<div class="container">
<h1>Security update for SUSE Manager Client Tools</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2024:1509-1</td>
</tr>
<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1008037">bsc#1008037</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1008038">bsc#1008038</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1010940">bsc#1010940</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1019021">bsc#1019021</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1038785">bsc#1038785</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1059235">bsc#1059235</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1099805">bsc#1099805</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1166389">bsc#1166389</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1171823">bsc#1171823</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1174145">bsc#1174145</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1174302">bsc#1174302</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1175993">bsc#1175993</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1177948">bsc#1177948</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216854">bsc#1216854</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219002">bsc#1219002</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219912">bsc#1219912</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221092">bsc#1221092</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221465">bsc#1221465</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222155">bsc#1222155</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/MSQA-760">jsc#MSQA-760</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>
Cross-References:
</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2016-8614.html">CVE-2016-8614</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2016-8628.html">CVE-2016-8628</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2016-8647.html">CVE-2016-8647</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2016-9587.html">CVE-2016-9587</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2017-7550.html">CVE-2017-7550</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2018-10874.html">CVE-2018-10874</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2020-10744.html">CVE-2020-10744</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2020-14330.html">CVE-2020-14330</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2020-14332.html">CVE-2020-14332</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2020-14365.html">CVE-2020-14365</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2020-1753.html">CVE-2020-1753</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-5764.html">CVE-2023-5764</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-6152.html">CVE-2023-6152</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-0690.html">CVE-2024-0690</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-1313.html">CVE-2024-1313</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">
<li class="list-group-item">
<span class="cvss-reference">CVE-2016-8614</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2016-8628</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">9.1</span>
<span class="cvss-vector">CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2016-8647</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.9</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2016-8647</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">2.2</span>
<span class="cvss-vector">CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2016-9587</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">8.1</span>
<span class="cvss-vector">CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2017-7550</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.5</span>
<span class="cvss-vector">CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2017-7550</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">9.8</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2017-7550</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">9.8</span>
<span class="cvss-vector">CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2018-10874</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2018-10874</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2020-10744</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2020-10744</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2020-14330</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2020-14330</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2020-14332</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2020-14332</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2020-14365</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2020-14365</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2020-1753</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-5764</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-5764</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-6152</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.4</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-0690</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-0690</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-1313</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">openSUSE Leap 15.3</li>
