# Security update for SUSE Manager 4.3.10 Release Notes

Announcement ID: SUSE-SU-2023:4758-1  
Rating: important  
References:

  * bsc#1191143
  * bsc#1204235
  * bsc#1207012
  * bsc#1207532
  * bsc#1210928
  * bsc#1210930
  * bsc#1211355
  * bsc#1211560
  * bsc#1211649
  * bsc#1212695
  * bsc#1212904
  * bsc#1213469
  * bsc#1214186
  * bsc#1214471
  * bsc#1214601
  * bsc#1214759
  * bsc#1215209
  * bsc#1215514
  * bsc#1215949
  * bsc#1216030
  * bsc#1216041
  * bsc#1216085
  * bsc#1216128
  * bsc#1216380
  * bsc#1216506
  * bsc#1216555
  * bsc#1216690
  * bsc#1216754
  * bsc#1217038
  * bsc#1217223
  * bsc#1217224
  * jsc#MSQA-708

  
Cross-References:

  * CVE-2023-22644

  
CVSS scores:

  * CVE-2023-22644 ( NVD ):  3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N

  
Affected Products:

  * openSUSE Leap 15.4
  * SUSE Manager Proxy 4.3
  * SUSE Manager Retail Branch Server 4.3
  * SUSE Manager Server 4.3

  
  
An update that solves one vulnerability, contains one feature and has 30
security fixes can now be installed.

## Security update for SUSE Manager Proxy and Retail Branch Server 4.3

### Description:

This update fixes the following issues:

release-notes-susemanager-proxy:

  * Update to SUSE Manager 4.3.10
  * Bugs mentioned: bsc#1216506, bsc#1216754

## Security update for SUSE Manager Server 4.3

### Description:

This update fixes the following issues:

release-notes-susemanager:

  * Update to SUSE Manager 4.3.10
  * SUSE Linux Enterprise Server Micro 5.5 support
  * CLM filter by package build date
  * Enhanced Errata.getDetails API endpoint
  * CVEs fixed: CVE-2023-22644
  * Bugs mentioned: bsc#1191143, bsc#1204235, bsc#1207012, bsc#1207532,
    bsc#1210928, bsc#1210930, bsc#1211355, bsc#1211560, bsc#1211649,
    bsc#1212695, bsc#1212904, bsc#1213469, bsc#1214186, bsc#1214471,
    bsc#1214601, bsc#1214759, bsc#1215209, bsc#1215514, bsc#1215949,
    bsc#1216030, bsc#1216041, bsc#1216085, bsc#1216128, bsc#1216380,
    bsc#1216506, bsc#1216555, bsc#1216690, bsc#1216754, bsc#1217038,
    bsc#1217223, bsc#1217224

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * openSUSE Leap 15.4  
    zypper in -t patch SUSE-2023-4758=1

  * SUSE Manager Proxy 4.3  
    zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2023-4758=1

  * SUSE Manager Retail Branch Server 4.3  
    zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2023-4758=1

  * SUSE Manager Server 4.3  
    zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2023-4758=1

## Package List:

  * openSUSE Leap 15.4 (noarch)
    * release-notes-susemanager-4.3.10-150400.3.93.1
    * release-notes-susemanager-proxy-4.3.10-150400.3.72.1
  * SUSE Manager Proxy 4.3 (noarch)
    * release-notes-susemanager-proxy-4.3.10-150400.3.72.1
  * SUSE Manager Retail Branch Server 4.3 (noarch)
    * release-notes-susemanager-proxy-4.3.10-150400.3.72.1
  * SUSE Manager Server 4.3 (noarch)
    * release-notes-susemanager-4.3.10-150400.3.93.1

