# Security update for SUSE Manager Client Tools

Announcement ID: SUSE-SU-2024:3267-1  
Rating: important  
References:

  * bsc#1220136
  * bsc#1224349
  * bsc#1225349
  * bsc#1226191
  * bsc#1226284
  * bsc#1226437
  * bsc#1226759
  * bsc#1226793
  * bsc#1226847
  * bsc#1226914
  * bsc#1227038
  * bsc#1227195
  * bsc#1227244
  * bsc#1227245
  * bsc#1227505
  * bsc#1227584
  * bsc#1227586
  * bsc#1227588
  * bsc#1227718
  * bsc#1227951
  * bsc#1228026
  * bsc#1228183
  * bsc#1228198
  * bsc#1228556
  * jsc#MSQA-848
  * jsc#PED-3577

  
Cross-References:

  * CVE-2023-45142
  * CVE-2024-6104

  
CVSS scores:

  * CVE-2023-45142 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-45142 ( NVD ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-6104 ( SUSE ):  6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
  * CVE-2024-6104 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

  
Affected Products:

  * openSUSE Leap 15.3
  * openSUSE Leap 15.4
  * openSUSE Leap 15.5
  * openSUSE Leap 15.6
  * SUSE Linux Enterprise Desktop 15
  * SUSE Linux Enterprise Desktop 15 SP1
  * SUSE Linux Enterprise Desktop 15 SP2
  * SUSE Linux Enterprise Desktop 15 SP3
  * SUSE Linux Enterprise Desktop 15 SP4
  * SUSE Linux Enterprise Desktop 15 SP5
  * SUSE Linux Enterprise Desktop 15 SP6
  * SUSE Linux Enterprise High Performance Computing 15
  * SUSE Linux Enterprise High Performance Computing 15 SP1
  * SUSE Linux Enterprise High Performance Computing 15 SP2
  * SUSE Linux Enterprise High Performance Computing 15 SP3
  * SUSE Linux Enterprise High Performance Computing 15 SP4
  * SUSE Linux Enterprise High Performance Computing 15 SP5
  * SUSE Linux Enterprise Micro 5.0
  * SUSE Linux Enterprise Micro 5.1
  * SUSE Linux Enterprise Micro 5.2
  * SUSE Linux Enterprise Micro 5.3
  * SUSE Linux Enterprise Micro 5.4
  * SUSE Linux Enterprise Micro 5.5
  * SUSE Linux Enterprise Real Time 15 SP1
  * SUSE Linux Enterprise Real Time 15 SP2
  * SUSE Linux Enterprise Real Time 15 SP3
  * SUSE Linux Enterprise Real Time 15 SP4
  * SUSE Linux Enterprise Real Time 15 SP5
  * SUSE Linux Enterprise Real Time 15 SP6
  * SUSE Linux Enterprise Server 15
  * SUSE Linux Enterprise Server 15 SP1
  * SUSE Linux Enterprise Server 15 SP2
  * SUSE Linux Enterprise Server 15 SP3
  * SUSE Linux Enterprise Server 15 SP4
  * SUSE Linux Enterprise Server 15 SP5
  * SUSE Linux Enterprise Server 15 SP6
  * SUSE Linux Enterprise Server for SAP Applications 15
  * SUSE Linux Enterprise Server for SAP Applications 15 SP1
  * SUSE Linux Enterprise Server for SAP Applications 15 SP2
  * SUSE Linux Enterprise Server for SAP Applications 15 SP3
  * SUSE Linux Enterprise Server for SAP Applications 15 SP4
  * SUSE Linux Enterprise Server for SAP Applications 15 SP5
  * SUSE Linux Enterprise Server for SAP Applications 15 SP6
  * SUSE Manager Client Tools for SLE 15
  * SUSE Manager Client Tools for SLE Micro 5

  
  
An update that solves two vulnerabilities, contains two features and has 22
security fixes can now be installed.

