<div class="container">
    <h1>Security update for SUSE Manager Client Tools</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2024:1509-1</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>important</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1008037">bsc#1008037</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1008038">bsc#1008038</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1010940">bsc#1010940</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1019021">bsc#1019021</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1038785">bsc#1038785</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1059235">bsc#1059235</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1099805">bsc#1099805</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1166389">bsc#1166389</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1171823">bsc#1171823</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1174145">bsc#1174145</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1174302">bsc#1174302</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1175993">bsc#1175993</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1177948">bsc#1177948</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216854">bsc#1216854</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219002">bsc#1219002</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219912">bsc#1219912</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221092">bsc#1221092</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221465">bsc#1221465</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222155">bsc#1222155</a>
                        </li>
                    
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/MSQA-760">jsc#MSQA-760</a>
                        </li>
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2016-8614.html">CVE-2016-8614</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2016-8628.html">CVE-2016-8628</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2016-8647.html">CVE-2016-8647</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2016-9587.html">CVE-2016-9587</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2017-7550.html">CVE-2017-7550</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2018-10874.html">CVE-2018-10874</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2020-10744.html">CVE-2020-10744</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2020-14330.html">CVE-2020-14330</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2020-14332.html">CVE-2020-14332</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2020-14365.html">CVE-2020-14365</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2020-1753.html">CVE-2020-1753</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-5764.html">CVE-2023-5764</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-6152.html">CVE-2023-6152</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-0690.html">CVE-2024-0690</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-1313.html">CVE-2024-1313</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2016-8614</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2016-8628</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">9.1</span>
                                <span class="cvss-vector">CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2016-8647</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.9</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2016-8647</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">2.2</span>
                                <span class="cvss-vector">CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2016-9587</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">8.1</span>
                                <span class="cvss-vector">CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2017-7550</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">8.5</span>
                                <span class="cvss-vector">CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2017-7550</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">9.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2017-7550</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">9.8</span>
                                <span class="cvss-vector">CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2018-10874</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2018-10874</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2020-10744</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2020-10744</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2020-14330</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2020-14330</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2020-14332</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2020-14332</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2020-14365</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2020-14365</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2020-1753</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-5764</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.6</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-5764</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-6152</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-0690</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-0690</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-1313</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">openSUSE Leap 15.3</li>
                    
                        <li class="list-group-item">openSUSE Leap 15.4</li>
                    
                        <li class="list-group-item">openSUSE Leap 15.5</li>
                    
                        <li class="list-group-item">openSUSE Leap 15.6</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP6</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.0</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP6</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP6</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP6</li>
                    
                        <li class="list-group-item">SUSE Manager Client Tools for SLE 15</li>
                    
                        <li class="list-group-item">SUSE Manager Client Tools for SLE Micro 5</li>
                    
                        <li class="list-group-item">SUSE Manager Proxy 4.3</li>
                    
                        <li class="list-group-item">SUSE Manager Proxy 4.3 Module 4.3</li>
                    
                        <li class="list-group-item">SUSE Manager Retail Branch Server 4.3</li>
                    
                        <li class="list-group-item">SUSE Package Hub 15 15-SP5</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves 15 vulnerabilities, contains one feature and has four security fixes can now be installed.</p>

    


