<div class="container">
<h1>Security update for SUSE Manager Client Tools</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2024:3267-1</td>
</tr>
<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220136">bsc#1220136</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224349">bsc#1224349</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225349">bsc#1225349</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226191">bsc#1226191</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226284">bsc#1226284</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226437">bsc#1226437</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226759">bsc#1226759</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226793">bsc#1226793</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226847">bsc#1226847</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226914">bsc#1226914</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227038">bsc#1227038</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227195">bsc#1227195</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227244">bsc#1227244</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227245">bsc#1227245</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227505">bsc#1227505</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227584">bsc#1227584</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227586">bsc#1227586</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227588">bsc#1227588</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227718">bsc#1227718</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227951">bsc#1227951</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228026">bsc#1228026</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228183">bsc#1228183</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228198">bsc#1228198</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228556">bsc#1228556</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/MSQA-848">jsc#MSQA-848</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-3577">jsc#PED-3577</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>
Cross-References:
</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-45142.html">CVE-2023-45142</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-6104.html">CVE-2024-6104</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-45142</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-45142</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-6104</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-6104</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">openSUSE Leap 15.3</li>
<li class="list-group-item">openSUSE Leap 15.4</li>
<li class="list-group-item">openSUSE Leap 15.5</li>
<li class="list-group-item">openSUSE Leap 15.6</li>
<li class="list-group-item">SUSE Linux Enterprise Desktop 15</li>
<li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP1</li>
<li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP2</li>
<li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP3</li>
<li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP4</li>
<li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP6</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP1</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP2</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP3</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP4</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Micro 5.0</li>
<li class="list-group-item">SUSE Linux Enterprise Micro 5.1</li>
<li class="list-group-item">SUSE Linux Enterprise Micro 5.2</li>
<li class="list-group-item">SUSE Linux Enterprise Micro 5.3</li>
<li class="list-group-item">SUSE Linux Enterprise Micro 5.4</li>
<li class="list-group-item">SUSE Linux Enterprise Micro 5.5</li>
<li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP1</li>
<li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP2</li>
<li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP3</li>
<li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP4</li>
<li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP6</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP1</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP2</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP3</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP4</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP6</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP1</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP2</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP3</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP4</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP6</li>
<li class="list-group-item">SUSE Manager Client Tools for SLE 15</li>
<li class="list-group-item">SUSE Manager Client Tools for SLE Micro 5</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that solves two vulnerabilities, contains two features and has 22 security fixes can now be installed.</p>
