<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for SUSE Manager Client Tools</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:1509-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-05-06T09:47:44Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-05-06T09:47:44Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-05-06T09:47:44Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for SUSE Manager Client Tools</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update fixes the following issues:

POS_Image-Graphical7 was updated to version 0.1.1710765237.46af599:

- Version 0.1.1710765237.46af599

  * Moved image services to dracut-saltboot package
  * Use salt bundle

- Version 0.1.1645440615.7f1328c

  * Removed deprecated kiwi functions

POS_Image-JeOS7 was updated to version 0.1.1710765237.46af599:

- Version 0.1.1710765237.46af599

  * Moved image services to dracut-saltboot package
  * Use salt bundle

- Version 0.1.1645440615.7f1328c

  * Removed deprecated kiwi functions

ansible received the following fixes:

- Security issues fixed:

  * CVE-2023-5764: Address issues where internal templating can cause unsafe
    variables to lose their unsafe designation (bsc#1216854)

    + Breaking changes:
      assert - Nested templating may result in an inability for the conditional
      to be evaluated. See the porting guide for more information.

  * CVE-2024-0690: Address issue where ANSIBLE_NO_LOG was ignored (bsc#1219002)
  * CVE-2020-14365: Ensure that packages are GPG validated (bsc#1175993)
  * CVE-2020-10744: Fixed insecure temporary directory creation (bsc#1171823)
  * CVE-2018-10874: Fixed inventory variables loading from current working directory when running ad-hoc command that
    can lead to code execution (bsc#1099805)

- Bugs fixed:  

  * Don't Require python-coverage, it is needed only for testing (bsc#1177948)

dracut-saltboot was updated to version 0.1.1710765237.46af599:

- Version 0.1.1710765237.46af599

  * Load only first available leaseinfo (bsc#1221092)

- Version 0.1.1681904360.84ef141

grafana was updated to version 9.5.18:

- Grafana now requires Go 1.20
- Security issues fixed:

  * CVE-2024-1313: Require same organisation when deleting snapshots (bsc#1222155)
  * CVE-2023-6152: Add email verification when updating user email (bsc#1219912)

- Other non-security related changes:

  * Version 9.5.17:

    + [FEATURE] Alerting: Backport use Alertmanager API v2

  * Version 9.5.16:

    + [BUGFIX] Annotations: Split cleanup into separate queries and
      deletes to avoid deadlocks on MySQL

  * Version 9.5.15:

    + [FEATURE] Alerting: Attempt to retry retryable errors

  * Version 9.5.14:

    + [BUGFIX] Alerting: Fix state manager to not keep
      datasource_uid and ref_id labels in state after Error
    + [BUGFIX] Transformations: Config overrides being lost when
      config from query transform is applied
    + [BUGFIX] LDAP: Fix enable users on successfull login

  * Version 9.5.13:

    + [BUGFIX] BrowseDashboards: Only remember the most recent
      expanded folder
    + [BUGFIX] Licensing: Pass func to update env variables when
      starting plugin

  * Version 9.5.12:

    + [FEATURE] Azure: Add support for Workload Identity
      authentication

  * Version 9.5.9:

    + [FEATURE] SSE: Fix DSNode to not panic when response has empty
      response
    + [FEATURE] Prometheus: Handle the response with different field
      key order
    + [BUGFIX] LDAP: Fix user disabling

mgr-daemon was updated to version 4.3.9-0:

- Version 4.3.9-0

  * Update translation strings

spacecmd was updated to version 4.3.27-0:

- Version 4.3.27-0

  * Update translation strings

spacewalk-client-tools was updated to version 4.3.19-0:

- Version 4.3.19-0

  * Update translation strings

spacewalk-koan was updated to version version 4.3.6-0:

- Version 4.3.6-0

  * Change Docker image location for test

uyuni-common-libs was updated to version 4.3.10-0:

- Version 4.3.10-0

  * Add support for package signature type V4 RSA/SHA384
  * Add support for package signature type V4 RSA/SHA512 (bsc#1221465)

uyuni-proxy-systemd-services was updated to version 4.3.12-0:

- Version 4.3.12-0

  * Update to SUSE Manager 4.3.12
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2024-1509,SUSE-SLE-Manager-Tools-15-2024-1509,SUSE-SLE-Manager-Tools-For-Micro-5-2024-1509,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1509,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-1509,openSUSE-SLE-15.5-2024-1509</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241509-1/</URL>
      <Description>Link for SUSE-SU-2024:1509-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2024-May/035168.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:1509-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1008037</URL>
      <Description>SUSE Bug 1008037</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1008038</URL>
      <Description>SUSE Bug 1008038</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010940</URL>
      <Description>SUSE Bug 1010940</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1019021</URL>
      <Description>SUSE Bug 1019021</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1038785</URL>
      <Description>SUSE Bug 1038785</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1059235</URL>
      <Description>SUSE Bug 1059235</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1099805</URL>
      <Description>SUSE Bug 1099805</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1166389</URL>
      <Description>SUSE Bug 1166389</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171823</URL>
      <Description>SUSE Bug 1171823</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174145</URL>
      <Description>SUSE Bug 1174145</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174302</URL>
      <Description>SUSE Bug 1174302</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175993</URL>
      <Description>SUSE Bug 1175993</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177948</URL>
      <Description>SUSE Bug 1177948</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1216854</URL>
      <Description>SUSE Bug 1216854</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1219002</URL>
      <Description>SUSE Bug 1219002</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1219912</URL>
      <Description>SUSE Bug 1219912</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221092</URL>
      <Description>SUSE Bug 1221092</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221465</URL>
      <Description>SUSE Bug 1221465</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222155</URL>
      <Description>SUSE Bug 1222155</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8614/</URL>
      <Description>SUSE CVE CVE-2016-8614 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8628/</URL>
      <Description>SUSE CVE CVE-2016-8628 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8647/</URL>
      <Description>SUSE CVE CVE-2016-8647 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9587/</URL>
      <Description>SUSE CVE CVE-2016-9587 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7550/</URL>
      <Description>SUSE CVE CVE-2017-7550 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-10874/</URL>
      <Description>SUSE CVE CVE-2018-10874 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10744/</URL>
      <Description>SUSE CVE CVE-2020-10744 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14330/</URL>
      <Description>SUSE CVE CVE-2020-14330 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14332/</URL>
      <Description>SUSE CVE CVE-2020-14332 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14365/</URL>
      <Description>SUSE CVE CVE-2020-14365 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-1753/</URL>
      <Description>SUSE CVE CVE-2020-1753 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-5764/</URL>
      <Description>SUSE CVE CVE-2023-5764 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-6152/</URL>
      <Description>SUSE CVE CVE-2023-6152 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-0690/</URL>
      <Description>SUSE CVE CVE-2024-0690 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-1313/</URL>
      <Description>SUSE CVE CVE-2024-1313 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Package Hub 15 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Package Hub 15 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP5" CPE="cpe:/o:suse:packagehub:15:sp5">SUSE Linux Enterprise Module for Package Hub 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Client Tools 15">
      <Branch Type="Product Name" Name="SUSE Manager Client Tools 15">
        <FullProductName ProductID="SUSE Manager Client Tools 15">SUSE Manager Client Tools 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Client Tools for SLE Micro 5">
      <Branch Type="Product Name" Name="SUSE Manager Client Tools for SLE Micro 5">
        <FullProductName ProductID="SUSE Manager Client Tools for SLE Micro 5" CPE="cpe:/o:suse:sle-manager-tools-micro:5">SUSE Manager Client Tools for SLE Micro 5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Proxy Module 4.3">
      <Branch Type="Product Name" Name="SUSE Manager Proxy Module 4.3">
        <FullProductName ProductID="SUSE Manager Proxy Module 4.3" CPE="cpe:/o:suse:sle-module-suse-manager-proxy:4.3">SUSE Manager Proxy Module 4.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.5">
      <Branch Type="Product Name" Name="openSUSE Leap 15.5">
        <FullProductName ProductID="openSUSE Leap 15.5" CPE="cpe:/o:opensuse:leap:15.5">openSUSE Leap 15.5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2">
      <FullProductName ProductID="POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2">POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2">
      <FullProductName ProductID="POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2">POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ansible-2.9.27-150000.1.17.2">
      <FullProductName ProductID="ansible-2.9.27-150000.1.17.2">ansible-2.9.27-150000.1.17.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ansible-doc-2.9.27-150000.1.17.2">
      <FullProductName ProductID="ansible-doc-2.9.27-150000.1.17.2">ansible-doc-2.9.27-150000.1.17.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ansible-test-2.9.27-150000.1.17.2">
