<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security Beta update for SUSE Manager Client Tools and Salt</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:1427-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-04-24T09:10:16Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-04-24T09:10:16Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-04-24T09:10:16Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security Beta update for SUSE Manager Client Tools and Salt</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update fixes the following issues:

POS_Image-Graphical7:

- Update to version 0.1.1710765237.46af599
  * Move image services to dracut-saltboot package
  * Use salt bundle
- Update to version 0.1.1645440615.7f1328c
  * Remove deprecated kiwi functions

POS_Image-JeOS7:

- Update to version 0.1.1710765237.46af599
  * Move image services to dracut-saltboot package
  * Use salt bundle
- Update to version 0.1.1645440615.7f1328c
  * Remove deprecated kiwi functions

ansible:

- CVE-2023-5764: Address issues where internal templating can cause unsafe
  variables to lose their unsafe designation (bsc#1216854)
  * breaking_changes:
    assert - Nested templating may result in an inability for the conditional
    to be evaluated. See the porting guide for more information.
- CVE-2024-0690: Address issue where ANSIBLE_NO_LOG was ignored (bsc#1219002)
- CVE-2020-14365: Do a GPG validation if the disable_gpg_check option is not set. (bsc#1175993)
- Don't Require python-coverage, it is needed only for testing (bsc#1177948)
- CVE-2018-10874: Inventory variables are loaded from current working directory when running ad-hoc command that can
  lead to code execution (included upstream in 2.6.1) (bsc#1099805) 

dracut-saltboot:

- Update to version 0.1.1710765237.46af599 
  * Load only first available leaseinfo (bsc#1221092)
- Update to version 0.1.1681904360.84ef141


grafana:

- Require Go 1.20
- Update to version 9.5.16:
  * [SECURITY] CVE-2023-6152: Add email verification when updating
    user email (bsc#1219912)
  * [BUGFIX] Annotations: Split cleanup into separate queries and
    deletes to avoid deadlocks on MySQL
- Update to version 9.5.15:
  * [FEATURE] Alerting: Attempt to retry retryable errors
- Update to version 9.5.14:
  * [BUGFIX] Alerting: Fix state manager to not keep
    datasource_uid and ref_id labels in state after Error
  * [BUGFIX] Transformations: Config overrides being lost when
    config from query transform is applied
  * [BUGFIX] LDAP: Fix enable users on successfull login
- Update to version 9.5.13:
  * [BUGFIX] BrowseDashboards: Only remember the most recent
    expanded folder
  * [BUGFIX] Licensing: Pass func to update env variables when
    starting plugin
- Update to version 9.5.12:
  * [FEATURE] Azure: Add support for Workload Identity
    authentication
- Update to version 9.5.9:
  * [FEATURE] SSE: Fix DSNode to not panic when response has empty
    response
  * [FEATURE] Prometheus: Handle the response with different field
    key order
  * [BUGFIX] LDAP: Fix user disabling

golang-github-prometheus-node_exporter:

- Add `device_error` label for filesystem metrics.
- Update rtnetlink library to fix errors during ARP metrics collection.
- Update to 1.7.0 (jsc#PED-7893, jsc#PED-7928):
  * [FEATURE] Add ZFS freebsd per dataset stats #2753
  * [FEATURE] Add cpu vulnerabilities reporting from sysfs #2721
  * [ENHANCEMENT] Parallelize stat calls in Linux filesystem
    collector #1772
  * [ENHANCEMENT] Add missing linkspeeds to ethtool collector #2711
  * [ENHANCEMENT] Add CPU MHz as the value for node_cpu_info metric
    #2778
  * [ENHANCEMENT] Improve qdisc collector performance #2779
  * [ENHANCEMENT] Add include and exclude filter for hwmon
    collector #2699
  * [ENHANCEMENT] Optionally fetch ARP stats via rtnetlink instead
    of procfs #2777
  * [BUFFIX] Fix ZFS arcstats on FreeBSD 14.0+ 2754
  * [BUGFIX] Fallback to 32-bit stats in netdev #2757
  * [BUGFIX] Close btrfs.FS handle after use #2780
  * [BUGFIX] Move RO status before error return #2807
  * [BUFFIX] Fix promhttp_metric_handler_errors_total being always
    active #2808
  * [BUGFIX] Fix nfsd v4 index miss #2824
- Update to 1.6.1:
  (no source code changes in this release)
- BuildRequire go1.20
- Update to 1.6.0:
  * [CHANGE] Fix cpustat when some cpus are offline #2318
  * [CHANGE] Remove metrics of offline CPUs in CPU collector #2605
  * [CHANGE] Deprecate ntp collector #2603
  * [CHANGE] Remove bcache `cache_readaheads_totals` metrics #2583
  * [CHANGE] Deprecate supervisord collector #2685
  * [FEATURE] Enable uname collector on NetBSD #2559
  * [FEATURE] NetBSD support for the meminfo collector #2570
  * [FEATURE] NetBSD support for CPU collector #2626
  * [FEATURE] Add FreeBSD collector for netisr subsystem #2668
  * [FEATURE] Add softirqs collector #2669
  * [ENHANCEMENT] Add suspended as a `node_zfs_zpool_state` #2449
  * [ENHANCEMENT] Add administrative state of Linux network
    interfaces #2515
  * [ENHANCEMENT] Log current value of GOMAXPROCS #2537
  * [ENHANCEMENT] Add profiler options for perf collector #2542
  * [ENHANCEMENT] Allow root path as metrics path #2590
  * [ENHANCEMENT] Add cpu frequency governor metrics #2569
  * [ENHANCEMENT] Add new landing page #2622
  * [ENHANCEMENT] Reduce privileges needed for btrfs device stats #2634
  * [ENHANCEMENT] Add ZFS `memory_available_bytes` #2687
  * [ENHANCEMENT] Use `SCSI_IDENT_SERIAL` as serial in diskstats #2612
  * [ENHANCEMENT] Read missing from netlink netclass attributes from sysfs #2669
  * [BUGFIX] perf: fixes for automatically detecting the correct
    tracefs mountpoints #2553
  * [BUGFIX] Fix `thermal_zone` collector noise @2554
  * [BUGFIX] Fix a problem fetching the user wire count on FreeBSD
    2584
  * [BUGFIX] interrupts: Fix fields on linux aarch64 #2631
  * [BUGFIX] Remove metrics of offline CPUs in CPU collector #2605
  * [BUGFIX] Fix OpenBSD filesystem collector string parsing #2637
  * [BUGFIX] Fix bad reporting of `node_cpu_seconds_total` in
    OpenBSD #2663
- Change go_modules archive in _service to use obscpio file

spacecmd:

- Version 5.0.5-0
  * Update translation strings

spacewalk-client-tools:

- Version 5.0.4-0
  * Remove rhn-profile-sync rhn_register spacewalk-channel and
    spacewalk-update-status

supportutils-plugin-susemanager-client:

- Version 5.0.3-0
  * Remove rhnsd from client actions and server backend

uyuni-tools:

- Version 0.1.7-0
  * Fix wrong Cobbler spacewalk_authentication_endpoint property after upgrade or migration
  * Fix migration script using missing awk in migration image
- Version 0.1.6-0
  * Pull image from authenticated registry
  * Port 80 should be published to the port 80 of the containers.
    8080 is squid
  * Autogenerate the database password
  * Add mgrctl term command
  * Fix --version flag
  * Deny uyuni to suma upgrade and viceversa
  * Refactor upgrade to clarify script end adding post upgrade
    script (bsc#1219887)
  * Add mgradm install podman arguments to define big volumes storage
  * k8s migration use same functions as upgrade
  * Allow to use images from RPM if present
  * Schedule a system list refresh after migrate if not runned before
  * Ignore error on optional flag
  * Fix migration of multiple autoinstallable distributions
  * Obsolete uyuni-proxy-systemd-service package by mgrpxy
  * Add GitHub workflow for checking changelog
  * Allow installation using --image image:tag
  * Add command to register Peripheral server to Hub
  * Add Node exporter (9100) and Taskomatic (9800) ports to the list
    of open TCP ports
  * Fix minimal administrator password length
  * Do not assume the current host is a cluster node when getting
    kubelet version
  * Add mgrpxy start, stop and restart commands
  * Remove shm size constraints on the server
  * Add mgrpxy and mgradm status commands
  * Use uninstall commands dry run by default to avoid unintended
    removals
  * Make first user mandatory at install time
  * Add inspect and upgrade command
  * Improve error handling when exec.Command is used
  * Start/Stop/Restart command with kubernetes
- Version 0.1.5-0
  * Install aardvark-dns if netavark is installed (bsc#1220371)