<h2>Description:</h2>
<p>This update fixes the following issues:</p>
<p>golang-github-prometheus-prometheus:</p>
<ul>
<li>
<p>Security issues fixed:</p>
</li>
<li>
<p>CVE-2024-6104: Update go-retryablehttp to version 0.7.7 (bsc#1227038)</p>
</li>
<li>
<p>CVE-2023-45142: Updated otelhttp to version 0.46.1 (bsc#1228556)</p>
</li>
<li>
<p>Require Go > 1.20 for building</p>
</li>
<li>Migrate from <code>disabled</code> to <code>manual</code> service mode</li>
<li>Update to 2.45.6 (jsc#PED-3577):</li>
<li>Security fixes in dependencies</li>
<li>Update to 2.45.5:</li>
<li>[BUGFIX] tsdb/agent: ensure that new series get written to WAL
on rollback.</li>
<li>[BUGFIX] Remote write: Avoid a race condition when applying
configuration.</li>
<li>Update to 2.45.4:</li>
<li>[BUGFIX] Remote read: Release querier resources before encoding
the results.</li>
<li>Update to 2.45.3:</li>
<li>[BUGFIX] TSDB: Remove double memory snapshot on shutdown.</li>
<li>Update to 2.45.2:</li>
<li>[BUGFIX] TSDB: Fix PostingsForMatchers race with creating new
series.</li>
<li>Update to 2.45.1:</li>
<li>[ENHANCEMENT] Hetzner SD: Support larger ID's that will be used
by Hetzner in September.</li>
<li>[BUGFIX] Linode SD: Cast InstanceSpec values to int64 to avoid
overflows on 386 architecture.</li>
<li>[BUGFIX] TSDB: Handle TOC parsing failures.</li>
</ul>
<p>rhnlib:</p>
<ul>
<li>Version 5.0.4-0</li>
<li>Add the old TLS code for very old traditional clients still on
python 2.7 (bsc#1228198)</li>
</ul>
<p>spacecmd:</p>
<ul>
<li>Version 5.0.9-0</li>
<li>Update translation strings</li>
</ul>
<p>uyuni-tools:</p>
<ul>
<li>Version 0.1.21-0</li>
<li>mgrpxy: Fix typo on Systemd template</li>
<li>Version 0.1.20-0</li>
<li>Update the push tag to 5.0.1</li>
<li>mgrpxy: expose port on IPv6 network (bsc#1227951)</li>
<li>Version 0.1.19-0</li>
<li>Skip updating Tomcat remote debug if conf file is not present</li>
<li>Version 0.1.18-0</li>
<li>Setup Confidential Computing container during migration
(bsc#1227588)</li>
<li>Add the /etc/uyuni/uyuni-tools.yaml path to the config help</li>
<li>Split systemd config files to not loose configuration at upgrade
(bsc#1227718)</li>
<li>Use the same logic for image computation in mgradm and mgrpxy
(bsc#1228026)</li>
<li>Allow building with different Helm and container default
registry paths (bsc#1226191)</li>
<li>Fix recursion in mgradm upgrade podman list --help</li>
<li>Setup hub xmlrpc API service in migration to Podman (bsc#1227588)</li>
<li>Setup disabled hub xmlrpc API service in all cases (bsc#1227584)</li>
<li>Clean the inspection code to make it faster</li>
<li>Properly detect IPv6 enabled on Podman network (bsc#1224349)</li>
<li>Fix the log file path generation</li>
<li>Write scripts output to uyuni-tools.log file</li>
<li>Add uyuni-hubxml-rpc to the list of values in
mgradm scale --help</li>
<li>Use path in mgradm support sql file input (bsc#1227505)</li>
<li>On Ubuntu build with go1.21 instead of go1.20</li>
<li>Enforce Cobbler setup (bsc#1226847)</li>
<li>Expose port on IPv6 network (bsc#1227951)</li>
<li>show output of podman image search --list-tags command</li>
<li>Implement mgrpxy support config command</li>
<li>During migration, ignore /etc/sysconfig/tomcat and
/etc/tomcat/tomcat.conf (bsc#1228183)</li>
<li>During migration, remove java.annotation,com.sun.xml.bind and
UseConcMarkSweepGC settings</li>
<li>Disable node exporter port for Kubernetes</li>
<li>Fix start, stop and restart in Kubernetes</li>
<li>Increase start timeout in Kubernetes</li>
<li>Fix traefik query</li>
<li>Fix password entry usability (bsc#1226437)</li>
<li>Add --prepare option to migrate command</li>
<li>Fix random error during installation of CA certificate
(bsc#1227245)</li>
<li>Clarify and fix distro name guessing when not provided
(bsc#1226284)</li>
<li>Replace not working Fatal error by plain error return
(bsc#1220136)</li>
<li>Allow server installation with preexisting storage volumes</li>
<li>Do not report error when purging mounted volume (bsc#1225349)</li>
<li>Preserve PAGER settings from the host for interactive sql
usage (bsc#1226914)</li>
<li>Add mgrpxy command to clear the Squid cache</li>
<li>Use local images for Confidential Computing and
Hub containers (bsc#1227586)</li>
<li>Version 0.1.17-0</li>
<li>Allow GPG files to be loaded from the local file (bsc#1227195)</li>
<li>Version 0.1.16-0</li>
<li>Prefer local images in all migration steps (bsc#1227244)</li>
<li>Version 0.1.15-0</li>
<li>Define --registry flag behaviour (bsc#1226793)</li>
<li>Version 0.1.14-0</li>
<li>Do not rely on hardcoded registry, remove any FQDN</li>
<li>Version 0.1.13-0</li>
<li>Fix mgradm support config tarball creation (bsc#1226759)</li>
<li>Version 0.1.12-0</li>
<li>Detection of k8s on Proxy was wrongly influenced by Server
