<div class="container">
    <h1>Security Beta update for SUSE Manager Client Tools and Salt</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2024:1427-1</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>moderate</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1008037">bsc#1008037</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1008038">bsc#1008038</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1010940">bsc#1010940</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1019021">bsc#1019021</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1038785">bsc#1038785</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1059235">bsc#1059235</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1099805">bsc#1099805</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1166389">bsc#1166389</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1171823">bsc#1171823</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1174145">bsc#1174145</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1174302">bsc#1174302</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1175993">bsc#1175993</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1177948">bsc#1177948</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216854">bsc#1216854</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219002">bsc#1219002</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219887">bsc#1219887</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219912">bsc#1219912</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220371">bsc#1220371</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221092">bsc#1221092</a>
                        </li>
                    
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/MSQA-759">jsc#MSQA-759</a>
                        </li>
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2016-8647.html">CVE-2016-8647</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2016-9587.html">CVE-2016-9587</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2017-7550.html">CVE-2017-7550</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2018-10874.html">CVE-2018-10874</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2020-14365.html">CVE-2020-14365</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-5764.html">CVE-2023-5764</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-6152.html">CVE-2023-6152</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-0690.html">CVE-2024-0690</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2016-8647</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.9</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2016-8647</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">2.2</span>
                                <span class="cvss-vector">CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2016-9587</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">8.1</span>
                                <span class="cvss-vector">CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2017-7550</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">8.5</span>
                                <span class="cvss-vector">CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2017-7550</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">9.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2017-7550</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">9.8</span>
                                <span class="cvss-vector">CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2018-10874</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2018-10874</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2020-14365</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2020-14365</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-5764</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.6</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-5764</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-6152</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-0690</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-0690</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">openSUSE Leap 15.3</li>
                    
                        <li class="list-group-item">openSUSE Leap 15.4</li>
                    
                        <li class="list-group-item">openSUSE Leap 15.5</li>
                    
                        <li class="list-group-item">openSUSE Leap 15.6</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP6</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.0</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP6</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP6</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP6</li>
                    
                        <li class="list-group-item">SUSE Manager Client Tools Beta for SLE 15</li>
                    
                        <li class="list-group-item">SUSE Manager Client Tools Beta for SLE Micro 5</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves eight vulnerabilities, contains one feature and has 11 security fixes can now be installed.</p>

    