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2024-1427,SUSE-SLE-Manager-Tools-15-BETA-2024-1427,SUSE-SLE-Manager-Tools-Beta-For-Micro-5-2024-1427</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241427-1/</URL>
      <Description>Link for SUSE-SU-2024:1427-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2024-April/035080.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:1427-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1008037</URL>
      <Description>SUSE Bug 1008037</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1008038</URL>
      <Description>SUSE Bug 1008038</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010940</URL>
      <Description>SUSE Bug 1010940</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1019021</URL>
      <Description>SUSE Bug 1019021</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1038785</URL>
      <Description>SUSE Bug 1038785</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1059235</URL>
      <Description>SUSE Bug 1059235</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1099805</URL>
      <Description>SUSE Bug 1099805</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1166389</URL>
      <Description>SUSE Bug 1166389</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171823</URL>
      <Description>SUSE Bug 1171823</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174145</URL>
      <Description>SUSE Bug 1174145</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174302</URL>
      <Description>SUSE Bug 1174302</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175993</URL>
      <Description>SUSE Bug 1175993</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177948</URL>
      <Description>SUSE Bug 1177948</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1216854</URL>
      <Description>SUSE Bug 1216854</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1219002</URL>
      <Description>SUSE Bug 1219002</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1219887</URL>
      <Description>SUSE Bug 1219887</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1219912</URL>
      <Description>SUSE Bug 1219912</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1220371</URL>
      <Description>SUSE Bug 1220371</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221092</URL>
      <Description>SUSE Bug 1221092</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8647/</URL>
      <Description>SUSE CVE CVE-2016-8647 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9587/</URL>
      <Description>SUSE CVE CVE-2016-9587 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7550/</URL>
      <Description>SUSE CVE CVE-2017-7550 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-10874/</URL>
      <Description>SUSE CVE CVE-2018-10874 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14365/</URL>
      <Description>SUSE CVE CVE-2020-14365 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-5764/</URL>
      <Description>SUSE CVE CVE-2023-5764 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-6152/</URL>
      <Description>SUSE CVE CVE-2023-6152 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-0690/</URL>
      <Description>SUSE CVE CVE-2024-0690 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Manager Client Tools 15-BETA">
      <Branch Type="Product Name" Name="SUSE Manager Client Tools 15-BETA">
        <FullProductName ProductID="SUSE Manager Client Tools 15-BETA">SUSE Manager Client Tools 15-BETA</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Client Tools Beta for SLE Micro 5">
      <Branch Type="Product Name" Name="SUSE Manager Client Tools Beta for SLE Micro 5">
        <FullProductName ProductID="SUSE Manager Client Tools Beta for SLE Micro 5" CPE="cpe:/o:suse:sle-manager-tools-beta-micro:5">SUSE Manager Client Tools Beta for SLE Micro 5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="POS_Image-Graphical7-0.1.1710765237.46af599-159000.3.24.2">
      <FullProductName ProductID="POS_Image-Graphical7-0.1.1710765237.46af599-159000.3.24.2">POS_Image-Graphical7-0.1.1710765237.46af599-159000.3.24.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="POS_Image-JeOS7-0.1.1710765237.46af599-159000.3.24.2">
      <FullProductName ProductID="POS_Image-JeOS7-0.1.1710765237.46af599-159000.3.24.2">POS_Image-JeOS7-0.1.1710765237.46af599-159000.3.24.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ansible-2.9.27-159000.3.12.2">
      <FullProductName ProductID="ansible-2.9.27-159000.3.12.2">ansible-2.9.27-159000.3.12.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ansible-doc-2.9.27-159000.3.12.2">
      <FullProductName ProductID="ansible-doc-2.9.27-159000.3.12.2">ansible-doc-2.9.27-159000.3.12.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ansible-test-2.9.27-159000.3.12.2">
      <FullProductName ProductID="ansible-test-2.9.27-159000.3.12.2">ansible-test-2.9.27-159000.3.12.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dracut-saltboot-0.1.1710765237.46af599-159000.3.33.2">
      <FullProductName ProductID="dracut-saltboot-0.1.1710765237.46af599-159000.3.33.2">dracut-saltboot-0.1.1710765237.46af599-159000.3.33.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="golang-github-prometheus-node_exporter-1.5.0-159000.6.2.1">
      <FullProductName ProductID="golang-github-prometheus-node_exporter-1.5.0-159000.6.2.1">golang-github-prometheus-node_exporter-1.5.0-159000.6.2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="grafana-9.5.16-159000.4.30.2">