## Description:

This update fixes the following issues:

golang-github-prometheus-prometheus:

  * Security issues fixed:

  * CVE-2024-6104: Update go-retryablehttp to version 0.7.7 (bsc#1227038)

  * CVE-2023-45142: Updated otelhttp to version 0.46.1 (bsc#1228556)

  * Require Go > 1.20 for building

  * Migrate from `disabled` to `manual` service mode
  * Update to 2.45.6 (jsc#PED-3577):
  * Security fixes in dependencies
  * Update to 2.45.5:
  * [BUGFIX] tsdb/agent: ensure that new series get written to WAL on rollback.
  * [BUGFIX] Remote write: Avoid a race condition when applying configuration.
  * Update to 2.45.4:
  * [BUGFIX] Remote read: Release querier resources before encoding the results.
  * Update to 2.45.3:
  * [BUGFIX] TSDB: Remove double memory snapshot on shutdown.
  * Update to 2.45.2:
  * [BUGFIX] TSDB: Fix PostingsForMatchers race with creating new series.
  * Update to 2.45.1:
  * [ENHANCEMENT] Hetzner SD: Support larger ID's that will be used by Hetzner
    in September.
  * [BUGFIX] Linode SD: Cast InstanceSpec values to int64 to avoid overflows on
    386 architecture.
  * [BUGFIX] TSDB: Handle TOC parsing failures.

rhnlib:

  * Version 5.0.4-0
  * Add the old TLS code for very old traditional clients still on python 2.7
    (bsc#1228198)

spacecmd:

  * Version 5.0.9-0
  * Update translation strings

uyuni-tools:

  * Version 0.1.21-0
  * mgrpxy: Fix typo on Systemd template
  * Version 0.1.20-0
  * Update the push tag to 5.0.1
  * mgrpxy: expose port on IPv6 network (bsc#1227951)
  * Version 0.1.19-0
  * Skip updating Tomcat remote debug if conf file is not present
  * Version 0.1.18-0
  * Setup Confidential Computing container during migration (bsc#1227588)
  * Add the /etc/uyuni/uyuni-tools.yaml path to the config help
  * Split systemd config files to not loose configuration at upgrade
    (bsc#1227718)
  * Use the same logic for image computation in mgradm and mgrpxy (bsc#1228026)
  * Allow building with different Helm and container default registry paths
    (bsc#1226191)
  * Fix recursion in mgradm upgrade podman list --help
  * Setup hub xmlrpc API service in migration to Podman (bsc#1227588)
  * Setup disabled hub xmlrpc API service in all cases (bsc#1227584)
  * Clean the inspection code to make it faster
  * Properly detect IPv6 enabled on Podman network (bsc#1224349)
  * Fix the log file path generation
  * Write scripts output to uyuni-tools.log file
  * Add uyuni-hubxml-rpc to the list of values in mgradm scale --help
  * Use path in mgradm support sql file input (bsc#1227505)
  * On Ubuntu build with go1.21 instead of go1.20
  * Enforce Cobbler setup (bsc#1226847)
  * Expose port on IPv6 network (bsc#1227951)
  * show output of podman image search --list-tags command
  * Implement mgrpxy support config command
  * During migration, ignore /etc/sysconfig/tomcat and /etc/tomcat/tomcat.conf
    (bsc#1228183)
  * During migration, remove java.annotation,com.sun.xml.bind and
    UseConcMarkSweepGC settings
  * Disable node exporter port for Kubernetes
  * Fix start, stop and restart in Kubernetes
  * Increase start timeout in Kubernetes
  * Fix traefik query
  * Fix password entry usability (bsc#1226437)
  * Add --prepare option to migrate command
  * Fix random error during installation of CA certificate (bsc#1227245)
  * Clarify and fix distro name guessing when not provided (bsc#1226284)
  * Replace not working Fatal error by plain error return (bsc#1220136)
  * Allow server installation with preexisting storage volumes
  * Do not report error when purging mounted volume (bsc#1225349)
  * Preserve PAGER settings from the host for interactive sql usage
    (bsc#1226914)
  * Add mgrpxy command to clear the Squid cache
  * Use local images for Confidential Computing and Hub containers (bsc#1227586)
  * Version 0.1.17-0
  * Allow GPG files to be loaded from the local file (bsc#1227195)
  * Version 0.1.16-0
  * Prefer local images in all migration steps (bsc#1227244)
  * Version 0.1.15-0
  * Define --registry flag behaviour (bsc#1226793)
  * Version 0.1.14-0
  * Do not rely on hardcoded registry, remove any FQDN
  * Version 0.1.13-0
  * Fix mgradm support config tarball creation (bsc#1226759)
  * Version 0.1.12-0
  * Detection of k8s on Proxy was wrongly influenced by Server setting