    
        <h2>Description:</h2>
    
    <p>This update fixes the following issues:</p>
<p>POS_Image-Graphical7:</p>
<ul>
<li>Update to version 0.1.1710765237.46af599</li>
<li>Move image services to dracut-saltboot package</li>
<li>Use salt bundle</li>
<li>Update to version 0.1.1645440615.7f1328c</li>
<li>Remove deprecated kiwi functions</li>
</ul>
<p>POS_Image-JeOS7:</p>
<ul>
<li>Update to version 0.1.1710765237.46af599</li>
<li>Move image services to dracut-saltboot package</li>
<li>Use salt bundle</li>
<li>Update to version 0.1.1645440615.7f1328c</li>
<li>Remove deprecated kiwi functions</li>
</ul>
<p>ansible:</p>
<ul>
<li>CVE-2023-5764: Address issues where internal templating can cause unsafe
  variables to lose their unsafe designation (bsc#1216854)</li>
<li>breaking_changes:
    assert - Nested templating may result in an inability for the conditional
    to be evaluated. See the porting guide for more information.</li>
<li>CVE-2024-0690: Address issue where ANSIBLE_NO_LOG was ignored (bsc#1219002)</li>
<li>CVE-2020-14365: Do a GPG validation if the disable_gpg_check option is not set. (bsc#1175993)</li>
<li>Don&#x27;t Require python-coverage, it is needed only for testing (bsc#1177948)</li>
<li>CVE-2018-10874: Inventory variables are loaded from current working directory when running ad-hoc command that can
  lead to code execution (included upstream in 2.6.1) (bsc#1099805) </li>
</ul>
<p>dracut-saltboot:</p>
<ul>
<li>Update to version 0.1.1710765237.46af599 </li>
<li>Load only first available leaseinfo (bsc#1221092)</li>
<li>Update to version 0.1.1681904360.84ef141</li>
</ul>
<p>grafana:</p>
<ul>
<li>Require Go 1.20</li>
<li>Update to version 9.5.16:</li>
<li>[SECURITY] CVE-2023-6152: Add email verification when updating
    user email (bsc#1219912)</li>
<li>[BUGFIX] Annotations: Split cleanup into separate queries and
    deletes to avoid deadlocks on MySQL</li>
<li>Update to version 9.5.15:</li>
<li>[FEATURE] Alerting: Attempt to retry retryable errors</li>
<li>Update to version 9.5.14:</li>
<li>[BUGFIX] Alerting: Fix state manager to not keep
    datasource_uid and ref_id labels in state after Error</li>
<li>[BUGFIX] Transformations: Config overrides being lost when
    config from query transform is applied</li>
<li>[BUGFIX] LDAP: Fix enable users on successfull login</li>
<li>Update to version 9.5.13:</li>
<li>[BUGFIX] BrowseDashboards: Only remember the most recent
    expanded folder</li>
<li>[BUGFIX] Licensing: Pass func to update env variables when
    starting plugin</li>
<li>Update to version 9.5.12:</li>
<li>[FEATURE] Azure: Add support for Workload Identity
    authentication</li>
<li>Update to version 9.5.9:</li>
<li>[FEATURE] SSE: Fix DSNode to not panic when response has empty
    response</li>
<li>[FEATURE] Prometheus: Handle the response with different field
    key order</li>
<li>[BUGFIX] LDAP: Fix user disabling</li>
</ul>
<p>golang-github-prometheus-node_exporter:</p>
<ul>
<li>Add <code>device_error</code> label for filesystem metrics.</li>
<li>Update rtnetlink library to fix errors during ARP metrics collection.</li>
<li>Update to 1.7.0 (jsc#PED-7893, jsc#PED-7928):</li>
<li>[FEATURE] Add ZFS freebsd per dataset stats #2753</li>
<li>[FEATURE] Add cpu vulnerabilities reporting from sysfs #2721</li>
<li>[ENHANCEMENT] Parallelize stat calls in Linux filesystem
    collector #1772</li>
<li>[ENHANCEMENT] Add missing linkspeeds to ethtool collector #2711</li>
<li>[ENHANCEMENT] Add CPU MHz as the value for node_cpu_info metric
    #2778</li>
<li>[ENHANCEMENT] Improve qdisc collector performance #2779</li>
<li>[ENHANCEMENT] Add include and exclude filter for hwmon
    collector #2699</li>
<li>[ENHANCEMENT] Optionally fetch ARP stats via rtnetlink instead
    of procfs #2777</li>
<li>[BUFFIX] Fix ZFS arcstats on FreeBSD 14.0+ 2754</li>
<li>[BUGFIX] Fallback to 32-bit stats in netdev #2757</li>
<li>[BUGFIX] Close btrfs.FS handle after use #2780</li>
<li>[BUGFIX] Move RO status before error return #2807</li>
<li>[BUFFIX] Fix promhttp_metric_handler_errors_total being always
    active #2808</li>
<li>[BUGFIX] Fix nfsd v4 index miss #2824</li>
<li>Update to 1.6.1:
  (no source code changes in this release)</li>
<li>BuildRequire go1.20</li>
<li>Update to 1.6.0:</li>
<li>[CHANGE] Fix cpustat when some cpus are offline #2318</li>