      <FullProductName ProductID="grafana-9.5.16-159000.4.30.2">grafana-9.5.16-159000.4.30.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mgrctl-0.1.7-159000.3.8.1">
      <FullProductName ProductID="mgrctl-0.1.7-159000.3.8.1">mgrctl-0.1.7-159000.3.8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mgrctl-bash-completion-0.1.7-159000.3.8.1">
      <FullProductName ProductID="mgrctl-bash-completion-0.1.7-159000.3.8.1">mgrctl-bash-completion-0.1.7-159000.3.8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mgrctl-zsh-completion-0.1.7-159000.3.8.1">
      <FullProductName ProductID="mgrctl-zsh-completion-0.1.7-159000.3.8.1">mgrctl-zsh-completion-0.1.7-159000.3.8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-spacewalk-check-5.0.4-159000.6.54.2">
      <FullProductName ProductID="python3-spacewalk-check-5.0.4-159000.6.54.2">python3-spacewalk-check-5.0.4-159000.6.54.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-spacewalk-client-setup-5.0.4-159000.6.54.2">
      <FullProductName ProductID="python3-spacewalk-client-setup-5.0.4-159000.6.54.2">python3-spacewalk-client-setup-5.0.4-159000.6.54.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-spacewalk-client-tools-5.0.4-159000.6.54.2">
      <FullProductName ProductID="python3-spacewalk-client-tools-5.0.4-159000.6.54.2">python3-spacewalk-client-tools-5.0.4-159000.6.54.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="spacecmd-5.0.5-159000.6.48.2">
      <FullProductName ProductID="spacecmd-5.0.5-159000.6.48.2">spacecmd-5.0.5-159000.6.48.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="spacewalk-check-5.0.4-159000.6.54.2">
      <FullProductName ProductID="spacewalk-check-5.0.4-159000.6.54.2">spacewalk-check-5.0.4-159000.6.54.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="spacewalk-client-setup-5.0.4-159000.6.54.2">
      <FullProductName ProductID="spacewalk-client-setup-5.0.4-159000.6.54.2">spacewalk-client-setup-5.0.4-159000.6.54.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="spacewalk-client-tools-5.0.4-159000.6.54.2">
      <FullProductName ProductID="spacewalk-client-tools-5.0.4-159000.6.54.2">spacewalk-client-tools-5.0.4-159000.6.54.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="supportutils-plugin-susemanager-client-5.0.3-159000.6.21.2">
      <FullProductName ProductID="supportutils-plugin-susemanager-client-5.0.3-159000.6.21.2">supportutils-plugin-susemanager-client-5.0.3-159000.6.21.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="uyuni-base-common-5.0.2-159000.3.21.2">
      <FullProductName ProductID="uyuni-base-common-5.0.2-159000.3.21.2">uyuni-base-common-5.0.2-159000.3.21.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="uyuni-base-proxy-5.0.2-159000.3.21.2">
      <FullProductName ProductID="uyuni-base-proxy-5.0.2-159000.3.21.2">uyuni-base-proxy-5.0.2-159000.3.21.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="uyuni-base-server-5.0.2-159000.3.21.2">
      <FullProductName ProductID="uyuni-base-server-5.0.2-159000.3.21.2">uyuni-base-server-5.0.2-159000.3.21.2</FullProductName>
    </Branch>
    <Relationship ProductReference="POS_Image-Graphical7-0.1.1710765237.46af599-159000.3.24.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15-BETA">
      <FullProductName ProductID="SUSE Manager Client Tools 15-BETA:POS_Image-Graphical7-0.1.1710765237.46af599-159000.3.24.2">POS_Image-Graphical7-0.1.1710765237.46af599-159000.3.24.2 as a component of SUSE Manager Client Tools 15-BETA</FullProductName>
    </Relationship>
    <Relationship ProductReference="POS_Image-JeOS7-0.1.1710765237.46af599-159000.3.24.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15-BETA">
      <FullProductName ProductID="SUSE Manager Client Tools 15-BETA:POS_Image-JeOS7-0.1.1710765237.46af599-159000.3.24.2">POS_Image-JeOS7-0.1.1710765237.46af599-159000.3.24.2 as a component of SUSE Manager Client Tools 15-BETA</FullProductName>
    </Relationship>
    <Relationship ProductReference="ansible-2.9.27-159000.3.12.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15-BETA">
      <FullProductName ProductID="SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.12.2">ansible-2.9.27-159000.3.12.2 as a component of SUSE Manager Client Tools 15-BETA</FullProductName>
    </Relationship>
    <Relationship ProductReference="ansible-doc-2.9.27-159000.3.12.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15-BETA">
      <FullProductName ProductID="SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.12.2">ansible-doc-2.9.27-159000.3.12.2 as a component of SUSE Manager Client Tools 15-BETA</FullProductName>
    </Relationship>
    <Relationship ProductReference="dracut-saltboot-0.1.1710765237.46af599-159000.3.33.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15-BETA">
      <FullProductName ProductID="SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1710765237.46af599-159000.3.33.2">dracut-saltboot-0.1.1710765237.46af599-159000.3.33.2 as a component of SUSE Manager Client Tools 15-BETA</FullProductName>
    </Relationship>
    <Relationship ProductReference="grafana-9.5.16-159000.4.30.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15-BETA">
      <FullProductName ProductID="SUSE Manager Client Tools 15-BETA:grafana-9.5.16-159000.4.30.2">grafana-9.5.16-159000.4.30.2 as a component of SUSE Manager Client Tools 15-BETA</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgrctl-0.1.7-159000.3.8.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15-BETA">