<li class="list-group-item">openSUSE Leap 15.4</li>
<li class="list-group-item">openSUSE Leap 15.5</li>
<li class="list-group-item">openSUSE Leap 15.6</li>
<li class="list-group-item">SUSE Linux Enterprise Desktop 15</li>
<li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP1</li>
<li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP2</li>
<li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP3</li>
<li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP4</li>
<li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP6</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP1</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP2</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP3</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP4</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Micro 5.0</li>
<li class="list-group-item">SUSE Linux Enterprise Micro 5.1</li>
<li class="list-group-item">SUSE Linux Enterprise Micro 5.2</li>
<li class="list-group-item">SUSE Linux Enterprise Micro 5.3</li>
<li class="list-group-item">SUSE Linux Enterprise Micro 5.4</li>
<li class="list-group-item">SUSE Linux Enterprise Micro 5.5</li>
<li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP1</li>
<li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP2</li>
<li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP3</li>
<li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP4</li>
<li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP6</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP1</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP2</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP3</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP4</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP6</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP1</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP2</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP3</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP4</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP6</li>
<li class="list-group-item">SUSE Manager Client Tools for SLE 15</li>
<li class="list-group-item">SUSE Manager Client Tools for SLE Micro 5</li>
<li class="list-group-item">SUSE Manager Proxy 4.3</li>
<li class="list-group-item">SUSE Manager Proxy 4.3 Module 4.3</li>
<li class="list-group-item">SUSE Manager Retail Branch Server 4.3</li>
<li class="list-group-item">SUSE Package Hub 15 15-SP5</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that solves 15 vulnerabilities, contains one feature and has four security fixes can now be installed.</p>
<h2>Description:</h2>
<p>This update fixes the following issues:</p>
<p>POS_Image-Graphical7 was updated to version 0.1.1710765237.46af599:</p>
<ul>
<li>
<p>Version 0.1.1710765237.46af599</p>
</li>
<li>
<p>Moved image services to dracut-saltboot package</p>
</li>
<li>
<p>Use salt bundle</p>
</li>
<li>
<p>Version 0.1.1645440615.7f1328c</p>
</li>
<li>
<p>Removed deprecated kiwi functions</p>
</li>
</ul>
<p>POS_Image-JeOS7 was updated to version 0.1.1710765237.46af599:</p>
<ul>
<li>
<p>Version 0.1.1710765237.46af599</p>
</li>
<li>
<p>Moved image services to dracut-saltboot package</p>
</li>
<li>
<p>Use salt bundle</p>
</li>
<li>
<p>Version 0.1.1645440615.7f1328c</p>
</li>
<li>
<p>Removed deprecated kiwi functions</p>
</li>
</ul>
<p>ansible received the following fixes:</p>
<ul>
<li>
<p>Security issues fixed:</p>
</li>
<li>
<p>CVE-2023-5764: Address issues where internal templating can cause unsafe
variables to lose their unsafe designation (bsc#1216854)</p>
<ul>
<li>Breaking changes:
assert - Nested templating may result in an inability for the conditional
to be evaluated. See the porting guide for more information.</li>
</ul>
</li>
<li>
<p>CVE-2024-0690: Address issue where ANSIBLE_NO_LOG was ignored (bsc#1219002)</p>
</li>
<li>CVE-2020-14365: Ensure that packages are GPG validated (bsc#1175993)</li>
<li>CVE-2020-10744: Fixed insecure temporary directory creation (bsc#1171823)</li>
<li>
<p>CVE-2018-10874: Fixed inventory variables loading from current working directory when running ad-hoc command that
can lead to code execution (bsc#1099805)</p>
</li>
<li>
<p>Bugs fixed: </p>
</li>
<li>
<p>Don't Require python-coverage, it is needed only for testing (bsc#1177948)</p>
</li>
</ul>
<p>dracut-saltboot was updated to version 0.1.1710765237.46af599:</p>
<ul>
<li>
<p>Version 0.1.1710765237.46af599</p>