    
        <h2>Description:</h2>
    
    <p>This update fixes the following issues:</p>
<p>POS_Image-Graphical7 was updated to version 0.1.1710765237.46af599:</p>
<ul>
<li>
<p>Version 0.1.1710765237.46af599</p>
</li>
<li>
<p>Moved image services to dracut-saltboot package</p>
</li>
<li>
<p>Use salt bundle</p>
</li>
<li>
<p>Version 0.1.1645440615.7f1328c</p>
</li>
<li>
<p>Removed deprecated kiwi functions</p>
</li>
</ul>
<p>POS_Image-JeOS7 was updated to version 0.1.1710765237.46af599:</p>
<ul>
<li>
<p>Version 0.1.1710765237.46af599</p>
</li>
<li>
<p>Moved image services to dracut-saltboot package</p>
</li>
<li>
<p>Use salt bundle</p>
</li>
<li>
<p>Version 0.1.1645440615.7f1328c</p>
</li>
<li>
<p>Removed deprecated kiwi functions</p>
</li>
</ul>
<p>ansible received the following fixes:</p>
<ul>
<li>
<p>Security issues fixed:</p>
</li>
<li>
<p>CVE-2023-5764: Address issues where internal templating can cause unsafe
    variables to lose their unsafe designation (bsc#1216854)</p>
<ul>
<li>Breaking changes:
  assert - Nested templating may result in an inability for the conditional
  to be evaluated. See the porting guide for more information.</li>
</ul>
</li>
<li>
<p>CVE-2024-0690: Address issue where ANSIBLE_NO_LOG was ignored (bsc#1219002)</p>
</li>
<li>CVE-2020-14365: Ensure that packages are GPG validated (bsc#1175993)</li>
<li>CVE-2020-10744: Fixed insecure temporary directory creation (bsc#1171823)</li>
<li>
<p>CVE-2018-10874: Fixed inventory variables loading from current working directory when running ad-hoc command that
    can lead to code execution (bsc#1099805)</p>
</li>
<li>
<p>Bugs fixed:  </p>
</li>
<li>
<p>Don&#x27;t Require python-coverage, it is needed only for testing (bsc#1177948)</p>
</li>
</ul>
<p>dracut-saltboot was updated to version 0.1.1710765237.46af599:</p>
<ul>
<li>
<p>Version 0.1.1710765237.46af599</p>
</li>
<li>
<p>Load only first available leaseinfo (bsc#1221092)</p>
</li>
<li>
<p>Version 0.1.1681904360.84ef141</p>
</li>
</ul>
<p>grafana was updated to version 9.5.18:</p>
<ul>
<li>Grafana now requires Go 1.20</li>
<li>
<p>Security issues fixed:</p>
</li>
<li>
<p>CVE-2024-1313: Require same organisation when deleting snapshots (bsc#1222155)</p>
</li>
<li>
<p>CVE-2023-6152: Add email verification when updating user email (bsc#1219912)</p>
</li>
<li>
<p>Other non-security related changes:</p>
</li>
<li>
<p>Version 9.5.17:</p>
<ul>
<li>[FEATURE] Alerting: Backport use Alertmanager API v2</li>
</ul>
</li>
<li>
<p>Version 9.5.16:</p>
<ul>
<li>[BUGFIX] Annotations: Split cleanup into separate queries and
  deletes to avoid deadlocks on MySQL</li>
</ul>
</li>
<li>
<p>Version 9.5.15:</p>
<ul>
<li>[FEATURE] Alerting: Attempt to retry retryable errors</li>
</ul>
</li>
<li>
<p>Version 9.5.14:</p>
<ul>
<li>[BUGFIX] Alerting: Fix state manager to not keep
  datasource_uid and ref_id labels in state after Error</li>
<li>[BUGFIX] Transformations: Config overrides being lost when
  config from query transform is applied</li>
<li>[BUGFIX] LDAP: Fix enable users on successfull login</li>
</ul>
</li>
<li>
<p>Version 9.5.13:</p>
<ul>
<li>[BUGFIX] BrowseDashboards: Only remember the most recent
  expanded folder</li>
<li>[BUGFIX] Licensing: Pass func to update env variables when
  starting plugin</li>
</ul>
</li>
<li>
<p>Version 9.5.12:</p>
<ul>
<li>[FEATURE] Azure: Add support for Workload Identity
  authentication</li>
</ul>
</li>
<li>
<p>Version 9.5.9:</p>
<ul>
<li>[FEATURE] SSE: Fix DSNode to not panic when response has empty
  response</li>
<li>[FEATURE] Prometheus: Handle the response with different field
  key order</li>
<li>[BUGFIX] LDAP: Fix user disabling</li>
</ul>
</li>
</ul>
<p>mgr-daemon was updated to version 4.3.9-0:</p>
<ul>
<li>
<p>Version 4.3.9-0</p>
</li>
<li>
<p>Update translation strings</p>
</li>
</ul>
<p>spacecmd was updated to version 4.3.27-0:</p>
<ul>
<li>
<p>Version 4.3.27-0</p>
</li>
<li>
<p>Update translation strings</p>
</li>
</ul>
<p>spacewalk-client-tools was updated to version 4.3.19-0:</p>
<ul>
<li>
<p>Version 4.3.19-0</p>
</li>
<li>
<p>Update translation strings</p>
</li>
</ul>
<p>spacewalk-koan was updated to version version 4.3.6-0:</p>
<ul>
<li>
<p>Version 4.3.6-0</p>
</li>
<li>
<p>Change Docker image location for test</p>
</li>
</ul>
<p>uyuni-common-libs was updated to version 4.3.10-0:</p>
<ul>
<li>
<p>Version 4.3.10-0</p>
</li>
<li>
<p>Add support for package signature type V4 RSA/SHA384</p>
</li>
<li>Add support for package signature type V4 RSA/SHA512 (bsc#1221465)</li>
</ul>
<p>uyuni-proxy-systemd-services was updated to version 4.3.12-0:</p>
<ul>
<li>
<p>Version 4.3.12-0</p>
</li>
<li>
<p>Update to SUSE Manager 4.3.12</p>
</li>
</ul>



    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                openSUSE Leap 15.5
                
                    
                        <br/>
                        <code>zypper in -t patch openSUSE-SLE-15.5-2024-1509=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Manager Client Tools for SLE 15
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Manager-Tools-15-2024-1509=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Manager Client Tools for SLE Micro 5
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2024-1509=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Package Hub 15 15-SP5
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1509=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Manager Proxy 4.3 Module 4.3
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-1509=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    openSUSE Leap 15.5 (noarch)
                    <ul>
                        
                            <li>POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</li>
                        
                            <li>ansible-2.9.27-150000.1.17.2</li>
                        
                            <li>ansible-test-2.9.27-150000.1.17.2</li>
                        
                            <li>ansible-doc-2.9.27-150000.1.17.2</li>
                        
                            <li>spacecmd-4.3.27-150000.3.116.2</li>
                        
                            <li>POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</li>
                        
                            <li>dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>golang-github-prometheus-promu-0.14.0-150000.3.18.2</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Manager Client Tools for SLE 15 (noarch)
                    <ul>
                        