      <FullProductName ProductID="SUSE Manager Client Tools 15-BETA:mgrctl-0.1.7-159000.3.8.1">mgrctl-0.1.7-159000.3.8.1 as a component of SUSE Manager Client Tools 15-BETA</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgrctl-bash-completion-0.1.7-159000.3.8.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15-BETA">
      <FullProductName ProductID="SUSE Manager Client Tools 15-BETA:mgrctl-bash-completion-0.1.7-159000.3.8.1">mgrctl-bash-completion-0.1.7-159000.3.8.1 as a component of SUSE Manager Client Tools 15-BETA</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgrctl-zsh-completion-0.1.7-159000.3.8.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15-BETA">
      <FullProductName ProductID="SUSE Manager Client Tools 15-BETA:mgrctl-zsh-completion-0.1.7-159000.3.8.1">mgrctl-zsh-completion-0.1.7-159000.3.8.1 as a component of SUSE Manager Client Tools 15-BETA</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-spacewalk-check-5.0.4-159000.6.54.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15-BETA">
      <FullProductName ProductID="SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.4-159000.6.54.2">python3-spacewalk-check-5.0.4-159000.6.54.2 as a component of SUSE Manager Client Tools 15-BETA</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-spacewalk-client-setup-5.0.4-159000.6.54.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15-BETA">
      <FullProductName ProductID="SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.4-159000.6.54.2">python3-spacewalk-client-setup-5.0.4-159000.6.54.2 as a component of SUSE Manager Client Tools 15-BETA</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-spacewalk-client-tools-5.0.4-159000.6.54.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15-BETA">
      <FullProductName ProductID="SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.4-159000.6.54.2">python3-spacewalk-client-tools-5.0.4-159000.6.54.2 as a component of SUSE Manager Client Tools 15-BETA</FullProductName>
    </Relationship>
    <Relationship ProductReference="spacecmd-5.0.5-159000.6.48.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15-BETA">
      <FullProductName ProductID="SUSE Manager Client Tools 15-BETA:spacecmd-5.0.5-159000.6.48.2">spacecmd-5.0.5-159000.6.48.2 as a component of SUSE Manager Client Tools 15-BETA</FullProductName>
    </Relationship>
    <Relationship ProductReference="spacewalk-check-5.0.4-159000.6.54.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15-BETA">
      <FullProductName ProductID="SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.4-159000.6.54.2">spacewalk-check-5.0.4-159000.6.54.2 as a component of SUSE Manager Client Tools 15-BETA</FullProductName>
    </Relationship>
    <Relationship ProductReference="spacewalk-client-setup-5.0.4-159000.6.54.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15-BETA">
      <FullProductName ProductID="SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.4-159000.6.54.2">spacewalk-client-setup-5.0.4-159000.6.54.2 as a component of SUSE Manager Client Tools 15-BETA</FullProductName>
    </Relationship>
    <Relationship ProductReference="spacewalk-client-tools-5.0.4-159000.6.54.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15-BETA">
      <FullProductName ProductID="SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.4-159000.6.54.2">spacewalk-client-tools-5.0.4-159000.6.54.2 as a component of SUSE Manager Client Tools 15-BETA</FullProductName>
    </Relationship>
    <Relationship ProductReference="supportutils-plugin-susemanager-client-5.0.3-159000.6.21.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15-BETA">
      <FullProductName ProductID="SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.3-159000.6.21.2">supportutils-plugin-susemanager-client-5.0.3-159000.6.21.2 as a component of SUSE Manager Client Tools 15-BETA</FullProductName>
    </Relationship>
    <Relationship ProductReference="golang-github-prometheus-node_exporter-1.5.0-159000.6.2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools Beta for SLE Micro 5">
      <FullProductName ProductID="SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-prometheus-node_exporter-1.5.0-159000.6.2.1">golang-github-prometheus-node_exporter-1.5.0-159000.6.2.1 as a component of SUSE Manager Client Tools Beta for SLE Micro 5</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgrctl-0.1.7-159000.3.8.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools Beta for SLE Micro 5">
      <FullProductName ProductID="SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-0.1.7-159000.3.8.1">mgrctl-0.1.7-159000.3.8.1 as a component of SUSE Manager Client Tools Beta for SLE Micro 5</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgrctl-bash-completion-0.1.7-159000.3.8.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools Beta for SLE Micro 5">
      <FullProductName ProductID="SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-bash-completion-0.1.7-159000.3.8.1">mgrctl-bash-completion-0.1.7-159000.3.8.1 as a component of SUSE Manager Client Tools Beta for SLE Micro 5</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgrctl-zsh-completion-0.1.7-159000.3.8.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools Beta for SLE Micro 5">
      <FullProductName ProductID="SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-zsh-completion-0.1.7-159000.3.8.1">mgrctl-zsh-completion-0.1.7-159000.3.8.1 as a component of SUSE Manager Client Tools Beta for SLE Micro 5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An input validation vulnerability was found in Ansible's mysql_user module before 2.2.1.0, which may fail to correctly change a password in certain circumstances. Thus the previous password would still be active when it should have been changed.</Note>
