drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in SUSE Manager Client Tools
Name: |
Mehrere Probleme in SUSE Manager Client Tools |
|
ID: |
SUSE-SU-2024:1509-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
SUSE Linux Enterprise Micro 5.0, SUSE Linux Enterprise Micro 5.1, SUSE Linux Enterprise Server for SAP Applications 15, SUSE Linux Enterprise Server 15, SUSE Linux Enterprise High Performance Computing 15, SUSE Linux Enterprise Desktop 15, SUSE Linux Enterprise Micro 5.2, SUSE Manager Proxy 4.3, SUSE Manager Retail Branch Server 4.3, SUSE Linux Enterprise Micro 5.3, SUSE Linux Enterprise Real Time 15 SP4, SUSE Linux Enterprise High Performance Computing 15 SP3, SUSE Linux Enterprise Server for SAP Applications 15 SP1, SUSE Linux Enterprise High Performance Computing 15 SP4, SUSE Linux Enterprise Server 15 SP2, SUSE Linux Enterprise Server 15 SP4, SUSE Linux Enterprise High Performance Computing 15 SP1, SUSE Linux Enterprise Server 15 SP3, SUSE Linux Enterprise Desktop 15 SP4, SUSE Linux Enterprise Server for SAP Applications 15 SP2, SUSE Linux Enterprise Server for SAP Applications 15 SP4, SUSE Linux Enterprise Server 15 SP1, SUSE Linux Enterprise Server for SAP Applications 15 SP3, SUSE Linux Enterprise Real Time 15 SP3, SUSE Linux Enterprise High Performance Computing 15 SP2, SUSE Linux Enterprise Micro 5.4, SUSE Linux Enterprise Real Time 15 SP5, SUSE Linux Enterprise Real Time 15 SP1, SUSE Linux Enterprise Server for SAP Applications 15 SP5, SUSE Linux Enterprise Real Time 15 SP2, SUSE Linux Enterprise Desktop 15 SP3, SUSE Manager Client Tools for SLE 15, SUSE Manager Client Tools for SLE Micro 5, SUSE Linux Enterprise Server 15 SP5, SUSE Linux Enterprise Desktop 15 SP2, SUSE Linux Enterprise High Performance Computing 15 SP5, SUSE Linux Enterprise Desktop 15 SP5, SUSE Linux Enterprise Desktop 15 SP1, SUSE Manager Proxy 4.3 Module 4.3, SUSE Package Hub 15 15-SP5, SUSE Linux Enterprise Micro 5.5, SUSE openSUSE Leap 15.5, SUSE openSUSE Leap 15.4, SUSE openSUSE Leap 15.3, SUSE Linux Enterprise Desktop 15 SP6, SUSE Linux Enterprise Server for SAP Applications 15 SP6, SUSE Linux Enterprise Server 15 SP6, SUSE Linux Enterprise Real Time 15 SP6, SUSE openSUSE Leap 15.6 |
|
Datum: |
Mo, 6. Mai 2024, 18:41 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10744
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6152
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14332
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14365
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8628 |
|
Applikationen: |
SUSE Manager Client Tools |
|
Originalnachricht |
--===============3650333361792559007== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
# Security update for SUSE Manager Client Tools
Announcement ID: SUSE-SU-2024:1509-1 Rating: important References:
* bsc#1008037 * bsc#1008038 * bsc#1010940 * bsc#1019021 * bsc#1038785 * bsc#1059235 * bsc#1099805 * bsc#1166389 * bsc#1171823 * bsc#1174145 * bsc#1174302 * bsc#1175993 * bsc#1177948 * bsc#1216854 * bsc#1219002 * bsc#1219912 * bsc#1221092 * bsc#1221465 * bsc#1222155 * jsc#MSQA-760
Cross-References:
* CVE-2016-8614 * CVE-2016-8628 * CVE-2016-8647 * CVE-2016-9587 * CVE-2017-7550 * CVE-2018-10874 * CVE-2020-10744 * CVE-2020-14330 * CVE-2020-14332 * CVE-2020-14365 * CVE-2020-1753 * CVE-2023-5764 * CVE-2023-6152 * CVE-2024-0690 * CVE-2024-1313
CVSS scores:
* CVE-2016-8614 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2016-8628 ( NVD ): 9.1 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2016-8647 ( NVD ): 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2016-8647 ( NVD ): 2.2 CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2016-9587 ( NVD ): 8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2017-7550 ( SUSE ): 8.5 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2017-7550 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2017-7550 ( NVD ): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2018-10874 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2018-10874 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2020-10744 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L * CVE-2020-10744 ( NVD ): 5.