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * openSUSE Leap 15.5  
    zypper in -t patch openSUSE-SLE-15.5-2024-3267=1

  * openSUSE Leap 15.6  
    zypper in -t patch openSUSE-SLE-15.6-2024-3267=1

  * SUSE Manager Client Tools for SLE 15  
    zypper in -t patch SUSE-SLE-Manager-Tools-15-2024-3267=1

  * SUSE Manager Client Tools for SLE Micro 5  
    zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2024-3267=1

## Package List:

  * openSUSE Leap 15.5 (noarch)
    * spacecmd-5.0.9-150000.3.124.1
  * openSUSE Leap 15.6 (noarch)
    * spacecmd-5.0.9-150000.3.124.1
  * SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64)
    * mgrctl-debuginfo-0.1.21-150000.1.8.2
    * mgrctl-0.1.21-150000.1.8.2
    * firewalld-prometheus-config-0.1-150000.3.56.1
    * golang-github-prometheus-prometheus-2.45.6-150000.3.56.1
  * SUSE Manager Client Tools for SLE 15 (noarch)
    * mgrctl-bash-completion-0.1.21-150000.1.8.2
    * python3-rhnlib-5.0.4-150000.3.46.1
    * mgrctl-zsh-completion-0.1.21-150000.1.8.2
    * mgrctl-lang-0.1.21-150000.1.8.2
    * spacecmd-5.0.9-150000.3.124.1
  * SUSE Manager Client Tools for SLE Micro 5 (aarch64 s390x x86_64)
    * mgrctl-debuginfo-0.1.21-150000.1.8.2
    * mgrctl-0.1.21-150000.1.8.2
  * SUSE Manager Client Tools for SLE Micro 5 (noarch)
    * mgrctl-bash-completion-0.1.21-150000.1.8.2
    * mgrctl-lang-0.1.21-150000.1.8.2
    * mgrctl-zsh-completion-0.1.21-150000.1.8.2

## References:

  * https://www.suse.com/security/cve/CVE-2023-45142.html
  * https://www.suse.com/security/cve/CVE-2024-6104.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1220136
  * https://bugzilla.suse.com/show_bug.cgi?id=1224349
  * https://bugzilla.suse.com/show_bug.cgi?id=1225349
  * https://bugzilla.suse.com/show_bug.cgi?id=1226191
  * https://bugzilla.suse.com/show_bug.cgi?id=1226284
  * https://bugzilla.suse.com/show_bug.cgi?id=1226437
  * https://bugzilla.suse.com/show_bug.cgi?id=1226759
  * https://bugzilla.suse.com/show_bug.cgi?id=1226793
  * https://bugzilla.suse.com/show_bug.cgi?id=1226847
  * https://bugzilla.suse.com/show_bug.cgi?id=1226914
  * https://bugzilla.suse.com/show_bug.cgi?id=1227038
  * https://bugzilla.suse.com/show_bug.cgi?id=1227195
  * https://bugzilla.suse.com/show_bug.cgi?id=1227244
  * https://bugzilla.suse.com/show_bug.cgi?id=1227245
  * https://bugzilla.suse.com/show_bug.cgi?id=1227505
  * https://bugzilla.suse.com/show_bug.cgi?id=1227584
  * https://bugzilla.suse.com/show_bug.cgi?id=1227586
  * https://bugzilla.suse.com/show_bug.cgi?id=1227588
  * https://bugzilla.suse.com/show_bug.cgi?id=1227718
  * https://bugzilla.suse.com/show_bug.cgi?id=1227951
  * https://bugzilla.suse.com/show_bug.cgi?id=1228026
  * https://bugzilla.suse.com/show_bug.cgi?id=1228183
  * https://bugzilla.suse.com/show_bug.cgi?id=1228198
  * https://bugzilla.suse.com/show_bug.cgi?id=1228556
  * https://jira.suse.com/browse/MSQA-848
  * https://jira.suse.com/browse/PED-3577