    </Notes>
    <CVE>CVE-2016-8647</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Manager Client Tools 15-BETA:POS_Image-Graphical7-0.1.1710765237.46af599-159000.3.24.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:POS_Image-JeOS7-0.1.1710765237.46af599-159000.3.24.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.12.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.12.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1710765237.46af599-159000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:grafana-9.5.16-159000.4.30.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:mgrctl-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:mgrctl-bash-completion-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:mgrctl-zsh-completion-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacecmd-5.0.5-159000.6.48.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.3-159000.6.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-prometheus-node_exporter-1.5.0-159000.6.2.1</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-bash-completion-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-zsh-completion-0.1.7-159000.3.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:P/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241427-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8647.html</URL>
        <Description>CVE-2016-8647</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008038</URL>
        <Description>SUSE Bug 1008038</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010940</URL>
        <Description>SUSE Bug 1010940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Ansible before versions 2.1.4, 2.2.1 is vulnerable to an improper input validation in Ansible's handling of data sent from client systems. An attacker with control over a client system being managed by Ansible and the ability to send facts back to the Ansible server could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges.</Note>
    </Notes>
    <CVE>CVE-2016-9587</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Manager Client Tools 15-BETA:POS_Image-Graphical7-0.1.1710765237.46af599-159000.3.24.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:POS_Image-JeOS7-0.1.1710765237.46af599-159000.3.24.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.12.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.12.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1710765237.46af599-159000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:grafana-9.5.16-159000.4.30.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:mgrctl-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:mgrctl-bash-completion-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:mgrctl-zsh-completion-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacecmd-5.0.5-159000.6.48.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.3-159000.6.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-prometheus-node_exporter-1.5.0-159000.6.2.1</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-bash-completion-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-zsh-completion-0.1.7-159000.3.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:C/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241427-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9587.html</URL>
        <Description>CVE-2016-9587</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1019021</URL>
        <Description>SUSE Bug 1019021</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host's logs. This flaw was fixed by not allowing passwords to be specified in the "params" argument, and noting this in the module documentation.</Note>
    </Notes>
    <CVE>CVE-2017-7550</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Manager Client Tools 15-BETA:POS_Image-Graphical7-0.1.1710765237.46af599-159000.3.24.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:POS_Image-JeOS7-0.1.1710765237.46af599-159000.3.24.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.12.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.12.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1710765237.46af599-159000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:grafana-9.5.16-159000.4.30.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:mgrctl-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:mgrctl-bash-completion-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:mgrctl-zsh-completion-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacecmd-5.0.5-159000.6.48.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.3-159000.6.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-prometheus-node_exporter-1.5.0-159000.6.2.1</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-bash-completion-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-zsh-completion-0.1.7-159000.3.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241427-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7550.html</URL>
        <Description>CVE-2017-7550</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1035124</URL>
        <Description>SUSE Bug 1035124</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1065872</URL>
        <Description>SUSE Bug 1065872</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ansible it was found that inventory variables are loaded from current working directory when running ad-hoc command which are under attacker's control, allowing to run arbitrary code as a result.</Note>
    </Notes>