      <FullProductName ProductID="ansible-test-2.9.27-150000.1.17.2">ansible-test-2.9.27-150000.1.17.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2">
      <FullProductName ProductID="dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2">dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="golang-github-prometheus-promu-0.14.0-150000.3.18.2">
      <FullProductName ProductID="golang-github-prometheus-promu-0.14.0-150000.3.18.2">golang-github-prometheus-promu-0.14.0-150000.3.18.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="grafana-9.5.18-150000.1.63.2">
      <FullProductName ProductID="grafana-9.5.18-150000.1.63.2">grafana-9.5.18-150000.1.63.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mgr-daemon-4.3.9-150000.1.47.2">
      <FullProductName ProductID="mgr-daemon-4.3.9-150000.1.47.2">mgr-daemon-4.3.9-150000.1.47.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python2-uyuni-common-libs-4.3.10-150000.1.39.2">
      <FullProductName ProductID="python2-uyuni-common-libs-4.3.10-150000.1.39.2">python2-uyuni-common-libs-4.3.10-150000.1.39.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-spacewalk-check-4.3.19-150000.3.89.2">
      <FullProductName ProductID="python3-spacewalk-check-4.3.19-150000.3.89.2">python3-spacewalk-check-4.3.19-150000.3.89.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-spacewalk-client-setup-4.3.19-150000.3.89.2">
      <FullProductName ProductID="python3-spacewalk-client-setup-4.3.19-150000.3.89.2">python3-spacewalk-client-setup-4.3.19-150000.3.89.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-spacewalk-client-tools-4.3.19-150000.3.89.2">
      <FullProductName ProductID="python3-spacewalk-client-tools-4.3.19-150000.3.89.2">python3-spacewalk-client-tools-4.3.19-150000.3.89.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-spacewalk-koan-4.3.6-150000.3.33.2">
      <FullProductName ProductID="python3-spacewalk-koan-4.3.6-150000.3.33.2">python3-spacewalk-koan-4.3.6-150000.3.33.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-uyuni-common-libs-4.3.10-150000.1.39.2">
      <FullProductName ProductID="python3-uyuni-common-libs-4.3.10-150000.1.39.2">python3-uyuni-common-libs-4.3.10-150000.1.39.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="spacecmd-4.3.27-150000.3.116.2">
      <FullProductName ProductID="spacecmd-4.3.27-150000.3.116.2">spacecmd-4.3.27-150000.3.116.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="spacewalk-check-4.3.19-150000.3.89.2">
      <FullProductName ProductID="spacewalk-check-4.3.19-150000.3.89.2">spacewalk-check-4.3.19-150000.3.89.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="spacewalk-client-setup-4.3.19-150000.3.89.2">
      <FullProductName ProductID="spacewalk-client-setup-4.3.19-150000.3.89.2">spacewalk-client-setup-4.3.19-150000.3.89.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="spacewalk-client-tools-4.3.19-150000.3.89.2">
      <FullProductName ProductID="spacewalk-client-tools-4.3.19-150000.3.89.2">spacewalk-client-tools-4.3.19-150000.3.89.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="spacewalk-koan-4.3.6-150000.3.33.2">
      <FullProductName ProductID="spacewalk-koan-4.3.6-150000.3.33.2">spacewalk-koan-4.3.6-150000.3.33.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="uyuni-proxy-systemd-services-4.3.12-150000.1.21.2">
      <FullProductName ProductID="uyuni-proxy-systemd-services-4.3.12-150000.1.21.2">uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</FullProductName>
    </Branch>
    <Relationship ProductReference="golang-github-prometheus-promu-0.14.0-150000.3.18.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Package Hub 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP5:golang-github-prometheus-promu-0.14.0-150000.3.18.2">golang-github-prometheus-promu-0.14.0-150000.3.18.2 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2">POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2">POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="ansible-2.9.27-150000.1.17.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:ansible-2.9.27-150000.1.17.2">ansible-2.9.27-150000.1.17.2 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="ansible-doc-2.9.27-150000.1.17.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:ansible-doc-2.9.27-150000.1.17.2">ansible-doc-2.9.27-150000.1.17.2 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2">dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="grafana-9.5.18-150000.1.63.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:grafana-9.5.18-150000.1.63.2">grafana-9.5.18-150000.1.63.2 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgr-daemon-4.3.9-150000.1.47.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:mgr-daemon-4.3.9-150000.1.47.2">mgr-daemon-4.3.9-150000.1.47.2 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-spacewalk-check-4.3.19-150000.3.89.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.19-150000.3.89.2">python3-spacewalk-check-4.3.19-150000.3.89.2 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-spacewalk-client-setup-4.3.19-150000.3.89.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.19-150000.3.89.2">python3-spacewalk-client-setup-4.3.19-150000.3.89.2 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-spacewalk-client-tools-4.3.19-150000.3.89.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.19-150000.3.89.2">python3-spacewalk-client-tools-4.3.19-150000.3.89.2 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-spacewalk-koan-4.3.6-150000.3.33.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:python3-spacewalk-koan-4.3.6-150000.3.33.2">python3-spacewalk-koan-4.3.6-150000.3.33.2 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-uyuni-common-libs-4.3.10-150000.1.39.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.10-150000.1.39.2">python3-uyuni-common-libs-4.3.10-150000.1.39.2 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="spacecmd-4.3.27-150000.3.116.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:spacecmd-4.3.27-150000.3.116.2">spacecmd-4.3.27-150000.3.116.2 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="spacewalk-check-4.3.19-150000.3.89.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:spacewalk-check-4.3.19-150000.3.89.2">spacewalk-check-4.3.19-150000.3.89.2 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="spacewalk-client-setup-4.3.19-150000.3.89.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.19-150000.3.89.2">spacewalk-client-setup-4.3.19-150000.3.89.2 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="spacewalk-client-tools-4.3.19-150000.3.89.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.19-150000.3.89.2">spacewalk-client-tools-4.3.19-150000.3.89.2 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="spacewalk-koan-4.3.6-150000.3.33.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:spacewalk-koan-4.3.6-150000.3.33.2">spacewalk-koan-4.3.6-150000.3.33.2 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="uyuni-proxy-systemd-services-4.3.12-150000.1.21.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2">uyuni-proxy-systemd-services-4.3.12-150000.1.21.2 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools for SLE Micro 5">