                            <li>python3-spacewalk-koan-4.3.6-150000.3.33.2</li>
                        
                            <li>POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</li>
                        
                            <li>ansible-2.9.27-150000.1.17.2</li>
                        
                            <li>python3-spacewalk-client-setup-4.3.19-150000.3.89.2</li>
                        
                            <li>spacewalk-client-tools-4.3.19-150000.3.89.2</li>
                        
                            <li>uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</li>
                        
                            <li>mgr-daemon-4.3.9-150000.1.47.2</li>
                        
                            <li>ansible-doc-2.9.27-150000.1.17.2</li>
                        
                            <li>spacewalk-koan-4.3.6-150000.3.33.2</li>
                        
                            <li>spacecmd-4.3.27-150000.3.116.2</li>
                        
                            <li>POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</li>
                        
                            <li>spacewalk-client-setup-4.3.19-150000.3.89.2</li>
                        
                            <li>python3-spacewalk-check-4.3.19-150000.3.89.2</li>
                        
                            <li>python3-spacewalk-client-tools-4.3.19-150000.3.89.2</li>
                        
                            <li>dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</li>
                        
                            <li>spacewalk-check-4.3.19-150000.3.89.2</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>grafana-debuginfo-9.5.18-150000.1.63.2</li>
                        
                            <li>python3-uyuni-common-libs-4.3.10-150000.1.39.2</li>
                        
                            <li>grafana-9.5.18-150000.1.63.2</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Manager Client Tools for SLE Micro 5 (noarch)
                    <ul>
                        
                            <li>uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</li>
                        
                            <li>dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>golang-github-prometheus-promu-0.14.0-150000.3.18.2</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Manager Proxy 4.3 Module 4.3 (noarch)
                    <ul>
                        
                            <li>ansible-2.9.27-150000.1.17.2</li>
                        
                            <li>ansible-doc-2.9.27-150000.1.17.2</li>
                        
                            <li>uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2016-8614.html">https://www.suse.com/security/cve/CVE-2016-8614.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2016-8628.html">https://www.suse.com/security/cve/CVE-2016-8628.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2016-8647.html">https://www.suse.com/security/cve/CVE-2016-8647.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2016-9587.html">https://www.suse.com/security/cve/CVE-2016-9587.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2017-7550.html">https://www.suse.com/security/cve/CVE-2017-7550.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2018-10874.html">https://www.suse.com/security/cve/CVE-2018-10874.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2020-10744.html">https://www.suse.com/security/cve/CVE-2020-10744.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2020-14330.html">https://www.suse.com/security/cve/CVE-2020-14330.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2020-14332.html">https://www.suse.com/security/cve/CVE-2020-14332.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2020-14365.html">https://www.suse.com/security/cve/CVE-2020-14365.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2020-1753.html">https://www.suse.com/security/cve/CVE-2020-1753.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-5764.html">https://www.suse.com/security/cve/CVE-2023-5764.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-6152.html">https://www.suse.com/security/cve/CVE-2023-6152.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-0690.html">https://www.suse.com/security/cve/CVE-2024-0690.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-1313.html">https://www.suse.com/security/cve/CVE-2024-1313.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1008037">https://bugzilla.suse.com/show_bug.cgi?id=1008037</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1008038">https://bugzilla.suse.com/show_bug.cgi?id=1008038</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1010940">https://bugzilla.suse.com/show_bug.cgi?id=1010940</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1019021">https://bugzilla.suse.com/show_bug.cgi?id=1019021</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1038785">https://bugzilla.suse.com/show_bug.cgi?id=1038785</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1059235">https://bugzilla.suse.com/show_bug.cgi?id=1059235</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1099805">https://bugzilla.suse.com/show_bug.cgi?id=1099805</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1166389">https://bugzilla.suse.com/show_bug.cgi?id=1166389</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1171823">https://bugzilla.suse.com/show_bug.cgi?id=1171823</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1174145">https://bugzilla.suse.com/show_bug.cgi?id=1174145</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1174302">https://bugzilla.suse.com/show_bug.cgi?id=1174302</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1175993">https://bugzilla.suse.com/show_bug.cgi?id=1175993</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1177948">https://bugzilla.suse.com/show_bug.cgi?id=1177948</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216854">https://bugzilla.suse.com/show_bug.cgi?id=1216854</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219002">https://bugzilla.suse.com/show_bug.cgi?id=1219002</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219912">https://bugzilla.suse.com/show_bug.cgi?id=1219912</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221092">https://bugzilla.suse.com/show_bug.cgi?id=1221092</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221465">https://bugzilla.suse.com/show_bug.cgi?id=1221465</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222155">https://bugzilla.suse.com/show_bug.cgi?id=1222155</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/MSQA-760">https://jira.suse.com/browse/MSQA-760</a>
                    </li>
                
            
        </ul>
    
</div>