<li>[CHANGE] Remove metrics of offline CPUs in CPU collector #2605</li>
<li>[CHANGE] Deprecate ntp collector #2603</li>
<li>[CHANGE] Remove bcache <code>cache_readaheads_totals</code> metrics #2583</li>
<li>[CHANGE] Deprecate supervisord collector #2685</li>
<li>[FEATURE] Enable uname collector on NetBSD #2559</li>
<li>[FEATURE] NetBSD support for the meminfo collector #2570</li>
<li>[FEATURE] NetBSD support for CPU collector #2626</li>
<li>[FEATURE] Add FreeBSD collector for netisr subsystem #2668</li>
<li>[FEATURE] Add softirqs collector #2669</li>
<li>[ENHANCEMENT] Add suspended as a <code>node_zfs_zpool_state</code> #2449</li>
<li>[ENHANCEMENT] Add administrative state of Linux network
    interfaces #2515</li>
<li>[ENHANCEMENT] Log current value of GOMAXPROCS #2537</li>
<li>[ENHANCEMENT] Add profiler options for perf collector #2542</li>
<li>[ENHANCEMENT] Allow root path as metrics path #2590</li>
<li>[ENHANCEMENT] Add cpu frequency governor metrics #2569</li>
<li>[ENHANCEMENT] Add new landing page #2622</li>
<li>[ENHANCEMENT] Reduce privileges needed for btrfs device stats #2634</li>
<li>[ENHANCEMENT] Add ZFS <code>memory_available_bytes</code> #2687</li>
<li>[ENHANCEMENT] Use <code>SCSI_IDENT_SERIAL</code> as serial in diskstats #2612</li>
<li>[ENHANCEMENT] Read missing from netlink netclass attributes from sysfs #2669</li>
<li>[BUGFIX] perf: fixes for automatically detecting the correct
    tracefs mountpoints #2553</li>
<li>[BUGFIX] Fix <code>thermal_zone</code> collector noise @2554</li>
<li>[BUGFIX] Fix a problem fetching the user wire count on FreeBSD
    2584</li>
<li>[BUGFIX] interrupts: Fix fields on linux aarch64 #2631</li>
<li>[BUGFIX] Remove metrics of offline CPUs in CPU collector #2605</li>
<li>[BUGFIX] Fix OpenBSD filesystem collector string parsing #2637</li>
<li>[BUGFIX] Fix bad reporting of <code>node_cpu_seconds_total</code> in
    OpenBSD #2663</li>
<li>Change go_modules archive in _service to use obscpio file</li>
</ul>
<p>spacecmd:</p>
<ul>
<li>Version 5.0.5-0</li>
<li>Update translation strings</li>
</ul>
<p>spacewalk-client-tools:</p>
<ul>
<li>Version 5.0.4-0</li>
<li>Remove rhn-profile-sync rhn_register spacewalk-channel and
    spacewalk-update-status</li>
</ul>
<p>supportutils-plugin-susemanager-client:</p>
<ul>
<li>Version 5.0.3-0</li>
<li>Remove rhnsd from client actions and server backend</li>
</ul>
<p>uyuni-tools:</p>
<ul>
<li>Version 0.1.7-0</li>
<li>Fix wrong Cobbler spacewalk_authentication_endpoint property after upgrade or migration</li>
<li>Fix migration script using missing awk in migration image</li>
<li>Version 0.1.6-0</li>
<li>Pull image from authenticated registry</li>
<li>Port 80 should be published to the port 80 of the containers.
    8080 is squid</li>
<li>Autogenerate the database password</li>
<li>Add mgrctl term command</li>
<li>Fix --version flag</li>
<li>Deny uyuni to suma upgrade and viceversa</li>
<li>Refactor upgrade to clarify script end adding post upgrade
    script (bsc#1219887)</li>
<li>Add mgradm install podman arguments to define big volumes storage</li>
<li>k8s migration use same functions as upgrade</li>
<li>Allow to use images from RPM if present</li>
<li>Schedule a system list refresh after migrate if not runned before</li>
<li>Ignore error on optional flag</li>
<li>Fix migration of multiple autoinstallable distributions</li>
<li>Obsolete uyuni-proxy-systemd-service package by mgrpxy</li>
<li>Add GitHub workflow for checking changelog</li>
<li>Allow installation using --image image:tag</li>
<li>Add command to register Peripheral server to Hub</li>
<li>Add Node exporter (9100) and Taskomatic (9800) ports to the list
    of open TCP ports</li>
<li>Fix minimal administrator password length</li>
<li>Do not assume the current host is a cluster node when getting
    kubelet version</li>
<li>Add mgrpxy start, stop and restart commands</li>
<li>Remove shm size constraints on the server</li>
<li>Add mgrpxy and mgradm status commands</li>
<li>Use uninstall commands dry run by default to avoid unintended
    removals</li>
<li>Make first user mandatory at install time</li>
<li>Add inspect and upgrade command</li>
<li>Improve error handling when exec.Command is used</li>
<li>Start/Stop/Restart command with kubernetes</li>
<li>Version 0.1.5-0</li>
<li>Install aardvark-dns if netavark is installed (bsc#1220371)</li>
</ul>