## References:

  * https://www.suse.com/security/cve/CVE-2023-22644.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1191143
  * https://bugzilla.suse.com/show_bug.cgi?id=1204235
  * https://bugzilla.suse.com/show_bug.cgi?id=1207012
  * https://bugzilla.suse.com/show_bug.cgi?id=1207532
  * https://bugzilla.suse.com/show_bug.cgi?id=1210928
  * https://bugzilla.suse.com/show_bug.cgi?id=1210930
  * https://bugzilla.suse.com/show_bug.cgi?id=1211355
  * https://bugzilla.suse.com/show_bug.cgi?id=1211560
  * https://bugzilla.suse.com/show_bug.cgi?id=1211649
  * https://bugzilla.suse.com/show_bug.cgi?id=1212695
  * https://bugzilla.suse.com/show_bug.cgi?id=1212904
  * https://bugzilla.suse.com/show_bug.cgi?id=1213469
  * https://bugzilla.suse.com/show_bug.cgi?id=1214186
  * https://bugzilla.suse.com/show_bug.cgi?id=1214471
  * https://bugzilla.suse.com/show_bug.cgi?id=1214601
  * https://bugzilla.suse.com/show_bug.cgi?id=1214759
  * https://bugzilla.suse.com/show_bug.cgi?id=1215209
  * https://bugzilla.suse.com/show_bug.cgi?id=1215514
  * https://bugzilla.suse.com/show_bug.cgi?id=1215949
  * https://bugzilla.suse.com/show_bug.cgi?id=1216030
  * https://bugzilla.suse.com/show_bug.cgi?id=1216041
  * https://bugzilla.suse.com/show_bug.cgi?id=1216085
  * https://bugzilla.suse.com/show_bug.cgi?id=1216128
  * https://bugzilla.suse.com/show_bug.cgi?id=1216380
  * https://bugzilla.suse.com/show_bug.cgi?id=1216506
  * https://bugzilla.suse.com/show_bug.cgi?id=1216555
  * https://bugzilla.suse.com/show_bug.cgi?id=1216690
  * https://bugzilla.suse.com/show_bug.cgi?id=1216754
  * https://bugzilla.suse.com/show_bug.cgi?id=1217038
  * https://bugzilla.suse.com/show_bug.cgi?id=1217223
  * https://bugzilla.suse.com/show_bug.cgi?id=1217224
  * https://jira.suse.com/login.jsp

SUSE: 2023:4758-1 important: SUSE Manager 4.3.10 Release Notes

December 13, 2023
* bsc#1191143 * bsc#1204235 * bsc#1207012 * bsc#1207532 * bsc#1210928

Summary

### This update fixes the following issues: release-notes-susemanager-proxy: * Update to SUSE Manager 4.3.10 * Bugs mentioned: bsc#1216506, bsc#1216754 ## Security update for SUSE Manager Server 4.3 ### This update fixes the following issues: release-notes-susemanager: * Update to SUSE Manager 4.3.10 * SUSE Linux Enterprise Server Micro 5.5 support * CLM filter by package build date * Enhanced Errata.getDetails API endpoint * CVEs fixed: CVE-2023-22644 * Bugs mentioned: bsc#1191143, bsc#1204235, bsc#1207012, bsc#1207532, bsc#1210928, bsc#1210930, bsc#1211355, bsc#1211560, bsc#1211649, bsc#1212695, bsc#1212904, bsc#1213469, bsc#1214186, bsc#1214471, bsc#1214601, bsc#1214759, bsc#1215209, bsc#1215514, bsc#1215949, bsc#1216030, bsc#1216041, bsc#1216085, bsc#1216128, bsc#1216380, bsc#1216506, bsc#1216555, bsc#1216690, bsc#1216754, bsc#1217038, bsc#1217223, bsc#1217224 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2023-4758=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2023-4758=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2023-4758=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2023-4758=1 ## Package List: * openSUSE Leap 15.4 (noarch) * release-notes-susemanager-4.3.10-150400.3.93.1 * release-notes-susemanager-proxy-4.3.10-150400.3.72.1 * SUSE Manager Proxy 4.3 (noarch) * release-notes-susemanager-proxy-4.3.10-150400.3.72.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * release-notes-susemanager-proxy-4.3.10-150400.3.72.1 * SUSE Manager Server 4.3 (noarch) * release-notes-susemanager-4.3.10-150400.3.93.1