      <FullProductName ProductID="SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2">dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2 as a component of SUSE Manager Client Tools for SLE Micro 5</FullProductName>
    </Relationship>
    <Relationship ProductReference="uyuni-proxy-systemd-services-4.3.12-150000.1.21.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools for SLE Micro 5">
      <FullProductName ProductID="SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2">uyuni-proxy-systemd-services-4.3.12-150000.1.21.2 as a component of SUSE Manager Client Tools for SLE Micro 5</FullProductName>
    </Relationship>
    <Relationship ProductReference="ansible-2.9.27-150000.1.17.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Proxy Module 4.3">
      <FullProductName ProductID="SUSE Manager Proxy Module 4.3:ansible-2.9.27-150000.1.17.2">ansible-2.9.27-150000.1.17.2 as a component of SUSE Manager Proxy Module 4.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ansible-doc-2.9.27-150000.1.17.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Proxy Module 4.3">
      <FullProductName ProductID="SUSE Manager Proxy Module 4.3:ansible-doc-2.9.27-150000.1.17.2">ansible-doc-2.9.27-150000.1.17.2 as a component of SUSE Manager Proxy Module 4.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="uyuni-proxy-systemd-services-4.3.12-150000.1.21.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Proxy Module 4.3">
      <FullProductName ProductID="SUSE Manager Proxy Module 4.3:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2">uyuni-proxy-systemd-services-4.3.12-150000.1.21.2 as a component of SUSE Manager Proxy Module 4.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2">POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2">POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="ansible-2.9.27-150000.1.17.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:ansible-2.9.27-150000.1.17.2">ansible-2.9.27-150000.1.17.2 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="ansible-doc-2.9.27-150000.1.17.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:ansible-doc-2.9.27-150000.1.17.2">ansible-doc-2.9.27-150000.1.17.2 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="ansible-test-2.9.27-150000.1.17.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:ansible-test-2.9.27-150000.1.17.2">ansible-test-2.9.27-150000.1.17.2 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2">dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="golang-github-prometheus-promu-0.14.0-150000.3.18.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:golang-github-prometheus-promu-0.14.0-150000.3.18.2">golang-github-prometheus-promu-0.14.0-150000.3.18.2 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="spacecmd-4.3.27-150000.3.116.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:spacecmd-4.3.27-150000.3.116.2">spacecmd-4.3.27-150000.3.116.2 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in Ansible before version 2.2.0. The apt_key module does not properly verify key fingerprints, allowing remote adversary to create an OpenPGP key which matches the short key ID and inject this key instead of the correct key.</Note>
    </Notes>
    <CVE>CVE-2016-8614</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:grafana-9.5.18-150000.1.63.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgr-daemon-4.3.9-150000.1.47.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.10-150000.1.39.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacecmd-4.3.27-150000.3.116.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-test-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>openSUSE Leap 15.5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>openSUSE Leap 15.5:spacecmd-4.3.27-150000.3.116.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241509-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8614.html</URL>
        <Description>CVE-2016-8614</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008038</URL>
        <Description>SUSE Bug 1008038</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Ansible before version 2.2.0 fails to properly sanitize fact variables sent from the Ansible controller. An attacker with the ability to create special variables on the controller could execute arbitrary commands on Ansible clients as the user Ansible runs as.</Note>
    </Notes>
    <CVE>CVE-2016-8628</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:grafana-9.5.18-150000.1.63.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgr-daemon-4.3.9-150000.1.47.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.10-150000.1.39.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacecmd-4.3.27-150000.3.116.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-test-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>openSUSE Leap 15.5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>openSUSE Leap 15.5:spacecmd-4.3.27-150000.3.116.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>9</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241509-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8628.html</URL>
        <Description>CVE-2016-8628</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008037</URL>
        <Description>SUSE Bug 1008037</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An input validation vulnerability was found in Ansible's mysql_user module before 2.2.1.0, which may fail to correctly change a password in certain circumstances. Thus the previous password would still be active when it should have been changed.</Note>