    <CVE>CVE-2018-10874</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Manager Client Tools 15-BETA:POS_Image-Graphical7-0.1.1710765237.46af599-159000.3.24.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:POS_Image-JeOS7-0.1.1710765237.46af599-159000.3.24.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.12.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.12.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1710765237.46af599-159000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:grafana-9.5.16-159000.4.30.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:mgrctl-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:mgrctl-bash-completion-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:mgrctl-zsh-completion-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacecmd-5.0.5-159000.6.48.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.3-159000.6.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-prometheus-node_exporter-1.5.0-159000.6.2.1</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-bash-completion-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-zsh-completion-0.1.7-159000.3.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241427-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10874.html</URL>
        <Description>CVE-2018-10874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097775</URL>
        <Description>SUSE Bug 1097775</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1099805</URL>
        <Description>SUSE Bug 1099805</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1099808</URL>
        <Description>SUSE Bug 1099808</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Ansible Engine, in ansible-engine 2.8.x before 2.8.15 and ansible-engine 2.9.x before 2.9.13, when installing packages using the dnf module. GPG signatures are ignored during installation even when disable_gpg_check is set to False, which is the default behavior. This flaw leads to malicious packages being installed on the system and arbitrary code executed via package installation scripts. The highest threat from this vulnerability is to integrity and system availability.</Note>
    </Notes>
    <CVE>CVE-2020-14365</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Manager Client Tools 15-BETA:POS_Image-Graphical7-0.1.1710765237.46af599-159000.3.24.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:POS_Image-JeOS7-0.1.1710765237.46af599-159000.3.24.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.12.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.12.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1710765237.46af599-159000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:grafana-9.5.16-159000.4.30.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:mgrctl-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:mgrctl-bash-completion-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:mgrctl-zsh-completion-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacecmd-5.0.5-159000.6.48.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.3-159000.6.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-prometheus-node_exporter-1.5.0-159000.6.2.1</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-bash-completion-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-zsh-completion-0.1.7-159000.3.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241427-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14365.html</URL>
        <Description>CVE-2020-14365</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175993</URL>
        <Description>SUSE Bug 1175993</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A template injection flaw was found in Ansible where a user's controller internal templating operations may remove the unsafe designation from template data. This issue could allow an attacker to use a specially crafted file to introduce templating injection when supplying templating data.</Note>
    </Notes>
    <CVE>CVE-2023-5764</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Manager Client Tools 15-BETA:POS_Image-Graphical7-0.1.1710765237.46af599-159000.3.24.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:POS_Image-JeOS7-0.1.1710765237.46af599-159000.3.24.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.12.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.12.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1710765237.46af599-159000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:grafana-9.5.16-159000.4.30.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:mgrctl-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:mgrctl-bash-completion-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:mgrctl-zsh-completion-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacecmd-5.0.5-159000.6.48.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.3-159000.6.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-prometheus-node_exporter-1.5.0-159000.6.2.1</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-bash-completion-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-zsh-completion-0.1.7-159000.3.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241427-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-5764.html</URL>
        <Description>CVE-2023-5764</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1216854</URL>
        <Description>SUSE Bug 1216854</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A user changing their email after signing up and verifying it can change it without verification in profile settings.

