<div class="container">
    <h1>Security update for SUSE Manager Client Tools</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2023:3867-1</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>important</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1204501">#1204501</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208046">#1208046</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208270">#1208270</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208298">#1208298</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208692">#1208692</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211525">#1211525</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213880">#1213880</a>
                        </li>
                    
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/MSQA-699">MSQA-699</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-5405">PED-5405</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-5406">PED-5406</a>
                        </li>
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-32149.html">CVE-2022-32149</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-41723.html">CVE-2022-41723</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-46146.html">CVE-2022-46146</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-29409.html">CVE-2023-29409</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-32149</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-32149</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-41723</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-41723</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-46146</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">8.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-46146</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.2</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-29409</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-29409</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 12</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 12 SP1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 12 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 12 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 12 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 12 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 12 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 12 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 12 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 12</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 12 SP1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 12 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 12 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 12 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 12 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 12</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 12 SP1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 12 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 12 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 12 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 12 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2</li>
                    
                        <li class="list-group-item">SUSE Manager Client Tools for SLE 12</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves four vulnerabilities, contains three features and has three security fixes can now be installed.</p>

    


    
        <h2>Description:</h2>
    
    <p>This update fixes the following issues:</p>
<p>golang-github-lusitaniae-apache_exporter:</p>
<ul>
<li>Security issues fixed:</li>
<li>CVE-2022-32149: Fix denial of service vulnerability (bsc#1204501)</li>
<li>CVE-2022-41723: Fix uncontrolled resource consumption (bsc#1208270)</li>
<li>CVE-2022-46146: Fix authentication bypass vulnarability (bsc#1208046)</li>
<li>Changes and bugs fixed:</li>
<li>Updated to 1.0.0 (jsc#PED-5405)<ul>
<li>Improved flag parsing</li>
<li>Added support for custom headers</li>
</ul>
</li>
<li>Changes from 0.13.1<ul>
<li>Fix panic caused by missing flagConfig options</li>
</ul>
</li>
<li>Added AppArmor profile</li>
<li>Added sandboxing options to systemd service unit</li>
<li>Build using promu</li>
<li>Build with Go 1.19</li>
<li>Exclude s390 architecture</li>
</ul>
<p>golang-github-prometheus-alertmanager:</p>
<ul>
<li>CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server
  while validating signatures for extremely large RSA keys. (bsc#1213880)
  There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.</li>
</ul>
<p>golang-github-prometheus-node_exporter:</p>
<ul>
<li>CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server
  while validating signatures for extremely large RSA keys. (bsc#1213880)
  There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.</li>
</ul>
<p>golang-github-prometheus-prometheus:</p>
<ul>
<li>This update introduces breaking changes. Please, read carefully the provided informations.</li>
<li>Security issues fixed:</li>
<li>CVE-2022-41723: Fix uncontrolled resource consumption by updating Go to version 1.20.1 (bsc#1208298)</li>
<li>Updated to 2.45.0 (jsc#PED-5406):</li>
<li>[FEATURE] API: New limit parameter to limit the number of items returned by <code>/api/v1/status/tsdb</code> endpoint</li>
<li>[FEATURE] Config: Add limits to global config</li>
<li>[FEATURE] Consul SD: Added support for <code>path_prefix</code></li>
<li>[FEATURE] Native histograms: Add option to scrape both classic and native histograms.</li>
<li>[FEATURE] Native histograms: Added support for two more arithmetic operators <code>avg_over_time</code> and <code>sum_over_time</code></li>
<li>[FEATURE] Promtool: When providing the block id, only one block will be loaded and analyzed</li>