</li>
<li>
<p>Load only first available leaseinfo (bsc#1221092)</p>
</li>
<li>
<p>Version 0.1.1681904360.84ef141</p>
</li>
</ul>
<p>grafana was updated to version 9.5.18:</p>
<ul>
<li>Grafana now requires Go 1.20</li>
<li>
<p>Security issues fixed:</p>
</li>
<li>
<p>CVE-2024-1313: Require same organisation when deleting snapshots (bsc#1222155)</p>
</li>
<li>
<p>CVE-2023-6152: Add email verification when updating user email (bsc#1219912)</p>
</li>
<li>
<p>Other non-security related changes:</p>
</li>
<li>
<p>Version 9.5.17:</p>
<ul>
<li>[FEATURE] Alerting: Backport use Alertmanager API v2</li>
</ul>
</li>
<li>
<p>Version 9.5.16:</p>
<ul>
<li>[BUGFIX] Annotations: Split cleanup into separate queries and
deletes to avoid deadlocks on MySQL</li>
</ul>
</li>
<li>
<p>Version 9.5.15:</p>
<ul>
<li>[FEATURE] Alerting: Attempt to retry retryable errors</li>
</ul>
</li>
<li>
<p>Version 9.5.14:</p>
<ul>
<li>[BUGFIX] Alerting: Fix state manager to not keep
datasource_uid and ref_id labels in state after Error</li>
<li>[BUGFIX] Transformations: Config overrides being lost when
config from query transform is applied</li>
<li>[BUGFIX] LDAP: Fix enable users on successfull login</li>
</ul>
</li>
<li>
<p>Version 9.5.13:</p>
<ul>
<li>[BUGFIX] BrowseDashboards: Only remember the most recent
expanded folder</li>
<li>[BUGFIX] Licensing: Pass func to update env variables when
starting plugin</li>
</ul>
</li>
<li>
<p>Version 9.5.12:</p>
<ul>
<li>[FEATURE] Azure: Add support for Workload Identity
authentication</li>
</ul>
</li>
<li>
<p>Version 9.5.9:</p>
<ul>
<li>[FEATURE] SSE: Fix DSNode to not panic when response has empty
response</li>
<li>[FEATURE] Prometheus: Handle the response with different field
key order</li>
<li>[BUGFIX] LDAP: Fix user disabling</li>
</ul>
</li>
</ul>
<p>mgr-daemon was updated to version 4.3.9-0:</p>
<ul>
<li>
<p>Version 4.3.9-0</p>
</li>
<li>
<p>Update translation strings</p>
</li>
</ul>
<p>spacecmd was updated to version 4.3.27-0:</p>
<ul>
<li>
<p>Version 4.3.27-0</p>
</li>
<li>
<p>Update translation strings</p>
</li>
</ul>
<p>spacewalk-client-tools was updated to version 4.3.19-0:</p>
<ul>
<li>
<p>Version 4.3.19-0</p>
</li>
<li>
<p>Update translation strings</p>
</li>
</ul>
<p>spacewalk-koan was updated to version version 4.3.6-0:</p>
<ul>
<li>
<p>Version 4.3.6-0</p>
</li>
<li>
<p>Change Docker image location for test</p>
</li>
</ul>
<p>uyuni-common-libs was updated to version 4.3.10-0:</p>
<ul>
<li>
<p>Version 4.3.10-0</p>
</li>
<li>
<p>Add support for package signature type V4 RSA/SHA384</p>
</li>
<li>Add support for package signature type V4 RSA/SHA512 (bsc#1221465)</li>
</ul>
<p>uyuni-proxy-systemd-services was updated to version 4.3.12-0:</p>
<ul>
<li>
<p>Version 4.3.12-0</p>
</li>
<li>
<p>Update to SUSE Manager 4.3.12</p>
</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
openSUSE Leap 15.5
<br/>
<code>zypper in -t patch openSUSE-SLE-15.5-2024-1509=1</code>
</li>
<li class="list-group-item">
SUSE Manager Client Tools for SLE 15
<br/>
<code>zypper in -t patch SUSE-SLE-Manager-Tools-15-2024-1509=1</code>
</li>
<li class="list-group-item">
SUSE Manager Client Tools for SLE Micro 5
<br/>
<code>zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2024-1509=1</code>
</li>
<li class="list-group-item">
SUSE Package Hub 15 15-SP5
<br/>
<code>zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1509=1</code>
</li>
<li class="list-group-item">
SUSE Manager Proxy 4.3 Module 4.3
<br/>
<code>zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-1509=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
openSUSE Leap 15.5 (noarch)
<ul>
<li>POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</li>
<li>ansible-2.9.27-150000.1.17.2</li>
<li>ansible-test-2.9.27-150000.1.17.2</li>
<li>ansible-doc-2.9.27-150000.1.17.2</li>
<li>spacecmd-4.3.27-150000.3.116.2</li>
<li>POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</li>
<li>dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</li>
</ul>
</li>
<li>
openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
<ul>
<li>golang-github-prometheus-promu-0.14.0-150000.3.18.2</li>
</ul>
</li>
<li>
SUSE Manager Client Tools for SLE 15 (noarch)
<ul>
<li>python3-spacewalk-koan-4.3.6-150000.3.33.2</li>
<li>POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</li>
<li>ansible-2.9.27-150000.1.17.2</li>
<li>python3-spacewalk-client-setup-4.3.19-150000.3.89.2</li>
<li>spacewalk-client-tools-4.3.19-150000.3.89.2</li>
<li>uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</li>
<li>mgr-daemon-4.3.9-150000.1.47.2</li>
<li>ansible-doc-2.9.27-150000.1.17.2</li>
<li>spacewalk-koan-4.3.6-150000.3.33.2</li>
<li>spacecmd-4.3.27-150000.3.116.2</li>
<li>POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</li>
<li>spacewalk-client-setup-4.3.19-150000.3.89.2</li>
<li>python3-spacewalk-check-4.3.19-150000.3.89.2</li>
<li>python3-spacewalk-client-tools-4.3.19-150000.3.89.2</li>