setting</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
openSUSE Leap 15.5
<br/>
<code>zypper in -t patch openSUSE-SLE-15.5-2024-3267=1</code>
</li>
<li class="list-group-item">
openSUSE Leap 15.6
<br/>
<code>zypper in -t patch openSUSE-SLE-15.6-2024-3267=1</code>
</li>
<li class="list-group-item">
SUSE Manager Client Tools for SLE 15
<br/>
<code>zypper in -t patch SUSE-SLE-Manager-Tools-15-2024-3267=1</code>
</li>
<li class="list-group-item">
SUSE Manager Client Tools for SLE Micro 5
<br/>
<code>zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2024-3267=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
openSUSE Leap 15.5 (noarch)
<ul>
<li>spacecmd-5.0.9-150000.3.124.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.6 (noarch)
<ul>
<li>spacecmd-5.0.9-150000.3.124.1</li>
</ul>
</li>
<li>
SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64)
<ul>
<li>mgrctl-debuginfo-0.1.21-150000.1.8.2</li>
<li>mgrctl-0.1.21-150000.1.8.2</li>
<li>firewalld-prometheus-config-0.1-150000.3.56.1</li>
<li>golang-github-prometheus-prometheus-2.45.6-150000.3.56.1</li>
</ul>
</li>
<li>
SUSE Manager Client Tools for SLE 15 (noarch)
<ul>
<li>mgrctl-bash-completion-0.1.21-150000.1.8.2</li>
<li>python3-rhnlib-5.0.4-150000.3.46.1</li>
<li>mgrctl-zsh-completion-0.1.21-150000.1.8.2</li>
<li>mgrctl-lang-0.1.21-150000.1.8.2</li>
<li>spacecmd-5.0.9-150000.3.124.1</li>
</ul>
</li>
<li>
SUSE Manager Client Tools for SLE Micro 5 (aarch64 s390x x86_64)
<ul>
<li>mgrctl-debuginfo-0.1.21-150000.1.8.2</li>
<li>mgrctl-0.1.21-150000.1.8.2</li>
</ul>
</li>
<li>
SUSE Manager Client Tools for SLE Micro 5 (noarch)
<ul>
<li>mgrctl-bash-completion-0.1.21-150000.1.8.2</li>
<li>mgrctl-lang-0.1.21-150000.1.8.2</li>
<li>mgrctl-zsh-completion-0.1.21-150000.1.8.2</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-45142.html">https://www.suse.com/security/cve/CVE-2023-45142.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-6104.html">https://www.suse.com/security/cve/CVE-2024-6104.html</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220136">https://bugzilla.suse.com/show_bug.cgi?id=1220136</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224349">https://bugzilla.suse.com/show_bug.cgi?id=1224349</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225349">https://bugzilla.suse.com/show_bug.cgi?id=1225349</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226191">https://bugzilla.suse.com/show_bug.cgi?id=1226191</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226284">https://bugzilla.suse.com/show_bug.cgi?id=1226284</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226437">https://bugzilla.suse.com/show_bug.cgi?id=1226437</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226759">https://bugzilla.suse.com/show_bug.cgi?id=1226759</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226793">https://bugzilla.suse.com/show_bug.cgi?id=1226793</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226847">https://bugzilla.suse.com/show_bug.cgi?id=1226847</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226914">https://bugzilla.suse.com/show_bug.cgi?id=1226914</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227038">https://bugzilla.suse.com/show_bug.cgi?id=1227038</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227195">https://bugzilla.suse.com/show_bug.cgi?id=1227195</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227244">https://bugzilla.suse.com/show_bug.cgi?id=1227244</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227245">https://bugzilla.suse.com/show_bug.cgi?id=1227245</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227505">https://bugzilla.suse.com/show_bug.cgi?id=1227505</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227584">https://bugzilla.suse.com/show_bug.cgi?id=1227584</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227586">https://bugzilla.suse.com/show_bug.cgi?id=1227586</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227588">https://bugzilla.suse.com/show_bug.cgi?id=1227588</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227718">https://bugzilla.suse.com/show_bug.cgi?id=1227718</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227951">https://bugzilla.suse.com/show_bug.cgi?id=1227951</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228026">https://bugzilla.suse.com/show_bug.cgi?id=1228026</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228183">https://bugzilla.suse.com/show_bug.cgi?id=1228183</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228198">https://bugzilla.suse.com/show_bug.cgi?id=1228198</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228556">https://bugzilla.suse.com/show_bug.cgi?id=1228556</a>
</li>
<li>
<a href="https://jira.suse.com/browse/MSQA-848">https://jira.suse.com/browse/MSQA-848</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-3577">https://jira.suse.com/browse/PED-3577</a>
</li>
</ul>
</div>