    </Notes>
    <CVE>CVE-2016-8647</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:grafana-9.5.18-150000.1.63.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgr-daemon-4.3.9-150000.1.47.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.10-150000.1.39.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacecmd-4.3.27-150000.3.116.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-test-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>openSUSE Leap 15.5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>openSUSE Leap 15.5:spacecmd-4.3.27-150000.3.116.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:P/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241509-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8647.html</URL>
        <Description>CVE-2016-8647</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008038</URL>
        <Description>SUSE Bug 1008038</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010940</URL>
        <Description>SUSE Bug 1010940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Ansible before versions 2.1.4, 2.2.1 is vulnerable to an improper input validation in Ansible's handling of data sent from client systems. An attacker with control over a client system being managed by Ansible and the ability to send facts back to the Ansible server could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges.</Note>
    </Notes>
    <CVE>CVE-2016-9587</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:grafana-9.5.18-150000.1.63.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgr-daemon-4.3.9-150000.1.47.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.10-150000.1.39.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacecmd-4.3.27-150000.3.116.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-test-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>openSUSE Leap 15.5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>openSUSE Leap 15.5:spacecmd-4.3.27-150000.3.116.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:C/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241509-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9587.html</URL>
        <Description>CVE-2016-9587</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1019021</URL>
        <Description>SUSE Bug 1019021</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host's logs. This flaw was fixed by not allowing passwords to be specified in the "params" argument, and noting this in the module documentation.</Note>
    </Notes>
    <CVE>CVE-2017-7550</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:grafana-9.5.18-150000.1.63.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgr-daemon-4.3.9-150000.1.47.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.10-150000.1.39.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacecmd-4.3.27-150000.3.116.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-test-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>openSUSE Leap 15.5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>openSUSE Leap 15.5:spacecmd-4.3.27-150000.3.116.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241509-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7550.html</URL>
        <Description>CVE-2017-7550</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1035124</URL>
        <Description>SUSE Bug 1035124</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1065872</URL>
        <Description>SUSE Bug 1065872</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ansible it was found that inventory variables are loaded from current working directory when running ad-hoc command which are under attacker's control, allowing to run arbitrary code as a result.</Note>
    </Notes>
    <CVE>CVE-2018-10874</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:grafana-9.5.18-150000.1.63.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgr-daemon-4.3.9-150000.1.47.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.10-150000.1.39.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacecmd-4.3.27-150000.3.116.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-test-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>openSUSE Leap 15.5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>openSUSE Leap 15.5:spacecmd-4.3.27-150000.3.116.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241509-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10874.html</URL>
        <Description>CVE-2018-10874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097775</URL>
        <Description>SUSE Bug 1097775</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1099805</URL>
        <Description>SUSE Bug 1099805</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1099808</URL>
        <Description>SUSE Bug 1099808</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An incomplete fix was found for the fix of the flaw CVE-2020-1733 ansible: insecure temporary directory when running become_user from become directive. The provided fix is insufficient to prevent the race condition on systems using ACLs and FUSE filesystems. Ansible Engine 2.7.18, 2.8.12, and 2.9.9 as well as previous versions are affected and Ansible Tower 3.4.5, 3.5.6 and 3.6.4 as well as previous versions are affected.</Note>
    </Notes>
    <CVE>CVE-2020-10744</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:grafana-9.5.18-150000.1.63.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgr-daemon-4.3.9-150000.1.47.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.10-150000.1.39.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacecmd-4.3.27-150000.3.116.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-test-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>openSUSE Leap 15.5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>openSUSE Leap 15.5:spacecmd-4.3.27-150000.3.116.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.7</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241509-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10744.html</URL>
        <Description>CVE-2020-10744</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171823</URL>
        <Description>SUSE Bug 1171823</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality.</Note>