SUSE: 2024:3267-1 important: SUSE Manager Client Tools Security Advisory Updates

September 17, 2024
* bsc#1220136 * bsc#1224349 * bsc#1225349 * bsc#1226191 * bsc#1226284

Summary

## This update fixes the following issues: golang-github-prometheus-prometheus: * Security issues fixed: * CVE-2024-6104: Update go-retryablehttp to version 0.7.7 (bsc#1227038) * CVE-2023-45142: Updated otelhttp to version 0.46.1 (bsc#1228556) * Require Go > 1.20 for building * Migrate from `disabled` to `manual` service mode * Update to 2.45.6 (jsc#PED-3577): * Security fixes in dependencies * Update to 2.45.5: * [BUGFIX] tsdb/agent: ensure that new series get written to WAL on rollback. * [BUGFIX] Remote write: Avoid a race condition when applying configuration. * Update to 2.45.4: * [BUGFIX] Remote read: Release querier resources before encoding the results. * Update to 2.45.3: * [BUGFIX] TSDB: Remove double memory snapshot on shutdown. * Update to 2.45.2: * [BUGFIX] TSDB: Fix PostingsForMatchers race with creating new series. * Update to 2.45.1: * [ENHANCEMENT] Hetzner SD: Support larger ID's that will be used by Hetzner in September. * [BUGFIX] Linode SD: Cast InstanceSpec values to int64 to avoid overflows on 386 architecture. * [BUGFIX] TSDB: Handle TOC parsing failures. rhnlib: * Version 5.0.4-0 * Add the old TLS code for very old traditional clients still on python 2.7 (bsc#1228198) spacecmd: * Version 5.0.9-0 * Update translation strings uyuni-tools: * Version 0.1.21-0 * mgrpxy: Fix typo on Systemd template * Version 0.1.20-0 * Update the push tag to 5.0.1 * mgrpxy: expose port on IPv6 network (bsc#1227951) * Version 0.1.19-0 * Skip updating Tomcat remote debug if conf file is not present * Version 0.1.18-0 * Setup Confidential Computing container during migration (bsc#1227588) * Add the /etc/uyuni/uyuni-tools.yaml path to the config help * Split systemd config files to not loose configuration at upgrade (bsc#1227718) * Use the same logic for image computation in mgradm and mgrpxy (bsc#1228026) * Allow building with different Helm and container default registry paths (bsc#1226191) * Fix recursion in mgradm upgrade podman list --help * Setup hub xmlrpc API service in migration to Podman (bsc#1227588) * Setup disabled hub xmlrpc API service in all cases (bsc#1227584) * Clean the inspection code to make it faster * Properly detect IPv6 enabled on Podman network (bsc#1224349) * Fix the log file path generation * Write scripts output to uyuni-tools.log file * Add uyuni-hubxml-rpc to the list of values in mgradm scale --help * Use path in mgradm support sql file input (bsc#1227505) * On Ubuntu build with go1.21 instead of go1.20 * Enforce Cobbler setup (bsc#1226847) * Expose port on IPv6 network (bsc#1227951) * show