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L * CVE-2020-14330 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2020-14330 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2020-14332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2020-14332 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2020-14365 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2020-14365 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2020-1753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-5764 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2023-5764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6152 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-0690 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0690 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-1313 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Affected Products:
* openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 * SUSE Linux Enterprise Desktop 15 SP1 * SUSE Linux Enterprise Desktop 15 SP2 * SUSE Linux Enterprise Desktop 15 SP3 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP1 * SUSE Linux Enterprise Real Time 15 SP2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Client Tools for SLE 15 * SUSE Manager Client Tools for SLE Micro 5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Package Hub 15 15-SP5
An update that solves 15 vulnerabilities, contains one feature and has four security fixes can now be installed.
## Description:
This update fixes the following issues:
POS_Image-Graphical7 was updated to version 0.1.1710765237.46af599:
* Version 0.1.1710765237.46af599
* Moved image services to dracut-saltboot package
* Use salt bundle
* Version 0.1.1645440615.7f1328c
* Removed deprecated kiwi functions
POS_Image-JeOS7 was updated to version 0.1.1710765237.46af599:
* Version 0.1.1710765237.46af599
* Moved image services to dracut-saltboot package
* Use salt bundle
* Version 0.1.1645440615.7f1328c
* Removed deprecated kiwi functions
ansible received the following fixes:
* Security issues fixed:
* CVE-2023-5764: Address issues where internal templating can cause unsafe variables to lose their unsafe designation (bsc#1216854)
* Breaking changes: assert - Nested templating may result in an inability for the conditional to be evaluated. See the porting guide for more information. * CVE-2024-0690: Address issue where ANSIBLE_NO_LOG was ignored (bsc#1219002)
* CVE-2020-14365: Ensure that packages are GPG validated (bsc#1175993) * CVE-2020-10744: Fixed insecure temporary directory creation (bsc#1171823) * CVE-2018-10874: Fixed inventory variables loading from current working directory when running ad-hoc command that can lead to code execution (bsc#1099805)
* Bugs fixed:
* Don't Require python-coverage, it is needed only for testing (bsc#1177948)
dracut-saltboot was updated to version 0.1.1710765237.46af599:
* Version 0.1.1710765237.46af599
* Load only first available leaseinfo (bsc#1221092)
* Version 0.1.1681904360.84ef141
grafana was updated to version 9.5.18:
* Grafana now requires Go 1.20 * Security issues fixed:
* CVE-2024-1313: Require same organisation when deleting snapshots (bsc#1222155)
* CVE-2023-6152: Add email verification when updating user email (bsc#1219912)
* Other non-security related changes:
* Version 9.5.17:
* [FEATURE] Alerting: Backport use Alertmanager API v2 * Version 9.5.16:
* [BUGFIX] Annotations: Split cleanup into separate queries and deletes to avoid deadlocks on MySQL * Version 9.5.15:
* [FEATURE] Alerting: Attempt to retry retryable errors * Version 9.5.14:
* [BUGFIX] Alerting: Fix state manager to not keep datasource_uid and ref_id labels in state after Error * [BUGFIX] Transformations: Config overrides being lost when config from query transform is applied * [BUGFIX] LDAP: Fix enable users on successfull login * Version 9.5.13:
* [BUGFIX] BrowseDashboards: Only remember the most recent expanded folder * [BUGFIX] Licensing: Pass func to update env variables when starting plugin * Version 9.5.12:
* [FEATURE] Azure: Add support for Workload Identity authentication * Version 9.5.9:
* [FEATURE] SSE: Fix DSNode to not panic when response has empty response * [FEATURE] Prometheus: Handle the response with different field key order * [BUGFIX] LDAP: Fix user disabling
mgr-daemon was updated to version 4.3.9-0:
* Version 4.3.9-0
* Update translation strings
spacecmd was updated to version 4.3.27-0:
* Version 4.3.27-0
* Update translation strings
spacewalk-client-tools was updated to version 4.3.19-0:
* Version 4.3.19-0
* Update translation strings
spacewalk-koan was updated to version version 4.3.6-0:
* Version 4.3.6-0
* Change Docker image location for test
uyuni-common-libs was updated to version 4.3.10-0:
* Version 4.3.10-0
* Add support for package signature type V4 RSA/SHA384
* Add support for package signature type V4 RSA/SHA512 (bsc#1221465)
uyuni-proxy-systemd-services was updated to version 4.3.12-0:
* Version 4.3.12-0
* Update to SUSE Manager 4.3.12
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1509=1
* SUSE Manager Client Tools for SLE 15 zypper in -t patch SUSE-SLE-Manager-Tools-15-2024-1509=1
* SUSE Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2024-1509=1
* SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1509=1
* SUSE Manager Proxy 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-1509=1
## Package List:
* openSUSE Leap 15.5 (noarch) * POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2 * ansible-2.9.27-150000.1.17.2 * ansible-test-2.9.27-150000.1.17.2 * ansible-doc-2.9.27-150000.1.17.2 * spacecmd-4.3.27-150000.3.116.2 * POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2 * dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-promu-0.14.0-150000.3.18.2 * SUSE Manager Client Tools for SLE 15 (noarch) * python3-spacewalk-koan-4.3.6-150000.3.33.2 * POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2 * ansible-2.9.27-150000.1.17.2 * python3-spacewalk-client-setup-4.3.19-150000.3.89.2 * spacewalk-client-tools-4.3.19-150000.3.89.2 * uyuni-proxy-systemd-services-4.3.12-150000.1.21.2 * mgr-daemon-4.3.9-150000.1.47.2 * ansible-doc-2.9.27-150000.1.17.2 * spacewalk-koan-4.3.6-150000.3.33.2 * spacecmd-4.3.27-150000.3.116.2 * POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2 * spacewalk-client-setup-4.3.19-150000.3.89.2 * python3-spacewalk-check-4.3.19-150000.3.89.2 * python3-spacewalk-client-tools-4.3.19-150000.3.89.2 * dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2 * spacewalk-check-4.3.19-150000.3.89.2 * SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64) * grafana-debuginfo-9.5.18-150000.1.63.2 * python3-uyuni-common-libs-4.3.10-150000.1.39.2 * grafana-9.5.18-150000.1.63.2 * SUSE Manager Client Tools for SLE Micro 5 (noarch) * uyuni-proxy-systemd-services-4.3.12-150000.1.21.2 * dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-promu-0.14.0-150000.3.18.2 * SUSE Manager Proxy 4.3 Module 4.3 (noarch) * ansible-2.9.27-150000.1.17.2 * ansible-doc-2.9.27-150000.1.17.2 * uyuni-proxy-systemd-services-4.3.12-150000.1.21.2
## References:
* https://www.suse.com/security/cve/CVE-2016-8614.html * https://www.suse.com/security/cve/CVE-2016-8628.html * https://www.suse.com/security/cve/CVE-2016-8647.html * https://www.suse.com/security/cve/CVE-2016-9587.html * https://www.suse.com/security/cve/CVE-2017-7550.html * https://www.suse.com/security/cve/CVE-2018-10874.html * https://www.suse.com/security/cve/CVE-2020-10744.html * https://www.suse.com/security/cve/CVE-2020-14330.html * https://www.suse.com/security/cve/CVE-2020-14332.html * https://www.suse.com/security/cve/CVE-2020-14365.html * https://www.suse.com/security/cve/CVE-2020-1753.html * https://www.suse.com/security/cve/CVE-2023-5764.html * https://www.suse.com/security/cve/CVE-2023-6152.html * https://www.suse.com/security/cve/CVE-2024-0690.html * https://www.suse.com/security/cve/CVE-2024-1313.html * https://bugzilla.suse.com/show_bug.cgi?id=1008037 * https://bugzilla.suse.com/show_bug.cgi?id=1008038 * https://bugzilla.suse.com/show_bug.cgi?id=1010940 * https://bugzilla.suse.com/show_bug.cgi?id=1019021 * https://bugzilla.suse.com/show_bug.cgi?id=1038785 * https://bugzilla.suse.com/show_bug.cgi?id=1059235 * https://bugzilla.suse.com/show_bug.cgi?id=1099805 * https://bugzilla.suse.com/show_bug.cgi?id=1166389 * https://bugzilla.suse.com/show_bug.cgi?id=1171823 * https://bugzilla.suse.com/show_bug.cgi?id=1174145 * https://bugzilla.suse.com/show_bug.cgi?id=1174302 * https://bugzilla.suse.com/show_bug.cgi?id=1175993 * https://bugzilla.suse.com/show_bug.cgi?id=1177948 * https://bugzilla.suse.com/show_bug.cgi?id=1216854 * https://bugzilla.suse.com/show_bug.cgi?id=1219002 * https://bugzilla.suse.com/show_bug.cgi?id=1219912 * https://bugzilla.suse.com/show_bug.cgi?id=1221092 * https://bugzilla.suse.com/show_bug.cgi?id=1221465 * https://bugzilla.suse.com/show_bug.cgi?id=1222155 * https://jira.suse.com/browse/MSQA-760
