<div class="container">
    <h1>Security update for SUSE Manager Client Tools</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2023:3875-1</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>important</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1204501">#1204501</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208046">#1208046</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208270">#1208270</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213691">#1213691</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213880">#1213880</a>
                        </li>
                    
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/ECO-3319">ECO-3319</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/MSQA-699">MSQA-699</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-5405">PED-5405</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/SLE-24791">SLE-24791</a>
                        </li>
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-32149.html">CVE-2022-32149</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-41723.html">CVE-2022-41723</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-46146.html">CVE-2022-46146</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-29409.html">CVE-2023-29409</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-32149</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-32149</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-41723</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-41723</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-46146</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">8.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-46146</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.2</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-29409</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-29409</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">SUSE Manager Client Tools for RHEL, Liberty and Clones 9</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves four vulnerabilities, contains four features and has one security fix can now be installed.</p>

    


    
        <h2>Description:</h2>
    
    <p>This update fixes the following issues:</p>
<p>golang-github-lusitaniae-apache_exporter:</p>
<ul>
<li>Security issues fixed:</li>
<li>CVE-2022-32149: Fix denial of service vulnerability (bsc#1204501)</li>
<li>CVE-2022-41723: Fix uncontrolled resource consumption (bsc#1208270)</li>
<li>CVE-2022-46146: Fix authentication bypass vulnarability (bsc#1208046)</li>
<li>Changes and bugs fixed:</li>
<li>Updated to 1.0.0 (jsc#PED-5405)<ul>
<li>Improved flag parsing</li>
<li>Added support for custom headers</li>
</ul>
</li>
<li>Changes from 0.13.1<ul>
<li>Fix panic caused by missing flagConfig options</li>
</ul>
</li>
<li>Changes from 0.11.0 (jsc#SLE-24791)<ul>
<li>Add TLS support</li>
<li>Switch to logger, please check --log.level and --log.format flags</li>
</ul>
</li>
<li>Changes from 0.10.1<ul>
<li>Bugfix: Reset ProxyBalancer metrics on each scrape to
remove stale data</li>
</ul>
</li>
<li>Changes from 0.10.0<ul>
<li>Add Apache Proxy and other metrics</li>
</ul>
</li>
<li>Changes from 0.8.0<ul>
<li>Change commandline flags</li>
<li>Add metrics: Apache version, request duration total</li>
</ul>
</li>
<li>Changes from 0.7.0<ul>
<li>Handle OS TERM signals</li>
</ul>
</li>
<li>Changes from 0.6.0<ul>
<li>Add option to override host name</li>
</ul>
</li>
<li>Added support for Red Hat Enterprise Linux</li>
<li>Added AppArmor profile</li>
<li>Added sandboxing options to systemd service unit</li>
<li>Build using promu</li>
<li>Build with Go 1.19</li>
<li>Exclude s390 architecture</li>
</ul>
<p>golang-github-prometheus-node_exporter:</p>
<ul>
<li>CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server
  while validating signatures for extremely large RSA keys. (bsc#1213880)
  There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.</li>
</ul>
<p>golang-github-QubitProducts-exporter_exporter:</p>
<ul>
<li>CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server
  while validating signatures for extremely large RSA keys. (bsc#1213880)
  There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.</li>
</ul>
<p>prometheus-postgres_exporter:</p>
<ul>
<li>CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server
  while validating signatures for extremely large RSA keys. (bsc#1213880)
  There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.</li>
</ul>
<p>scap-security-guide:</p>
<ul>
<li>Updated to 0.1.69 (jsc#ECO-3319)</li>
<li>Introduce a JSON build manifest</li>
<li>Introduce a script to compare ComplianceAsCode versions</li>
<li>Introduce CCN profiles for Red Hat Enterprise Linux 9</li>
<li>Map rules to components</li>
<li>products/anolis23: supports Anolis OS 23</li>
<li>Render components to HTML</li>
<li>Store rendered control files</li>
<li>Test and use rules to components mapping</li>
<li>Use distributed product properties</li>
<li>Revert patch that breaks the SLE hardening (bsc#1213691)</li>
<li>Changes from 0.1.68 (jsc#ECO-3319)</li>
<li>Bump OL8 STIG version to V1R6</li>
<li>Introduce a Product class, make the project work with it</li>
<li>Introduce Fedora and Firefox CaC profiles for common workstation users</li>
<li>OL7 DISA STIG v2r11 update</li>
<li>Publish rendered policy artifacts</li>
<li>Update ANSSI BP-028 to version 2.0</li>
<li>Changes from 0.1.67 (jsc#ECO-3319)</li>
<li>Add utils/controlrefcheck.py</li>
<li>Red Hat Enterprise Linux 9 STIG Update Q1 2023</li>
<li>Include warning for NetworkManager keyfiles in Red Hat Enterprise Linux 9</li>
<li>OL7 stig v2r10 update</li>
<li>Bump version of OL8 STIG to V1R5</li>
<li>Various enhancements to SLE profiles</li>
</ul>
<p>spacecmd:</p>
<ul>
<li>Updated to 4.3.23-1</li>
<li>Update translation strings</li>
</ul>



    
        <h2>Special Instructions and Notes:</h2>
        <ul>
            
            
            
        </ul>
    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                SUSE Manager Client Tools for RHEL, Liberty and Clones 9
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-EL-9-CLIENT-TOOLS-2023-3875=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    SUSE Manager Client Tools for RHEL, Liberty and Clones 9 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>golang-github-lusitaniae-apache_exporter-debugsource-1.0.0-1.8.1</li>
                        
                            <li>prometheus-postgres_exporter-0.10.1-1.9.2</li>
                        
                            <li>golang-github-QubitProducts-exporter_exporter-debugsource-0.4.0-1.6.1</li>
                        
                            <li>golang-github-QubitProducts-exporter_exporter-debuginfo-0.4.0-1.6.1</li>
                        
                            <li>golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1</li>
                        
                            <li>golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Manager Client Tools for RHEL, Liberty and Clones 9 (aarch64 ppc64le x86_64)
                    <ul>
                        
                            <li>golang-github-prometheus-node_exporter-debuginfo-1.5.0-1.9.2</li>
                        
                            <li>golang-github-prometheus-node_exporter-1.5.0-1.9.2</li>
                        
                            <li>golang-github-prometheus-node_exporter-debugsource-1.5.0-1.9.2</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Manager Client Tools for RHEL, Liberty and Clones 9 (noarch)
                    <ul>
                        
                            <li>scap-security-guide-redhat-0.1.69-1.12.2</li>
                        
                            <li>spacecmd-4.3.23-1.18.2</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-32149.html">https://www.suse.com/security/cve/CVE-2022-32149.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-41723.html">https://www.suse.com/security/cve/CVE-2022-41723.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-46146.html">https://www.suse.com/security/cve/CVE-2022-46146.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-29409.html">https://www.suse.com/security/cve/CVE-2023-29409.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1204501">https://bugzilla.suse.com/show_bug.cgi?id=1204501</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208046">https://bugzilla.suse.com/show_bug.cgi?id=1208046</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208270">https://bugzilla.suse.com/show_bug.cgi?id=1208270</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213691">https://bugzilla.suse.com/show_bug.cgi?id=1213691</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213880">https://bugzilla.suse.com/show_bug.cgi?id=1213880</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/ECO-3319">https://jira.suse.com/browse/ECO-3319</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/MSQA-699">https://jira.suse.com/browse/MSQA-699</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-5405">https://jira.suse.com/browse/PED-5405</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/SLE-24791">https://jira.suse.com/browse/SLE-24791</a>
                    </li>
                
            
        </ul>
    
</div>