    
        <h2>Special Instructions and Notes:</h2>
        <ul>
            
            
            
        </ul>
    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                SUSE Manager Client Tools Beta for SLE 15
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Manager-Tools-15-BETA-2024-1427=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Manager Client Tools Beta for SLE Micro 5
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Manager-Tools-Beta-For-Micro-5-2024-1427=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    SUSE Manager Client Tools Beta for SLE 15 (noarch)
                    <ul>
                        
                            <li>ansible-2.9.27-159000.3.12.2</li>
                        
                            <li>ansible-doc-2.9.27-159000.3.12.2</li>
                        
                            <li>python3-spacewalk-check-5.0.4-159000.6.54.2</li>
                        
                            <li>spacecmd-5.0.5-159000.6.48.2</li>
                        
                            <li>supportutils-plugin-susemanager-client-5.0.3-159000.6.21.2</li>
                        
                            <li>mgrctl-zsh-completion-0.1.7-159000.3.8.1</li>
                        
                            <li>python3-spacewalk-client-tools-5.0.4-159000.6.54.2</li>
                        
                            <li>POS_Image-Graphical7-0.1.1710765237.46af599-159000.3.24.2</li>
                        
                            <li>spacewalk-client-setup-5.0.4-159000.6.54.2</li>
                        
                            <li>dracut-saltboot-0.1.1710765237.46af599-159000.3.33.2</li>
                        
                            <li>spacewalk-client-tools-5.0.4-159000.6.54.2</li>
                        
                            <li>POS_Image-JeOS7-0.1.1710765237.46af599-159000.3.24.2</li>
                        
                            <li>mgrctl-bash-completion-0.1.7-159000.3.8.1</li>
                        
                            <li>spacewalk-check-5.0.4-159000.6.54.2</li>
                        
                            <li>python3-spacewalk-client-setup-5.0.4-159000.6.54.2</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Manager Client Tools Beta for SLE 15 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>mgrctl-0.1.7-159000.3.8.1</li>
                        
                            <li>grafana-debuginfo-9.5.16-159000.4.30.2</li>
                        
                            <li>grafana-9.5.16-159000.4.30.2</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Manager Client Tools Beta for SLE Micro 5 (aarch64 s390x x86_64)
                    <ul>
                        
                            <li>mgrctl-0.1.7-159000.3.8.1</li>
                        
                            <li>golang-github-prometheus-node_exporter-1.5.0-159000.6.2.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Manager Client Tools Beta for SLE Micro 5 (noarch)
                    <ul>
                        
                            <li>mgrctl-bash-completion-0.1.7-159000.3.8.1</li>
                        
                            <li>mgrctl-zsh-completion-0.1.7-159000.3.8.1</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2016-8647.html">https://www.suse.com/security/cve/CVE-2016-8647.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2016-9587.html">https://www.suse.com/security/cve/CVE-2016-9587.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2017-7550.html">https://www.suse.com/security/cve/CVE-2017-7550.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2018-10874.html">https://www.suse.com/security/cve/CVE-2018-10874.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2020-14365.html">https://www.suse.com/security/cve/CVE-2020-14365.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-5764.html">https://www.suse.com/security/cve/CVE-2023-5764.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-6152.html">https://www.suse.com/security/cve/CVE-2023-6152.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-0690.html">https://www.suse.com/security/cve/CVE-2024-0690.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1008037">https://bugzilla.suse.com/show_bug.cgi?id=1008037</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1008038">https://bugzilla.suse.com/show_bug.cgi?id=1008038</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1010940">https://bugzilla.suse.com/show_bug.cgi?id=1010940</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1019021">https://bugzilla.suse.com/show_bug.cgi?id=1019021</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1038785">https://bugzilla.suse.com/show_bug.cgi?id=1038785</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1059235">https://bugzilla.suse.com/show_bug.cgi?id=1059235</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1099805">https://bugzilla.suse.com/show_bug.cgi?id=1099805</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1166389">https://bugzilla.suse.com/show_bug.cgi?id=1166389</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1171823">https://bugzilla.suse.com/show_bug.cgi?id=1171823</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1174145">https://bugzilla.suse.com/show_bug.cgi?id=1174145</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1174302">https://bugzilla.suse.com/show_bug.cgi?id=1174302</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1175993">https://bugzilla.suse.com/show_bug.cgi?id=1175993</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1177948">https://bugzilla.suse.com/show_bug.cgi?id=1177948</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216854">https://bugzilla.suse.com/show_bug.cgi?id=1216854</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219002">https://bugzilla.suse.com/show_bug.cgi?id=1219002</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219887">https://bugzilla.suse.com/show_bug.cgi?id=1219887</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219912">https://bugzilla.suse.com/show_bug.cgi?id=1219912</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220371">https://bugzilla.suse.com/show_bug.cgi?id=1220371</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221092">https://bugzilla.suse.com/show_bug.cgi?id=1221092</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/MSQA-759">https://jira.suse.com/browse/MSQA-759</a>
                    </li>
                
            
        </ul>
    
</div>