--===============3650333361792559007== Content-Type: text/html; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
<div class="container"> <h1>Security update for SUSE Manager Client Tools</h1>
<table class="table table-striped table-bordered"> <tbody> <tr> <th>Announcement ID:</th> <td>SUSE-SU-2024:1509-1</td> </tr> <tr> <th>Rating:</th> <td>important</td> </tr> <tr> <th>References:</th> <td> <ul> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1008037">bsc#1008037</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1008038">bsc#1008038</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1010940">bsc#1010940</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1019021">bsc#1019021</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1038785">bsc#1038785</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1059235">bsc#1059235</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1099805">bsc#1099805</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1166389">bsc#1166389</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1171823">bsc#1171823</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1174145">bsc#1174145</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1174302">bsc#1174302</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1175993">bsc#1175993</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1177948">bsc#1177948</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216854">bsc#1216854</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219002">bsc#1219002</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219912">bsc#1219912</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221092">bsc#1221092</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221465">bsc#1221465</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222155">bsc#1222155</a> </li> <li style="display: inline;"> <a href="https://jira.suse.com/browse/MSQA-760">jsc#MSQA-760</a> </li> </ul> </td> </tr> <tr> <th> Cross-References: </th> <td> <ul> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2016-8614.html">CVE-2016-8614</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2016-8628.html">CVE-2016-8628</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2016-8647.html">CVE-2016-8647</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2016-9587.html">CVE-2016-9587</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2017-7550.html">CVE-2017-7550</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2018-10874.html">CVE-2018-10874</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2020-10744.html">CVE-2020-10744</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2020-14330.html">CVE-2020-14330</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2020-14332.html">CVE-2020-14332</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2020-14365.html">CVE-2020-14365</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2020-1753.html">CVE-2020-1753</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-5764.html">CVE-2023-5764</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-6152.html">CVE-2023-6152</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-0690.html">CVE-2024-0690</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-1313.html">CVE-2024-1313</a> </li> </ul> </td> </tr> <tr> <th>CVSS scores:</th> <td> <ul class="list-group"> <li class="list-group-item"> <span class="cvss-reference">CVE-2016-8614</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.5</span> <span class="cvss-vector">CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2016-8628</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">9.1</span> <span class="cvss-vector">CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2016-8647</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.9</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2016-8647</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">2.2</span> <span