<li>[FEATURE] Remote-write: New Azure ad configuration to support remote writing directly to Azure Monitor workspace</li>
<li>[FEATURE] TSDB: Samples per chunk are now configurable with flag <code>storage.tsdb.samples-per-chunk</code>. By default set
    to its former value 120</li>
<li>[ENHANCEMENT] Native histograms: bucket size can now be limited to avoid scrape fails</li>
<li>[ENHANCEMENT] TSDB: Dropped series are now deleted from the WAL sooner</li>
<li>[BUGFIX] Native histograms: ChunkSeries iterator now checks if a new sample can be appended to the open chunk</li>
<li>[BUGFIX] Native histograms: Fix Histogram Appender <code>Appendable()</code> segfault</li>
<li>[BUGFIX] Native histograms: Fix setting reset header to gauge histograms in seriesToChunkEncoder</li>
<li>[BUGFIX] TSDB: Tombstone intervals are not modified after Get() call</li>
<li>[BUGFIX] TSDB: Use path/filepath to set the WAL directory.</li>
<li>Changes from 2.44.0:</li>
<li>[FEATURE] Remote-read: Handle native histograms</li>
<li>[FEATURE] Promtool: Health and readiness check of prometheus server in CLI</li>
<li>[FEATURE] PromQL: Add <code>query_samples_total</code> metric, the total number of samples loaded by all queries</li>
<li>[ENHANCEMENT] Storage: Optimise buffer used to iterate through samples</li>
<li>[ENHANCEMENT] Scrape: Reduce memory allocations on target labels</li>
<li>[ENHANCEMENT] PromQL: Use faster heap method for <code>topk()</code> / <code>bottomk()</code></li>
<li>[ENHANCEMENT] Rules API: Allow filtering by rule name</li>
<li>[ENHANCEMENT] Native Histograms: Various fixes and improvements</li>
<li>[ENHANCEMENT] UI: Search of scraping pools is now case-insensitive</li>
<li>[ENHANCEMENT] TSDB: Add an affirmative log message for successful WAL repair</li>
<li>[BUGFIX] TSDB: Block compaction failed when shutting down</li>
<li>[BUGFIX] TSDB: Out-of-order chunks could be ignored if the write-behind log was deleted</li>
<li>Changes from 2.43.1</li>
<li>[BUGFIX] Labels: Set() after Del() would be ignored, which broke some relabeling rules</li>
<li>Changes from 2.43.0:</li>
<li>[FEATURE] Promtool: Add HTTP client configuration to query commands</li>
<li>[FEATURE] Scrape: Add <code>include_scrape_configs</code> to include scrape configs from different files</li>
<li>[FEATURE] HTTP client: Add <code>no_proxy</code> to exclude URLs from proxied requests</li>
<li>[FEATURE] HTTP client: Add <code>proxy_from_enviroment</code> to read proxies from env variables</li>
<li>[ENHANCEMENT] API: Add support for setting lookback delta per query via the API</li>
<li>[ENHANCEMENT] API: Change HTTP status code from 503/422 to 499 if a request is canceled</li>
<li>[ENHANCEMENT] Scrape: Allow exemplars for all metric types</li>
<li>[ENHANCEMENT] TSDB: Add metrics for head chunks and WAL folders size</li>
<li>[ENHANCEMENT] TSDB: Automatically remove incorrect snapshot with index that is ahead of WAL</li>
<li>[ENHANCEMENT] TSDB: Improve Prometheus parser error outputs to be more comprehensible</li>
<li>[ENHANCEMENT] UI: Scope <code>group by</code> labels to metric in autocompletion</li>
<li>[BUGFIX] Scrape: Fix <code>prometheus_target_scrape_pool_target_limit</code> metric not set before reloading</li>
<li>[BUGFIX] TSDB: Correctly update <code>prometheus_tsdb_head_chunks_removed_total</code> and <code>prometheus_tsdb_head_chunks</code>
    metrics when reading WAL</li>
<li>[BUGFIX] TSDB: Use the correct unit (seconds) when recording out-of-order append deltas in the
    <code>prometheus_tsdb_sample_ooo_delta</code> metric</li>
<li>Changes from 2.42.0:
  This release comes with a new feature coverage for native histograms and breaking changes.
  If you are trying native histograms already, we recommend you remove the <code>wal</code> directory when upgrading. Because the
  old WAL record for native histograms is not backward compatible in v2.42.0, this will lead to some data loss for the
  latest data. Additionally, if you scrape "float histograms" or use recording rules on native histograms in v2.42.0
  (which writes float histograms), it is a one-way street since older versions do not support float histograms.</li>
<li>[CHANGE] <strong>breaking</strong> TSDB: Changed WAL record format for the experimental native histograms</li>
<li>[FEATURE] Add &#x27;keep_firing_for&#x27; field to alerting rules</li>
<li>[FEATURE] Promtool: Add support of selecting timeseries for TSDB dump</li>
<li>[ENHANCEMENT] Agent: Native histogram support.</li>
<li>[ENHANCEMENT] Rules: Support native histograms in recording rules</li>
<li>[ENHANCEMENT] SD: Add container ID as a meta label for pod targets for Kubernetes</li>
<li>[ENHANCEMENT] SD: Add VM size label to azure service discovery</li>
<li>[ENHANCEMENT] Support native histograms in federation</li>
<li>[ENHANCEMENT] TSDB: Add gauge histogram support</li>
<li>[ENHANCEMENT] TSDB/Scrape: Support FloatHistogram that represents buckets as float64 values</li>
<li>[ENHANCEMENT] UI: Show individual scrape pools on /targets page</li>
<li>Changes from 2.41.0:</li>
<li>[FEATURE] Relabeling: Add keepequal and dropequal relabel actions</li>
<li>[FEATURE] Add support for HTTP proxy headers</li>
<li>[ENHANCEMENT] Reload private certificates when changed on disk</li>
<li>[ENHANCEMENT] Add max_version to specify maximum TLS version in tls_config</li>
<li>[ENHANCEMENT] Add goos and goarch labels to prometheus_build_info</li>
<li>[ENHANCEMENT] SD: Add proxy support for EC2 and LightSail SDs</li>
<li>[ENHANCEMENT] SD: Add new metric prometheus_sd_file_watcher_errors_total</li>
<li>[ENHANCEMENT] Remote Read: Use a pool to speed up marshalling</li>
<li>[ENHANCEMENT] TSDB: Improve handling of tombstoned chunks in iterators</li>