References

* bsc#1191143

* bsc#1204235

* bsc#1207012

* bsc#1207532

* bsc#1210928

* bsc#1210930

* bsc#1211355

* bsc#1211560

* bsc#1211649

* bsc#1212695

* bsc#1212904

* bsc#1213469

* bsc#1214186

* bsc#1214471

* bsc#1214601

* bsc#1214759

* bsc#1215209

* bsc#1215514

* bsc#1215949

* bsc#1216030

* bsc#1216041

* bsc#1216085

* bsc#1216128

* bsc#1216380

* bsc#1216506

* bsc#1216555

* bsc#1216690

* bsc#1216754

* bsc#1217038

* bsc#1217223

* bsc#1217224

* jsc#MSQA-708

Cross-

* CVE-2023-22644

CVSS scores:

* CVE-2023-22644 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N

Affected Products:

* openSUSE Leap 15.4

* SUSE Manager Proxy 4.3

* SUSE Manager Retail Branch Server 4.3

* SUSE Manager Server 4.3

An update that solves one vulnerability, contains one feature and has 30

security fixes can now be installed.

## Security update for SUSE Manager Proxy and Retail Branch Server 4.3

##

* https://www.suse.com/security/cve/CVE-2023-22644.html

* https://bugzilla.suse.com/show_bug.cgi?id=1191143

* https://bugzilla.suse.com/show_bug.cgi?id=1204235

* https://bugzilla.suse.com/show_bug.cgi?id=1207012

* https://bugzilla.suse.com/show_bug.cgi?id=1207532

* https://bugzilla.suse.com/show_bug.cgi?id=1210928

* https://bugzilla.suse.com/show_bug.cgi?id=1210930

* https://bugzilla.suse.com/show_bug.cgi?id=1211355

* https://bugzilla.suse.com/show_bug.cgi?id=1211560

* https://bugzilla.suse.com/show_bug.cgi?id=1211649

* https://bugzilla.suse.com/show_bug.cgi?id=1212695

* https://bugzilla.suse.com/show_bug.cgi?id=1212904

* https://bugzilla.suse.com/show_bug.cgi?id=1213469

* https://bugzilla.suse.com/show_bug.cgi?id=1214186

* https://bugzilla.suse.com/show_bug.cgi?id=1214471

* https://bugzilla.suse.com/show_bug.cgi?id=1214601

* https://bugzilla.suse.com/show_bug.cgi?id=1214759

* https://bugzilla.suse.com/show_bug.cgi?id=1215209

* https://bugzilla.suse.com/show_bug.cgi?id=1215514

* https://bugzilla.suse.com/show_bug.cgi?id=1215949

* https://bugzilla.suse.com/show_bug.cgi?id=1216030

* https://bugzilla.suse.com/show_bug.cgi?id=1216041

* https://bugzilla.suse.com/show_bug.cgi?id=1216085

* https://bugzilla.suse.com/show_bug.cgi?id=1216128

* https://bugzilla.suse.com/show_bug.cgi?id=1216380

* https://bugzilla.suse.com/show_bug.cgi?id=1216506

* https://bugzilla.suse.com/show_bug.cgi?id=1216555

* https://bugzilla.suse.com/show_bug.cgi?id=1216690

* https://bugzilla.suse.com/show_bug.cgi?id=1216754

* https://bugzilla.suse.com/show_bug.cgi?id=1217038

* https://bugzilla.suse.com/show_bug.cgi?id=1217223

* https://bugzilla.suse.com/show_bug.cgi?id=1217224

* https://jira.suse.com/login.jsp

Severity
Announcement ID: SUSE-SU-2023:4758-1
Rating: important

Related News