class="cvss-vector">CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2016-9587</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">8.1</span> <span class="cvss-vector">CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2017-7550</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.5</span> <span class="cvss-vector">CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2017-7550</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">9.8</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2017-7550</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">9.8</span> <span class="cvss-vector">CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2018-10874</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2018-10874</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2020-10744</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2020-10744</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2020-14330</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2020-14330</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2020-14332</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2020-14332</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2020-14365</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2020-14365</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2020-1753</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-5764</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.6</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-5764</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-6152</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.4</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-0690</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-0690</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-1313</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span> </li> </ul> </td> </tr> <tr> <th>Affected Products:</th> <td> <ul class="list-group"> <li class="list-group-item">openSUSE Leap 15.3</li> <li class="list-group-item">openSUSE Leap 15.4</li> <li class="list-group-item">openSUSE Leap 15.5</li> <li class="list-group-item">openSUSE Leap 15.6</li> <li class="list-group-item">SUSE Linux Enterprise Desktop 15</li> <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP1</li> <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP2</li> <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP3</li> <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP4</li> <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP5</li> <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP6</li> <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15</li> <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP1</li> <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP2</li> <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP3</li> <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP4</li> <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP5</li> <li class="list-group-item">SUSE Linux Enterprise Micro 5.0</li> <li class="list-group-item">SUSE Linux Enterprise Micro 5.1</li> <li class="list-group-item">SUSE Linux Enterprise Micro 5.2</li> <li class="list-group-item">SUSE Linux Enterprise Micro 5.3</li> <li class="list-group-item">SUSE Linux Enterprise Micro 5.4</li> <li class="list-group-item">SUSE Linux Enterprise Micro 5.5</li> <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP1</li> <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP2</li> <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP3</li> <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP4</li> <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP5</li> <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP6</li> <li class="list-group-item">SUSE Linux Enterprise Server 15</li> <li class="list-group-item">SUSE Linux Enterprise Server 15 SP1</li> <li class="list-group-item">SUSE Linux Enterprise Server 15 SP2</li> <li class="list-group-item">SUSE Linux Enterprise Server 15 SP3</li> <li class="list-group-item">SUSE Linux Enterprise Server 15 SP4</li> <li class="list-group-item">SUSE Linux Enterprise Server 15 SP5</li> <li class="list-group-item">SUSE Linux Enterprise Server 15 