p>
</li>
<li>
<p>Loki: Default to /labels API with query param instead of /series API.</p>
</li>
<li>
<p>Potential breaking changes in version 11.0.1:</p>
</li>
<li>
<p>If you had selected your language as "Português Brasileiro"
    previously, this will be reset. You have to select it again in
    your Preferences for the fix to be applied and the translations
    will then be shown.</p>
</li>
<li>
<p>Potential breaking changes in version 11.0.0:</p>
</li>
<li>AngularJS support is turned off by default.</li>
<li>Legacy alerting is entirely removed.</li>
<li>Subfolders cause very rare issues with folders which have
    slashes in their names.</li>
<li>The input data source is removed.</li>
<li>Data sources: Responses which are associated with hidden
    queries will be removed (filtered) by Grafana.</li>
<li>The URL which is generated when viewing an individual repeated
    panel has changed.</li>
<li>React Router is deprecated.</li>
<li>
<p>The grafana/e2e testing tool is deprecated.</p>
</li>
<li>
<p>This update brings many new features, enhancements and fixes highlighted at:</p>
</li>
<li>https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-5/</li>
<li>https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-4/</li>
<li>https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-3/</li>
<li>https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-2/</li>
<li>https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-1/</li>
<li>https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-0/</li>
</ul>
<p>golang-github-prometheus-node_exporter was updated to version 1.9.1:</p>
<ul>
<li>Security issues fixed:</li>
<li>
<p>CVE-2025-22870: Bumped golang.org/x/net to version 0.37.0 (bsc#1238686)</p>
</li>
<li>
<p>Other changes from version 1.9.1:</p>
</li>
<li>pressure: Fix missing IRQ on older kernels</li>
<li>Fix Darwin memory leak</li>
</ul>
<p>golang-github-prometheus-alertmanager:</p>
<ul>
<li>Security issues fixed: </li>
<li>CVE-2025-22870: Fix proxy bypassing using IPv6 zone IDs (bsc#1238686)</li>
<li>CVE-2023-45288: Fix HTTP/2 CONTINUATION flood in net/http (bsc#1236516)</li>
</ul>



    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                SUSE Manager Client Tools for SLE 12
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Manager-Tools-12-2025-1987=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Server 12 SP5 LTSS
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1987=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1987=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    SUSE Manager Client Tools for SLE 12 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>grafana-11.5.5-1.79.2</li>
                        
                            <li>golang-github-prometheus-node_exporter-1.9.1-1.36.2</li>
                        
                            <li>prometheus-blackbox_exporter-0.26.0-1.27.1</li>
                        
                            <li>golang-github-prometheus-prometheus-2.53.4-1.60.2</li>
                        
                            <li>golang-github-prometheus-alertmanager-0.26.0-1.31.2</li>
                        
                            <li>prometheus-blackbox_exporter-debuginfo-0.26.0-1.27.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>golang-github-prometheus-node_exporter-1.9.1-1.36.2</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
                    <ul>
                        
                            <li>golang-github-prometheus-node_exporter-1.9.1-1.36.2</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-45288.html">https://www.suse.com/security/cve/CVE-2023-45288.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-9264.html">https://www.suse.com/security/cve/CVE-2024-9264.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-9476.html">https://www.suse.com/security/cve/CVE-2024-9476.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2025-22870.html">https://www.suse.com/security/cve/CVE-2025-22870.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2025-22872.html">https://www.suse.com/security/cve/CVE-2025-22872.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2025-2703.html">https://www.suse.com/security/cve/CVE-2025-2703.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2025-29923.html">https://www.suse.com/security/cve/CVE-2025-29923.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2025-3454.html">https://www.suse.com/security/cve/CVE-2025-3454.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208752">https://bugzilla.suse.com/show_bug.cgi?id=1208752</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231844">https://bugzilla.suse.com/show_bug.cgi?id=1231844</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233343">https://bugzilla.suse.com/show_bug.cgi?id=1233343</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236510">https://bugzilla.suse.com/show_bug.cgi?id=1236510</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236515">https://bugzilla.suse.com/show_bug.cgi?id=1236515</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236516">https://bugzilla.suse.com/show_bug.cgi?id=1236516</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238680">https://bugzilla.suse.com/show_bug.cgi?id=1238680</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238686">https://bugzilla.suse.com/show_bug.cgi?id=1238686</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238703">https://bugzilla.suse.com/show_bug.cgi?id=1238703</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1241683">https://bugzilla.suse.com/show_bug.cgi?id=1241683</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1241687">https://bugzilla.suse.com/show_bug.cgi?id=1241687</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1241809">https://bugzilla.suse.com/show_bug.cgi?id=1241809</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1243672">https://bugzilla.suse.com/show_bug.cgi?id=1243672</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1243714">https://bugzilla.suse.com/show_bug.cgi?id=1243714</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/MSQA-992">https://jira.suse.com/browse/MSQA-992</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-11740">https://jira.suse.com/browse/PED-11740</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-12872">https://jira.suse.com/browse/PED-12872</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-12918">https://jira.suse.com/browse/PED-12918</a>
                    </li>
                
            
        </ul>
    
</div>