<li>[ENHANCEMENT] TSDB: Optimize postings offset table reading</li>
<li>[BUGFIX] Scrape: Validate the metric name, label names, and label values after relabeling</li>
<li>[BUGFIX] Remote Write receiver and rule manager: Fix error handling</li>
<li>Changes from 2.40.7:</li>
<li>[BUGFIX] TSDB: Fix queries involving negative buckets of native histograms</li>
<li>Changes from 2.40.5:</li>
<li>[BUGFIX] TSDB: Fix queries involving native histograms due to improper reset of iterators</li>
<li>Changes from 2.40.3:</li>
<li>[BUGFIX] TSDB: Fix compaction after a deletion is called</li>
<li>Changes from 2.40.2:</li>
<li>[BUGFIX] UI: Fix black-on-black metric name color in dark mode</li>
<li>Changes from 2.40.1:</li>
<li>[BUGFIX] TSDB: Fix alignment for atomic int64 for 32 bit architecture</li>
<li>[BUGFIX] Scrape: Fix accept headers</li>
<li>Changes from 2.40.0:</li>
<li>[FEATURE] Add experimental support for native histograms.
    Enable with the flag --enable-feature=native-histograms.</li>
<li>[FEATURE] SD: Add service discovery for OVHcloud</li>
<li>[ENHANCEMENT] Kubernetes SD: Use protobuf encoding</li>
<li>[ENHANCEMENT] TSDB: Use golang.org/x/exp/slices for improved sorting speed</li>
<li>[ENHANCEMENT] Consul SD: Add enterprise admin partitions. Adds __meta_consul_partition label. Adds partition
    config in consul_sd_config</li>
<li>[BUGFIX] API: Fix API error codes for /api/v1/labels and /api/v1/series</li>
<li>Changes from 2.39.1:</li>
<li>[BUGFIX] Rules: Fix notifier relabel changing the labels on active alerts</li>
<li>Changes from 2.39.0:</li>
<li>[FEATURE] experimental TSDB: Add support for ingesting out-of-order samples. This is configured via
    out_of_order_time_window field in the config file; check config file docs for more info</li>
<li>[ENHANCEMENT] API: /-/healthy and /-/ready API calls now also respond to a HEAD request on top of existing
    GET support.</li>
<li>[ENHANCEMENT] PuppetDB SD: Add __meta_puppetdb_query label.</li>
<li>[ENHANCEMENT] AWS EC2 SD: Add __meta_ec2_region label.</li>
<li>[ENHANCEMENT] AWS Lightsail SD: Add __meta_lightsail_region label.</li>
<li>[ENHANCEMENT] Scrape: Optimise relabeling by re-using memory.</li>
<li>[ENHANCEMENT] TSDB: Improve WAL replay timings.</li>
<li>[ENHANCEMENT] TSDB: Optimise memory by not storing unnecessary data in the memory.</li>
<li>[ENHANCEMENT] TSDB: Allow overlapping blocks by default.
    --storage.tsdb.allow-overlapping-blocks now has no effect.</li>
<li>[ENHANCEMENT] UI: Click to copy label-value pair from query result to clipboard.</li>
<li>[BUGFIX] TSDB: Turn off isolation for Head compaction to fix a memory leak.</li>
<li>[BUGFIX] TSDB: Fix &#x27;invalid magic number 0&#x27; error on Prometheus startup.</li>
<li>[BUGFIX] PromQL: Properly close file descriptor when logging unfinished queries.</li>
<li>[BUGFIX] Agent: Fix validation of flag options and prevent WAL from growing more than desired.</li>
<li>Changes from 2.38.0:</li>
<li>[FEATURE]: Web: Add a /api/v1/format_query HTTP API endpoint that allows pretty-formatting PromQL expressions.</li>
<li>[FEATURE]: UI: Add support for formatting PromQL expressions in the UI.</li>
<li>[FEATURE]: DNS SD: Support MX records for discovering targets.</li>
<li>[FEATURE]: Templates: Add toTime() template function that allows converting sample timestamps to
    Go time.Time values</li>
<li>[ENHANCEMENT]: Kubernetes SD: Add
    __meta_kubernetes_service_port_number meta label indicating the service port number.
    __meta_kubernetes_pod_container_image meta label indicating the container image.</li>
<li>[ENHANCEMENT]: PromQL: When a query panics, also log the query itself alongside the panic message.</li>
<li>[ENHANCEMENT]: UI: Tweak colors in the dark theme to improve the contrast ratio.</li>
<li>[ENHANCEMENT]: Web: Speed up calls to /api/v1/rules by avoiding locks and using atomic types instead.</li>
<li>[ENHANCEMENT]: Scrape: Add a no-default-scrape-port feature flag, which omits or removes any default HTTP (:80)
    or HTTPS (:443) ports in the target&#x27;s scrape address.</li>
<li>[BUGFIX]: TSDB: In the WAL watcher metrics, expose the
    type="exemplar" label instead of type="unknown" for exemplar records.</li>
<li>[BUGFIX]: TSDB: Fix race condition around allocating series IDs during chunk snapshot loading.</li>
</ul>
<p>golang-github-QubitProducts-exporter_exporter:</p>
<ul>
<li>CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server
  while validating signatures for extremely large RSA keys. (bsc#1213880)
  There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.</li>
</ul>
<p>grafana:</p>
<ul>
<li>CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server
  while validating signatures for extremely large RSA keys. (bsc#1213880)
  There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.</li>
</ul>
<p>prometheus-blackbox_exporter:</p>
<ul>
<li>CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server
  while validating signatures for extremely large RSA keys. (bsc#1213880)
  There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.</li>
</ul>
<p>prometheus-postgres_exporter:</p>
<ul>
<li>CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server
  while validating signatures for extremely large RSA keys. (bsc#1213880)
  There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.</li>
</ul>
<p>spacecmd:</p>
<ul>
<li>Updated to 4.3.23-1</li>
<li>Update translation strings</li>
</ul>
<p>supportutils-plugin-susemanager-client:</p>
<ul>
<li>Updated to 4.3.3-1</li>
<li>Write configured crypto-policy in supportconfig</li>
<li>Add cloud and Pay-as-you-go checks</li>
</ul>
<p>uyuni-common-libs:</p>
<ul>
<li>Updated to 4.3.9-1</li>
<li>Workaround for python3-debian bug about collecting control file (bsc#1211525, bsc#1208692)</li>
</ul>