SP6</li> <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15</li> <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP1</li> <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP2</li> <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP3</li> <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP4</li> <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP5</li> <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP6</li> <li class="list-group-item">SUSE Manager Client Tools for SLE 15</li> <li class="list-group-item">SUSE Manager Client Tools for SLE Micro 5</li> <li class="list-group-item">SUSE Manager Proxy 4.3</li> <li class="list-group-item">SUSE Manager Proxy 4.3 Module 4.3</li> <li class="list-group-item">SUSE Manager Retail Branch Server 4.3</li> <li class="list-group-item">SUSE Package Hub 15 15-SP5</li> </ul> </td> </tr> </tbody> </table>
<p>An update that solves 15 vulnerabilities, contains one feature and has four security fixes can now be installed.</p>
<h2>Description:</h2> <p>This update fixes the following issues:</p> <p>POS_Image-Graphical7 was updated to version 0.1.1710765237.46af599:</p> <ul> <li> <p>Version 0.1.1710765237.46af599</p> </li> <li> <p>Moved image services to dracut-saltboot package</p> </li> <li> <p>Use salt bundle</p> </li> <li> <p>Version 0.1.1645440615.7f1328c</p> </li> <li> <p>Removed deprecated kiwi functions</p> </li> </ul> <p>POS_Image-JeOS7 was updated to version 0.1.1710765237.46af599:</p> <ul> <li> <p>Version 0.1.1710765237.46af599</p> </li> <li> <p>Moved image services to dracut-saltboot package</p> </li> <li> <p>Use salt bundle</p> </li> <li> <p>Version 0.1.1645440615.7f1328c</p> </li> <li> <p>Removed deprecated kiwi functions</p> </li> </ul> <p>ansible received the following fixes:</p> <ul> <li> <p>Security issues fixed:</p> </li> <li> <p>CVE-2023-5764: Address issues where internal templating can cause unsafe variables to lose their unsafe designation (bsc#1216854)</p> <ul> <li>Breaking changes: assert - Nested templating may result in an inability for the conditional to be evaluated. See the porting guide for more information.</li> </ul> </li> <li> <p>CVE-2024-0690: Address issue where ANSIBLE_NO_LOG was ignored (bsc#1219002)</p> </li> <li>CVE-2020-14365: Ensure that packages are GPG validated (bsc#1175993)</li> <li>CVE-2020-10744: Fixed insecure temporary directory creation (bsc#1171823)</li> <li> <p>CVE-2018-10874: Fixed inventory variables loading from current working directory when running ad-hoc command that can lead to code execution (bsc#1099805)</p> </li> <li> <p>Bugs fixed: </p> </li> <li> <p>Don't Require python-coverage, it is needed only for testing (bsc#1177948)</p> </li> </ul> <p>dracut-saltboot was updated to version 0.1.1710765237.46af599:</p> <ul> <li> <p>Version 0.1.1710765237.46af599</p> </li> <li> <p>Load only first available leaseinfo (bsc#1221092)</p> </li> <li> <p>Version 0.1.1681904360.84ef141</p> </li> </ul> <p>grafana was updated to version 9.5.18:</p> <ul> <li>Grafana now requires Go 1.20</li> <li> <p>Security issues fixed:</p> </li> <li> <p>CVE-2024-1313: Require same organisation when deleting snapshots (bsc#1222155)</p> </li> <li> <p>CVE-2023-6152: Add email verification when updating user email (bsc#1219912)</p> </li> <li> <p>Other non-security related changes:</p> </li> <li> <p>Version 9.5.17:</p> <ul> <li>[FEATURE] Alerting: Backport use Alertmanager API v2</li> </ul> </li> <li> <p>Version 9.5.16:</p> <ul> <li>[BUGFIX] Annotations: Split cleanup into separate queries and deletes to avoid deadlocks on MySQL</li> </ul> </li> <li> <p>Version 9.5.15:</p> <ul> <li>[FEATURE] Alerting: Attempt to retry retryable errors</li> </ul> </li> <li> <p>Version 9.5.14:</p> <ul> <li>[BUGFIX] Alerting: Fix state manager to not keep datasource_uid and ref_id labels in state after Error</li> <li>[BUGFIX] Transformations: Config overrides being lost when config from query transform is applied</li> <li>[BUGFIX] LDAP: Fix enable users on successfull login</li> </ul> </li> <li> <p>Version 9.5.13:</p> <ul> <li>[BUGFIX] BrowseDashboards: Only remember the most recent expanded folder</li> <li>[BUGFIX] Licensing: Pass func to update env variables when starting plugin</li> </ul> </li> <li> <p>Version 9.5.12:</p> <ul> <li>[FEATURE] Azure: Add support for Workload Identity