<div class="container">
<h1>Security update 5.1.0 GM for Multi-Linux Manager Client Tools</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2025:02578-1</td>
</tr>
<tr>
<th>Release Date:</th>
<td>2025-07-31T10:36:32Z</td>
</tr>
<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236621">bsc#1236621</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243009">bsc#1243009</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243105">bsc#1243105</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243268">bsc#1243268</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243274">bsc#1243274</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243297">bsc#1243297</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243329">bsc#1243329</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243359">bsc#1243359</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243396">bsc#1243396</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243402">bsc#1243402</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243725">bsc#1243725</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243802">bsc#1243802</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244023">bsc#1244023</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244127">bsc#1244127</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244561">bsc#1244561</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244563">bsc#1244563</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244564">bsc#1244564</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244565">bsc#1244565</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244566">bsc#1244566</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244567">bsc#1244567</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244568">bsc#1244568</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244570">bsc#1244570</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244571">bsc#1244571</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244572">bsc#1244572</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244574">bsc#1244574</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244575">bsc#1244575</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244847">bsc#1244847</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/MSQA-995">jsc#MSQA-995</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>
Cross-References:
</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38822.html">CVE-2024-38822</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38823.html">CVE-2024-38823</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38824.html">CVE-2024-38824</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38825.html">CVE-2024-38825</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-22236.html">CVE-2025-22236</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-22237.html">CVE-2025-22237</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-22238.html">CVE-2025-22238</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-22239.html">CVE-2025-22239</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-22240.html">CVE-2025-22240</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-22241.html">CVE-2025-22241</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-22242.html">CVE-2025-22242</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-47287.html">CVE-2025-47287</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38822</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.1</span>
<span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38822</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">2.7</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38822</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">2.7</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38823</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.2</span>
<span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38823</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.9</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38823</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">2.7</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38824</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">9.3</span>
<span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38824</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">9.6</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38824</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">9.6</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38824</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38825</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38825</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.4</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38825</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.4</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-22236</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-22236</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-22236</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">8.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-22237</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.4</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-22237</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-22237</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-22238</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.7</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-22238</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-22238</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.2</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-22239</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-22239</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-22239</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">8.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-22240</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.4</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-22240</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-22240</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-22241</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-22241</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-22241</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-22242</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.7</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-22242</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-22242</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-47287</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.7</span>
<span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-47287</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-47287</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">SUSE Multi-Linux Manager Client Tools for Ubuntu 22.04 2204</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that solves 12 vulnerabilities, contains one feature and has 15 security fixes can now be installed.</p>
<h2>Description:</h2>
<p>This update fixes the following issues:</p>
<p>spacecmd:</p>
<ul>
<li>
<p>Version update from 5.1.6-0 to 5.1.8-0 with the following key change:</p>
</li>
<li>
<p>Update translation strings</p>
</li>
</ul>
<p>uyuni-tools:</p>
<ul>
<li>
<p>Version 5.1.14-0:</p>
</li>
<li>
<p>Fix mgradm backup create handling of images and systemd files
(bsc#1244563)</p>
</li>
<li>migrate existing TLS certificates from 4.3 systems
(bsc#1244847)</li>
<li>
<p>Use FQDN of the source to generate certificates during migration</p>
</li>
<li>
<p>Version 5.1.13-0:</p>
</li>
<li>
<p>Update translation strings</p>
</li>
<li>
<p>Version 5.1.12-0:</p>
</li>
<li>
<p>Add the info message about End User License Agreement</p>
</li>
<li>Remove duplicate parameters in mgradm install podman --help</li>
<li>Change the first message of each tool to include the full
command and parameters</li>
<li>support: don't dump files in bound folders (bsc#1243297)</li>