    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                SUSE Manager Client Tools for SLE 12
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Manager-Tools-12-2023-3867=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise High Performance Computing 12 SP5
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3867=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Server 12 SP5
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3867=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Server for SAP Applications 12 SP5
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3867=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    SUSE Manager Client Tools for SLE 12 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2</li>
                        
                            <li>prometheus-blackbox_exporter-debuginfo-0.24.0-1.23.2</li>
                        
                            <li>golang-github-prometheus-alertmanager-0.23.0-1.21.2</li>
                        
                            <li>golang-github-prometheus-node_exporter-1.5.0-1.27.2</li>
                        
                            <li>prometheus-postgres_exporter-0.10.1-1.14.3</li>
                        
                            <li>golang-github-prometheus-prometheus-2.45.0-1.47.3</li>
                        
                            <li>golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2</li>
                        
                            <li>prometheus-blackbox_exporter-0.24.0-1.23.2</li>
                        
                            <li>python2-uyuni-common-libs-4.3.9-1.36.3</li>
                        
                            <li>grafana-9.5.5-1.54.3</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Manager Client Tools for SLE 12 (noarch)
                    <ul>
                        
                            <li>spacecmd-4.3.23-38.127.3</li>
                        
                            <li>supportutils-plugin-susemanager-client-4.3.3-6.27.2</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64)
                    <ul>
                        
                            <li>golang-github-prometheus-node_exporter-1.5.0-1.27.2</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>golang-github-prometheus-node_exporter-1.5.0-1.27.2</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
                    <ul>
                        
                            <li>golang-github-prometheus-node_exporter-1.5.0-1.27.2</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-32149.html">https://www.suse.com/security/cve/CVE-2022-32149.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-41723.html">https://www.suse.com/security/cve/CVE-2022-41723.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-46146.html">https://www.suse.com/security/cve/CVE-2022-46146.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-29409.html">https://www.suse.com/security/cve/CVE-2023-29409.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1204501">https://bugzilla.suse.com/show_bug.cgi?id=1204501</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208046">https://bugzilla.suse.com/show_bug.cgi?id=1208046</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208270">https://bugzilla.suse.com/show_bug.cgi?id=1208270</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208298">https://bugzilla.suse.com/show_bug.cgi?id=1208298</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208692">https://bugzilla.suse.com/show_bug.cgi?id=1208692</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211525">https://bugzilla.suse.com/show_bug.cgi?id=1211525</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213880">https://bugzilla.suse.com/show_bug.cgi?id=1213880</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/MSQA-699">https://jira.suse.com/browse/MSQA-699</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-5405">https://jira.suse.com/browse/PED-5405</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-5406">https://jira.suse.com/browse/PED-5406</a>
                    </li>
                
            
        </ul>
    
</div>