authentication</li> </ul> </li> <li> <p>Version 9.5.9:</p> <ul> <li>[FEATURE] SSE: Fix DSNode to not panic when response has empty response</li> <li>[FEATURE] Prometheus: Handle the response with different field key order</li> <li>[BUGFIX] LDAP: Fix user disabling</li> </ul> </li> </ul> <p>mgr-daemon was updated to version 4.3.9-0:</p> <ul> <li> <p>Version 4.3.9-0</p> </li> <li> <p>Update translation strings</p> </li> </ul> <p>spacecmd was updated to version 4.3.27-0:</p> <ul> <li> <p>Version 4.3.27-0</p> </li> <li> <p>Update translation strings</p> </li> </ul> <p>spacewalk-client-tools was updated to version 4.3.19-0:</p> <ul> <li> <p>Version 4.3.19-0</p> </li> <li> <p>Update translation strings</p> </li> </ul> <p>spacewalk-koan was updated to version version 4.3.6-0:</p> <ul> <li> <p>Version 4.3.6-0</p> </li> <li> <p>Change Docker image location for test</p> </li> </ul> <p>uyuni-common-libs was updated to version 4.3.10-0:</p> <ul> <li> <p>Version 4.3.10-0</p> </li> <li> <p>Add support for package signature type V4 RSA/SHA384</p> </li> <li>Add support for package signature type V4 RSA/SHA512 (bsc#1221465)</li> </ul> <p>uyuni-proxy-systemd-services was updated to version 4.3.12-0:</p> <ul> <li> <p>Version 4.3.12-0</p> </li> <li> <p>Update to SUSE Manager 4.3.12</p> </li> </ul>
<h2>Patch Instructions:</h2> <p> To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product: </p> <ul class="list-group"> <li class="list-group-item"> openSUSE Leap 15.5 <br/> <code>zypper in -t patch openSUSE-SLE-15.5-2024-1509=1</code> </li> <li class="list-group-item"> SUSE Manager Client Tools for SLE 15 <br/> <code>zypper in -t patch SUSE-SLE-Manager-Tools-15-2024-1509=1</code> </li> <li class="list-group-item"> SUSE Manager Client Tools for SLE Micro 5 <br/> <code>zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2024-1509=1</code> </li> <li class="list-group-item"> SUSE Package Hub 15 15-SP5 <br/> <code>zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1509=1</code> </li> <li class="list-group-item"> SUSE Manager Proxy 4.3 Module 4.3 <br/> <code>zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-1509=1</code> </li> </ul>
<h2>Package List:</h2> <ul> <li> openSUSE Leap 15.5 (noarch) <ul> <li>POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</li> <li>ansible-2.9.27-150000.1.17.2</li> <li>ansible-test-2.9.27-150000.1.17.2</li> <li>ansible-doc-2.9.27-150000.1.17.2</li> <li>spacecmd-4.3.27-150000.3.116.2</li> <li>POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</li> <li>dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</li> </ul> </li> <li> openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) <ul> <li>golang-github-prometheus-promu-0.14.0-150000.3.18.2</li> </ul> </li> <li> SUSE Manager Client Tools for SLE 15 (noarch) <ul> <li>python3-spacewalk-koan-4.3.6-150000.3.33.2</li> <li>POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</li> <li>ansible-2.9.27-150000.1.17.2</li> <li>python3-spacewalk-client-setup-4.3.19-150000.3.89.2</li> <li>spacewalk-client-tools-4.3.19-150000.3.89.2</li> <li>uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</li> <li>mgr-daemon-4.3.9-150000.1.47.2</li> <li>ansible-doc-2.9.27-150000.1.17.2</li> <li>spacewalk-koan-4.3.6-150000.3.33.2</li> <li>spacecmd-4.3.27-150000.3.116.2</li> <li>POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</li> <li>spacewalk-client-setup-4.3.19-150000.3.89.2</li> <li>python3-spacewalk-check-4.3.19-150000.3.89.2</li> <li>python3-spacewalk-client-tools-4.3.19-150000.3.89.2</li> <li>dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</li> <li>spacewalk-check-4.3.19-150000.3.89.2</li> </ul> </li> <li> SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64) <ul> <li>grafana-debuginfo-9.5.18-150000.1.63.2</li> <li>python3-uyuni-common-libs-4.3.10-150000.1.39.2</li> <li>grafana-9.5.18-150000.1.63.2</li> </ul> </li> <li> SUSE Manager Client Tools for SLE Micro 5 (noarch) <ul> <li>uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</li> <li>dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</li> </ul> </li> <li> SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) <ul> <li>golang-github-prometheus-promu-0.14.0-150000.3.18.2</li> </ul> </li> <li> SUSE Manager Proxy 4.3 Module 4.3 (noarch) <ul> <li>ansible-2.9.27-150000.1.17.2</li> <li>ansible-doc-2.9.27-150000.1.17.2</li> <li>uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</li> </ul> </li> </ul>