<li>Extract the version number from /etc/susemanager-release only
if that config file exists</li>
<li>During migration, improve info about usage on ssl-password and
logs (bsc#1243009)</li>
<li>Start saline containers and the other after server is running</li>
<li>Fix computed migration image name (bsc#1243725)</li>
<li>During upgrade, pgsql service needs to be started before
healtcheck (bsc#1243402)</li>
<li>During migration, check if the source server is a no-containerized
server (bsc#1243396)</li>
<li>During migration, check if backup is already existing (bsc#1243105)</li>
<li>Restore volumes using tar instead of podman import (bsc#1244127)</li>
<li>Fix several bugs related to saline service (bsc#1243329)</li>
<li>Purge saline and hubxmlrpc image (bsc#1243359)</li>
<li>Remove SHM size limits from all containers (bsc#1243274)</li>
<li>Fix log: pgsql version is a number</li>
<li>During upgrade, wait server is up and running (bsc#1244023)</li>
<li>Fix migration of autoinstallable distributions (bsc#1243802)</li>
<li>Check for valid CA before attempting DB upgrade</li>
</ul>
<p>venv-salt-minion:</p>
<ul>
<li>
<p>Security issues fixed:</p>
</li>
<li>
<p>CVE-2024-38822: Fixed Minion token validation (bsc#1244561)</p>
</li>
<li>CVE-2024-38823: Fixed server vulnerability to replay attacks when not using a TLS encrypted transport (bsc#1244564)</li>
<li>CVE-2024-38824: Fixed directory traversal vulnerability in recv_file method (bsc#1244565)</li>
<li>CVE-2024-38825: Fixed salt.auth.pki module authentication issue (bsc#1244566)</li>
<li>CVE-2025-22240: Fixed arbitrary directory creation or file deletion with GitFS (bsc#1244567)</li>
<li>CVE-2025-22236: Fixed Minion event bus authorization bypass (bsc#1244568)</li>
<li>CVE-2025-22241: Fixed the use of un-validated input in the VirtKey class (bsc#1244570)</li>
<li>CVE-2025-22237: Fixed exploitation of the 'on demand' pillar functionality (bsc#1244571)</li>
<li>CVE-2025-22238: Fixed the master's default cache vulnerability to a directory traversal attack (bsc#1244572)</li>
<li>CVE-2025-22239: Fixed the arbitrary event injection on the Salt Master (bsc#1244574) </li>
<li>CVE-2025-22242: Fixed a Denial of Service vulnerability through file read operation (bsc#1244575)</li>
<li>
<p>CVE-2025-47287: Fixed a Denial of Service vulnerability in Tornado logging behavior (bsc#1243268)</p>
</li>
<li>
<p>Other bugs fixed:</p>
</li>
<li>
<p>Added subsystem filter to udev.exportdb (bsc#1236621)</p>
</li>
<li>Fixed Ubuntu 24.04 test failures</li>
<li>Fixed refresh of osrelease and related grains on Python 3.10+</li>
<li>Fixed VIRTUAL_ENV variable in activate file to point to actual path</li>
<li>Fixed the bundle path in pyvenv.cfg</li>
</ul>
<h2>Special Instructions and Notes:</h2>
<ul>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
SUSE Multi-Linux Manager Client Tools for Ubuntu 22.04 2204
<br/>
<code>zypper in -t patch SUSE-MultiLinuxManagerTools-Ubuntu-22.04-2025-2578=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
SUSE Multi-Linux Manager Client Tools for Ubuntu 22.04 2204 (all)
<ul>
<li>spacecmd-5.1.8-3.6.1</li>
<li>mgrctl-fish-completion-5.1.14-3.6.1</li>
<li>mgrctl-bash-completion-5.1.14-3.6.1</li>
<li>mgrctl-zsh-completion-5.1.14-3.6.1</li>
</ul>
</li>
<li>
SUSE Multi-Linux Manager Client Tools for Ubuntu 22.04 2204 (amd64)
<ul>
<li>venv-salt-minion-3006.0-3.6.2</li>
<li>mgrctl-5.1.14-3.6.1</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38822.html">https://www.suse.com/security/cve/CVE-2024-38822.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38823.html">https://www.suse.com/security/cve/CVE-2024-38823.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38824.html">https://www.suse.com/security/cve/CVE-2024-38824.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38825.html">https://www.suse.com/security/cve/CVE-2024-38825.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-22236.html">https://www.suse.com/security/cve/CVE-2025-22236.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-22237.html">https://www.suse.com/security/cve/CVE-2025-22237.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-22238.html">https://www.suse.com/security/cve/CVE-2025-22238.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-22239.html">https://www.suse.com/security/cve/CVE-2025-22239.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-22240.html">https://www.suse.com/security/cve/CVE-2025-22240.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-22241.html">https://www.suse.com/security/cve/CVE-2025-22241.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-22242.html">https://www.suse.com/security/cve/CVE-2025-22242.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-47287.html">https://www.suse.com/security/cve/CVE-2025-47287.html</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236621">https://bugzilla.suse.com/show_bug.cgi?id=1236621</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243009">https://bugzilla.suse.com/show_bug.cgi?id=1243009</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243105">https://bugzilla.suse.com/show_bug.cgi?id=1243105</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243268">https://bugzilla.suse.com/show_bug.cgi?id=1243268</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243274">https://bugzilla.suse.com/show_bug.cgi?id=1243274</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243297">https://bugzilla.suse.com/show_bug.cgi?id=1243297</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243329">https://bugzilla.suse.com/show_bug.cgi?id=1243329</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243359">https://bugzilla.suse.com/show_bug.cgi?id=1243359</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243396">https://bugzilla.suse.com/show_bug.cgi?id=1243396</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243402">https://bugzilla.suse.com/show_bug.cgi?id=1243402</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243725">https://bugzilla.suse.com/show_bug.cgi?id=1243725</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243802">https://bugzilla.suse.com/show_bug.cgi?id=1243802</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244023">https://bugzilla.suse.com/show_bug.cgi?id=1244023</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244127">https://bugzilla.suse.com/show_bug.cgi?id=1244127</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244561">https://bugzilla.suse.com/show_bug.cgi?id=1244561</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244563">https://bugzilla.suse.com/show_bug.cgi?id=1244563</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244564">https://bugzilla.suse.com/show_bug.cgi?id=1244564</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244565">https://bugzilla.suse.com/show_bug.cgi?id=1244565</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244566">https://bugzilla.suse.com/show_bug.cgi?id=1244566</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244567">https://bugzilla.suse.com/show_bug.cgi?id=1244567</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244568">https://bugzilla.suse.com/show_bug.cgi?id=1244568</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244570">https://bugzilla.suse.com/show_bug.cgi?id=1244570</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244571">https://bugzilla.suse.com/show_bug.cgi?id=1244571</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244572">https://bugzilla.suse.com/show_bug.cgi?id=1244572</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244574">https://bugzilla.suse.com/show_bug.cgi?id=1244574</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244575">https://bugzilla.suse.com/show_bug.cgi?id=1244575</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244847">https://bugzilla.suse.com/show_bug.cgi?id=1244847</a>
</li>
<li>
<a href="https://jira.suse.com/browse/MSQA-995">https://jira.suse.com/browse/MSQA-995</a>
</li>
</ul>
</div>