output of podman image search --list-tags command * Implement mgrpxy support config command * During migration, ignore /etc/sysconfig/tomcat and /etc/tomcat/tomcat.conf (bsc#1228183) * During migration, remove java.annotation,com.sun.xml.bind and UseConcMarkSweepGC settings * Disable node exporter port for Kubernetes * Fix start, stop and restart in Kubernetes * Increase start timeout in Kubernetes * Fix traefik query * Fix password entry usability (bsc#1226437) * Add --prepare option to migrate command * Fix random error during installation of CA certificate (bsc#1227245) * Clarify and fix distro name guessing when not provided (bsc#1226284) * Replace not working Fatal error by plain error return (bsc#1220136) * Allow server installation with preexisting storage volumes * Do not report error when purging mounted volume (bsc#1225349) * Preserve PAGER settings from the host for interactive sql usage (bsc#1226914) * Add mgrpxy command to clear the Squid cache * Use local images for Confidential Computing and Hub containers (bsc#1227586) * Version 0.1.17-0 * Allow GPG files to be loaded from the local file (bsc#1227195) * Version 0.1.16-0 * Prefer local images in all migration steps (bsc#1227244) * Version 0.1.15-0 * Define --registry flag behaviour (bsc#1226793) * Version 0.1.14-0 * Do not rely on hardcoded registry, remove any FQDN * Version 0.1.13-0 * Fix mgradm support config tarball creation (bsc#1226759) * Version 0.1.12-0 * Detection of k8s on Proxy was wrongly influenced by Server setting ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3267=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3267=1 * SUSE Manager Client Tools for SLE 15 zypper in -t patch SUSE-SLE-Manager-Tools-15-2024-3267=1 * SUSE Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2024-3267=1 ## Package List: * openSUSE Leap 15.5 (noarch) * spacecmd-5.0.9-150000.3.124.1 * openSUSE Leap 15.6 (noarch) * spacecmd-5.0.9-150000.3.124.1 * SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64) * mgrctl-debuginfo-0.1.21-150000.1.8.2 * mgrctl-0.1.21-150000.1.8.2 * firewalld-prometheus-config-0.1-150000.3.56.1 * golang-github-prometheus-prometheus-2.45.6-150000.3.56.1 * SUSE Manager Client Tools for SLE 15 (noarch) * mgrctl-bash-completion-0.1.21-150000.1.8.2 * python3-rhnlib-5.0.4-150000.3.46.1 * mgrctl-zsh-completion-0.1.21-150000.1.8.2 * mgrctl-lang-0.1.21-150000.1.8.2 * spacecmd-5.0.9-150000.3.124.1 * SUSE Manager Client Tools for SLE Micro 5 (aarch64 s390x x86_64) * mgrctl-debuginfo-0.1.21-150000.1.8.2 * mgrctl-0.1.21-150000.1.8.2 * SUSE Manager Client Tools for SLE Micro 5 (noarch) * mgrctl-bash-completion-0.1.21-150000.1.8.2 * mgrctl-lang-0.1.21-150000.1.8.2 * mgrctl-zsh-completion-0.1.21-150000.1.8.2