<li>dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</li>
<li>spacewalk-check-4.3.19-150000.3.89.2</li>
</ul>
</li>
<li>
SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64)
<ul>
<li>grafana-debuginfo-9.5.18-150000.1.63.2</li>
<li>python3-uyuni-common-libs-4.3.10-150000.1.39.2</li>
<li>grafana-9.5.18-150000.1.63.2</li>
</ul>
</li>
<li>
SUSE Manager Client Tools for SLE Micro 5 (noarch)
<ul>
<li>uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</li>
<li>dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</li>
</ul>
</li>
<li>
SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
<ul>
<li>golang-github-prometheus-promu-0.14.0-150000.3.18.2</li>
</ul>
</li>
<li>
SUSE Manager Proxy 4.3 Module 4.3 (noarch)
<ul>
<li>ansible-2.9.27-150000.1.17.2</li>
<li>ansible-doc-2.9.27-150000.1.17.2</li>
<li>uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://www.suse.com/security/cve/CVE-2016-8614.html">https://www.suse.com/security/cve/CVE-2016-8614.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2016-8628.html">https://www.suse.com/security/cve/CVE-2016-8628.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2016-8647.html">https://www.suse.com/security/cve/CVE-2016-8647.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2016-9587.html">https://www.suse.com/security/cve/CVE-2016-9587.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2017-7550.html">https://www.suse.com/security/cve/CVE-2017-7550.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2018-10874.html">https://www.suse.com/security/cve/CVE-2018-10874.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2020-10744.html">https://www.suse.com/security/cve/CVE-2020-10744.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2020-14330.html">https://www.suse.com/security/cve/CVE-2020-14330.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2020-14332.html">https://www.suse.com/security/cve/CVE-2020-14332.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2020-14365.html">https://www.suse.com/security/cve/CVE-2020-14365.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2020-1753.html">https://www.suse.com/security/cve/CVE-2020-1753.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-5764.html">https://www.suse.com/security/cve/CVE-2023-5764.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-6152.html">https://www.suse.com/security/cve/CVE-2023-6152.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-0690.html">https://www.suse.com/security/cve/CVE-2024-0690.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-1313.html">https://www.suse.com/security/cve/CVE-2024-1313.html</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1008037">https://bugzilla.suse.com/show_bug.cgi?id=1008037</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1008038">https://bugzilla.suse.com/show_bug.cgi?id=1008038</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1010940">https://bugzilla.suse.com/show_bug.cgi?id=1010940</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1019021">https://bugzilla.suse.com/show_bug.cgi?id=1019021</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1038785">https://bugzilla.suse.com/show_bug.cgi?id=1038785</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1059235">https://bugzilla.suse.com/show_bug.cgi?id=1059235</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1099805">https://bugzilla.suse.com/show_bug.cgi?id=1099805</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1166389">https://bugzilla.suse.com/show_bug.cgi?id=1166389</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1171823">https://bugzilla.suse.com/show_bug.cgi?id=1171823</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1174145">https://bugzilla.suse.com/show_bug.cgi?id=1174145</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1174302">https://bugzilla.suse.com/show_bug.cgi?id=1174302</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1175993">https://bugzilla.suse.com/show_bug.cgi?id=1175993</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1177948">https://bugzilla.suse.com/show_bug.cgi?id=1177948</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216854">https://bugzilla.suse.com/show_bug.cgi?id=1216854</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219002">https://bugzilla.suse.com/show_bug.cgi?id=1219002</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219912">https://bugzilla.suse.com/show_bug.cgi?id=1219912</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221092">https://bugzilla.suse.com/show_bug.cgi?id=1221092</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221465">https://bugzilla.suse.com/show_bug.cgi?id=1221465</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222155">https://bugzilla.suse.com/show_bug.cgi?id=1222155</a>
</li>
<li>
<a href="https://jira.suse.com/browse/MSQA-760">https://jira.suse.com/browse/MSQA-760</a>
</li>
</ul>
</div>