    </Notes>
    <CVE>CVE-2020-14330</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:grafana-9.5.18-150000.1.63.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgr-daemon-4.3.9-150000.1.47.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.10-150000.1.39.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacecmd-4.3.27-150000.3.116.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-test-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>openSUSE Leap 15.5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>openSUSE Leap 15.5:spacecmd-4.3.27-150000.3.116.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241509-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14330.html</URL>
        <Description>CVE-2020-14330</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174145</URL>
        <Description>SUSE Bug 1174145</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Ansible Engine when using module_args. Tasks executed with check mode (--check-mode) do not properly neutralize sensitive data exposed in the event data. This flaw allows unauthorized users to read this data. The highest threat from this vulnerability is to confidentiality.</Note>
    </Notes>
    <CVE>CVE-2020-14332</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:grafana-9.5.18-150000.1.63.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgr-daemon-4.3.9-150000.1.47.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.10-150000.1.39.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacecmd-4.3.27-150000.3.116.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-test-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>openSUSE Leap 15.5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>openSUSE Leap 15.5:spacecmd-4.3.27-150000.3.116.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241509-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14332.html</URL>
        <Description>CVE-2020-14332</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174302</URL>
        <Description>SUSE Bug 1174302</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Ansible Engine, in ansible-engine 2.8.x before 2.8.15 and ansible-engine 2.9.x before 2.9.13, when installing packages using the dnf module. GPG signatures are ignored during installation even when disable_gpg_check is set to False, which is the default behavior. This flaw leads to malicious packages being installed on the system and arbitrary code executed via package installation scripts. The highest threat from this vulnerability is to integrity and system availability.</Note>
    </Notes>
    <CVE>CVE-2020-14365</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:grafana-9.5.18-150000.1.63.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgr-daemon-4.3.9-150000.1.47.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.10-150000.1.39.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacecmd-4.3.27-150000.3.116.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-test-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>openSUSE Leap 15.5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>openSUSE Leap 15.5:spacecmd-4.3.27-150000.3.116.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241509-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14365.html</URL>
        <Description>CVE-2020-14365</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175993</URL>
        <Description>SUSE Bug 1175993</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A security flaw was found in Ansible Engine, all Ansible 2.7.x versions prior to 2.7.17, all Ansible 2.8.x versions prior to 2.8.11 and all Ansible 2.9.x versions prior to 2.9.7, when managing kubernetes using the k8s module. Sensitive parameters such as passwords and tokens are passed to kubectl from the command line, not using an environment variable or an input configuration file. This will disclose passwords and tokens from process list and no_log directive from debug module would not have any effect making these secrets being disclosed on stdout and log files.</Note>
    </Notes>
    <CVE>CVE-2020-1753</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:grafana-9.5.18-150000.1.63.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgr-daemon-4.3.9-150000.1.47.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.10-150000.1.39.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacecmd-4.3.27-150000.3.116.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-test-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>openSUSE Leap 15.5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>openSUSE Leap 15.5:spacecmd-4.3.27-150000.3.116.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241509-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-1753.html</URL>
        <Description>CVE-2020-1753</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1166389</URL>
        <Description>SUSE Bug 1166389</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A template injection flaw was found in Ansible where a user's controller internal templating operations may remove the unsafe designation from template data. This issue could allow an attacker to use a specially crafted file to introduce templating injection when supplying templating data.</Note>
    </Notes>
    <CVE>CVE-2023-5764</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:grafana-9.5.18-150000.1.63.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgr-daemon-4.3.9-150000.1.47.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.10-150000.1.39.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacecmd-4.3.27-150000.3.116.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-test-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>openSUSE Leap 15.5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>openSUSE Leap 15.5:spacecmd-4.3.27-150000.3.116.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241509-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-5764.html</URL>
        <Description>CVE-2023-5764</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1216854</URL>
        <Description>SUSE Bug 1216854</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A user changing their email after signing up and verifying it can change it without verification in profile settings.