References

* bsc#1220136

* bsc#1224349

* bsc#1225349

* bsc#1226191

* bsc#1226284

* bsc#1226437

* bsc#1226759

* bsc#1226793

* bsc#1226847

* bsc#1226914

* bsc#1227038

* bsc#1227195

* bsc#1227244

* bsc#1227245

* bsc#1227505

* bsc#1227584

* bsc#1227586

* bsc#1227588

* bsc#1227718

* bsc#1227951

* bsc#1228026

* bsc#1228183

* bsc#1228198

* bsc#1228556

* jsc#MSQA-848

* jsc#PED-3577

Cross-

* CVE-2023-45142

* CVE-2024-6104

CVSS scores:

* CVE-2023-45142 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-45142 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-6104 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N

* CVE-2024-6104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* openSUSE Leap 15.3

* openSUSE Leap 15.4

* openSUSE Leap 15.5

* openSUSE Leap 15.6

* SUSE Linux Enterprise Desktop 15

* SUSE Linux Enterprise Desktop 15 SP1

* SUSE Linux Enterprise Desktop 15 SP2

* SUSE Linux Enterprise Desktop 15 SP3

* SUSE Linux Enterprise Desktop 15 SP4

* SUSE Linux Enterprise Desktop 15 SP5

* SUSE Linux Enterprise Desktop 15 SP6

* SUSE Linux Enterprise High Performance Computing 15

* SUSE Linux Enterprise High Performance Computing 15 SP1

* SUSE Linux Enterprise High Performance Computing 15 SP2

* SUSE Linux Enterprise High Performance Computing 15 SP3

* SUSE Linux Enterprise High Performance Computing 15 SP4

* SUSE Linux Enterprise High Performance Computing 15 SP5

* SUSE Linux Enterprise Micro 5.0

* SUSE Linux Enterprise Micro 5.1

* SUSE Linux Enterprise Micro 5.2

* SUSE Linux Enterprise Micro 5.3

* SUSE Linux Enterprise Micro 5.4

* SUSE Linux Enterprise Micro 5.5

* SUSE Linux Enterprise Real Time 15 SP1

* SUSE Linux Enterprise Real Time 15 SP2

* SUSE Linux Enterprise Real Time 15 SP3

* SUSE Linux Enterprise Real Time 15 SP4

* SUSE Linux Enterprise Real Time 15 SP5

* SUSE Linux Enterprise Real Time 15 SP6

* SUSE Linux Enterprise Server 15

* SUSE Linux Enterprise Server 15 SP1

* SUSE Linux Enterprise Server 15 SP2

* SUSE Linux Enterprise Server 15 SP3

* SUSE Linux Enterprise Server 15 SP4

* SUSE Linux Enterprise Server 15 SP5

* SUSE Linux Enterprise Server 15 SP6

* SUSE Linux Enterprise Server for SAP Applications 15

* SUSE Linux Enterprise Server for SAP Applications 15 SP1

* SUSE Linux Enterprise Server for SAP Applications 15 SP2

* SUSE Linux Enterprise Server for SAP Applications 15 SP3

* SUSE Linux Enterprise Server for SAP Applications 15 SP4

* SUSE Linux Enterprise Server for SAP Applications 15 SP5

* SUSE Linux Enterprise Server for SAP Applications 15 SP6

* SUSE Manager Client Tools for SLE 15

* SUSE Manager Client Tools for SLE Micro 5

An update that solves two vulnerabilities, contains two features and has 22

security fixes can now be installed.

##

* https://www.suse.com/security/cve/CVE-2023-45142.html

* https://www.suse.com/security/cve/CVE-2024-6104.html

* https://bugzilla.suse.com/show_bug.cgi?id=1220136

* https://bugzilla.suse.com/show_bug.cgi?id=1224349

* https://bugzilla.suse.com/show_bug.cgi?id=1225349

* https://bugzilla.suse.com/show_bug.cgi?id=1226191

* https://bugzilla.suse.com/show_bug.cgi?id=1226284

* https://bugzilla.suse.com/show_bug.cgi?id=1226437

* https://bugzilla.suse.com/show_bug.cgi?id=1226759

* https://bugzilla.suse.com/show_bug.cgi?id=1226793

* https://bugzilla.suse.com/show_bug.cgi?id=1226847

* https://bugzilla.suse.com/show_bug.cgi?id=1226914

* https://bugzilla.suse.com/show_bug.cgi?id=1227038

* https://bugzilla.suse.com/show_bug.cgi?id=1227195

* https://bugzilla.suse.com/show_bug.cgi?id=1227244

* https://bugzilla.suse.com/show_bug.cgi?id=1227245

* https://bugzilla.suse.com/show_bug.cgi?id=1227505

* https://bugzilla.suse.com/show_bug.cgi?id=1227584

* https://bugzilla.suse.com/show_bug.cgi?id=1227586

* https://bugzilla.suse.com/show_bug.cgi?id=1227588

* https://bugzilla.suse.com/show_bug.cgi?id=1227718

* https://bugzilla.suse.com/show_bug.cgi?id=1227951

* https://bugzilla.suse.com/show_bug.cgi?id=1228026

* https://bugzilla.suse.com/show_bug.cgi?id=1228183

* https://bugzilla.suse.com/show_bug.cgi?id=1228198

* https://bugzilla.suse.com/show_bug.cgi?id=1228556

* https://jira.suse.com/browse/MSQA-848

* https://jira.suse.com/browse/PED-3577

Severity
Announcement ID: SUSE-SU-2024:3267-1
Rating: important

Related News