The configuration option "verify_email_enabled" will only validate email only on sign up.

</Note>
    </Notes>
    <CVE>CVE-2023-6152</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Manager Client Tools 15-BETA:POS_Image-Graphical7-0.1.1710765237.46af599-159000.3.24.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:POS_Image-JeOS7-0.1.1710765237.46af599-159000.3.24.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.12.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.12.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1710765237.46af599-159000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:grafana-9.5.16-159000.4.30.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:mgrctl-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:mgrctl-bash-completion-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:mgrctl-zsh-completion-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacecmd-5.0.5-159000.6.48.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.3-159000.6.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-prometheus-node_exporter-1.5.0-159000.6.2.1</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-bash-completion-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-zsh-completion-0.1.7-159000.3.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241427-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-6152.html</URL>
        <Description>CVE-2023-6152</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219912</URL>
        <Description>SUSE Bug 1219912</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. Information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values.</Note>
    </Notes>
    <CVE>CVE-2024-0690</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Manager Client Tools 15-BETA:POS_Image-Graphical7-0.1.1710765237.46af599-159000.3.24.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:POS_Image-JeOS7-0.1.1710765237.46af599-159000.3.24.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.12.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.12.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1710765237.46af599-159000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:grafana-9.5.16-159000.4.30.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:mgrctl-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:mgrctl-bash-completion-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:mgrctl-zsh-completion-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacecmd-5.0.5-159000.6.48.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.4-159000.6.54.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.3-159000.6.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-prometheus-node_exporter-1.5.0-159000.6.2.1</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-bash-completion-0.1.7-159000.3.8.1</ProductID>
        <ProductID>SUSE Manager Client Tools Beta for SLE Micro 5:mgrctl-zsh-completion-0.1.7-159000.3.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241427-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-0690.html</URL>
        <Description>CVE-2024-0690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219002</URL>
        <Description>SUSE Bug 1219002</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