The configuration option "verify_email_enabled" will only validate email only on sign up.

</Note>
    </Notes>
    <CVE>CVE-2023-6152</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:grafana-9.5.18-150000.1.63.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgr-daemon-4.3.9-150000.1.47.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.10-150000.1.39.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacecmd-4.3.27-150000.3.116.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-test-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>openSUSE Leap 15.5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>openSUSE Leap 15.5:spacecmd-4.3.27-150000.3.116.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241509-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-6152.html</URL>
        <Description>CVE-2023-6152</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219912</URL>
        <Description>SUSE Bug 1219912</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. Information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values.</Note>
    </Notes>
    <CVE>CVE-2024-0690</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:grafana-9.5.18-150000.1.63.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgr-daemon-4.3.9-150000.1.47.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.10-150000.1.39.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacecmd-4.3.27-150000.3.116.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-test-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>openSUSE Leap 15.5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>openSUSE Leap 15.5:spacecmd-4.3.27-150000.3.116.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241509-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-0690.html</URL>
        <Description>CVE-2024-0690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219002</URL>
        <Description>SUSE Bug 1219002</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/&lt;key&gt; using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized.

Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo 
Alto Research for discovering and disclosing this vulnerability.

This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.

</Note>
    </Notes>
    <CVE>CVE-2024-1313</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:grafana-9.5.18-150000.1.63.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgr-daemon-4.3.9-150000.1.47.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-uyuni-common-libs-4.3.10-150000.1.39.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacecmd-4.3.27-150000.3.116.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-check-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.19-150000.3.89.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacewalk-koan-4.3.6-150000.3.33.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:uyuni-proxy-systemd-services-4.3.12-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-doc-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:ansible-test-2.9.27-150000.1.17.2</ProductID>
        <ProductID>openSUSE Leap 15.5:dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2</ProductID>
        <ProductID>openSUSE Leap 15.5:golang-github-prometheus-promu-0.14.0-150000.3.18.2</ProductID>
        <ProductID>openSUSE Leap 15.5:spacecmd-4.3.27-150000.3.116.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241509-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-1313.html</URL>
        <Description>CVE-2024-1313</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222155</URL>
        <Description>SUSE Bug 1222155</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