<h2>References:</h2> <ul> <li> <a href="https://www.suse.com/security/cve/CVE-2016-8614.html">https://www.suse.com/security/cve/CVE-2016-8614.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2016-8628.html">https://www.suse.com/security/cve/CVE-2016-8628.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2016-8647.html">https://www.suse.com/security/cve/CVE-2016-8647.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2016-9587.html">https://www.suse.com/security/cve/CVE-2016-9587.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2017-7550.html">https://www.suse.com/security/cve/CVE-2017-7550.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2018-10874.html">https://www.suse.com/security/cve/CVE-2018-10874.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2020-10744.html">https://www.suse.com/security/cve/CVE-2020-10744.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2020-14330.html">https://www.suse.com/security/cve/CVE-2020-14330.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2020-14332.html">https://www.suse.com/security/cve/CVE-2020-14332.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2020-14365.html">https://www.suse.com/security/cve/CVE-2020-14365.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2020-1753.html">https://www.suse.com/security/cve/CVE-2020-1753.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-5764.html">https://www.suse.com/security/cve/CVE-2023-5764.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-6152.html">https://www.suse.com/security/cve/CVE-2023-6152.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-0690.html">https://www.suse.com/security/cve/CVE-2024-0690.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-1313.html">https://www.suse.com/security/cve/CVE-2024-1313.html</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1008037">https://bugzilla.suse.com/show_bug.cgi?id=1008037</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1008038">https://bugzilla.suse.com/show_bug.cgi?id=1008038</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1010940">https://bugzilla.suse.com/show_bug.cgi?id=1010940</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1019021">https://bugzilla.suse.com/show_bug.cgi?id=1019021</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1038785">https://bugzilla.suse.com/show_bug.cgi?id=1038785</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1059235">https://bugzilla.suse.com/show_bug.cgi?id=1059235</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1099805">https://bugzilla.suse.com/show_bug.cgi?id=1099805</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1166389">https://bugzilla.suse.com/show_bug.cgi?id=1166389</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1171823">https://bugzilla.suse.com/show_bug.cgi?id=1171823</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1174145">https://bugzilla.suse.com/show_bug.cgi?id=1174145</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1174302">https://bugzilla.suse.com/show_bug.cgi?id=1174302</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1175993">https://bugzilla.suse.com/show_bug.cgi?id=1175993</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1177948">https://bugzilla.suse.com/show_bug.cgi?id=1177948</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216854">https://bugzilla.suse.com/show_bug.cgi?id=1216854</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219002">https://bugzilla.suse.com/show_bug.cgi?id=1219002</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219912">https://bugzilla.suse.com/show_bug.cgi?id=1219912</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221092">https://bugzilla.suse.com/show_bug.cgi?id=1221092</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221465">https://bugzilla.suse.com/show_bug.cgi?id=1221465</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222155">https://bugzilla.suse.com/show_bug.cgi?id=1222155</a> </li> <li> <a href="https://jira.suse.com/browse/MSQA-760">https://jira.suse.com/browse/MSQA-760</a> </li> </ul> </div>
--===============3650333361792559007==--
|
|
|
|