<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for SUSE Manager Client Tools</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:3267-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-09-17T07:43:02Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-09-17T07:43:02Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-09-17T07:43:02Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for SUSE Manager Client Tools</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update fixes the following issues:

golang-github-prometheus-prometheus:

- Security issues fixed:

  * CVE-2024-6104: Update go-retryablehttp to version 0.7.7 (bsc#1227038)
  * CVE-2023-45142: Updated otelhttp to version 0.46.1 (bsc#1228556)

- Require Go &gt; 1.20 for building
- Migrate from `disabled` to `manual` service mode
- Update to 2.45.6 (jsc#PED-3577):
  * Security fixes in dependencies
- Update to 2.45.5:
  * [BUGFIX] tsdb/agent: ensure that new series get written to WAL
    on rollback.
  * [BUGFIX] Remote write: Avoid a race condition when applying
    configuration.
- Update to 2.45.4:
  * [BUGFIX] Remote read: Release querier resources before encoding
    the results.
- Update to 2.45.3:
  * [BUGFIX] TSDB: Remove double memory snapshot on shutdown.
- Update to 2.45.2:
  * [BUGFIX] TSDB: Fix PostingsForMatchers race with creating new
    series.
- Update to 2.45.1:
  * [ENHANCEMENT] Hetzner SD: Support larger ID's that will be used
    by Hetzner in September.
  * [BUGFIX] Linode SD: Cast InstanceSpec values to int64 to avoid
    overflows on 386 architecture.
  * [BUGFIX] TSDB: Handle TOC parsing failures.

rhnlib:
    
- Version 5.0.4-0
  * Add the old TLS code for very old traditional clients still on
    python 2.7 (bsc#1228198)

spacecmd:

- Version 5.0.9-0
  * Update translation strings

uyuni-tools:

- Version 0.1.21-0
  * mgrpxy: Fix typo on Systemd template
- Version 0.1.20-0
  * Update the push tag to 5.0.1
  * mgrpxy: expose port on IPv6 network (bsc#1227951)
- Version 0.1.19-0
  * Skip updating Tomcat remote debug if conf file is not present
- Version 0.1.18-0
  * Setup Confidential Computing container during migration
    (bsc#1227588)
  * Add the /etc/uyuni/uyuni-tools.yaml path to the config help
  * Split systemd config files to not loose configuration at upgrade
    (bsc#1227718)
  * Use the same logic for image computation in mgradm and mgrpxy
    (bsc#1228026)
  * Allow building with different Helm and container default
    registry paths (bsc#1226191)
  * Fix recursion in mgradm upgrade podman list --help
  * Setup hub xmlrpc API service in migration to Podman (bsc#1227588)
  * Setup disabled hub xmlrpc API service in all cases (bsc#1227584)
  * Clean the inspection code to make it faster
  * Properly detect IPv6 enabled on Podman network (bsc#1224349)
  * Fix the log file path generation
  * Write scripts output to uyuni-tools.log file
  * Add uyuni-hubxml-rpc to the list of values in
    mgradm scale --help
  * Use path in mgradm support sql file input (bsc#1227505)
  * On Ubuntu build with go1.21 instead of go1.20
  * Enforce Cobbler setup (bsc#1226847)
  * Expose port on IPv6 network (bsc#1227951)
  * show output of podman image search --list-tags command
  * Implement mgrpxy support config command
  * During migration, ignore /etc/sysconfig/tomcat and
    /etc/tomcat/tomcat.conf (bsc#1228183)
  * During migration, remove java.annotation,com.sun.xml.bind and
    UseConcMarkSweepGC settings
  * Disable node exporter port for Kubernetes
  * Fix start, stop and restart in Kubernetes
  * Increase start timeout in Kubernetes
  * Fix traefik query
  * Fix password entry usability (bsc#1226437)
  * Add --prepare option to migrate command
  * Fix random error during installation of CA certificate
    (bsc#1227245)
  * Clarify and fix distro name guessing when not provided
    (bsc#1226284)
  * Replace not working Fatal error by plain error return
    (bsc#1220136)
  * Allow server installation with preexisting storage volumes
  * Do not report error when purging mounted volume (bsc#1225349)
  * Preserve PAGER settings from the host for interactive sql
    usage (bsc#1226914)
  * Add mgrpxy command to clear the Squid cache
  * Use local images for Confidential Computing and
    Hub containers (bsc#1227586)
- Version 0.1.17-0
  * Allow GPG files to be loaded from the local file (bsc#1227195)
- Version 0.1.16-0
  * Prefer local images in all migration steps (bsc#1227244)
- Version 0.1.15-0
  * Define --registry flag behaviour (bsc#1226793)
- Version 0.1.14-0
  * Do not rely on hardcoded registry, remove any FQDN
- Version 0.1.13-0
  * Fix mgradm support config tarball creation (bsc#1226759)
- Version 0.1.12-0
  * Detection of k8s on Proxy was wrongly influenced by Server
    setting

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2024-3267,SUSE-SLE-Manager-Tools-15-2024-3267,SUSE-SLE-Manager-Tools-For-Micro-5-2024-3267,openSUSE-SLE-15.5-2024-3267,openSUSE-SLE-15.6-2024-3267</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243267-1/</URL>
      <Description>Link for SUSE-SU-2024:3267-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2024-September/036925.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:3267-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1220136</URL>
      <Description>SUSE Bug 1220136</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224349</URL>
      <Description>SUSE Bug 1224349</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225349</URL>
      <Description>SUSE Bug 1225349</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226191</URL>
      <Description>SUSE Bug 1226191</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226284</URL>
      <Description>SUSE Bug 1226284</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226437</URL>
      <Description>SUSE Bug 1226437</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226759</URL>
      <Description>SUSE Bug 1226759</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226793</URL>
      <Description>SUSE Bug 1226793</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226847</URL>
      <Description>SUSE Bug 1226847</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226914</URL>
      <Description>SUSE Bug 1226914</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227038</URL>
      <Description>SUSE Bug 1227038</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227195</URL>
      <Description>SUSE Bug 1227195</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227244</URL>
      <Description>SUSE Bug 1227244</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227245</URL>
      <Description>SUSE Bug 1227245</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227505</URL>
      <Description>SUSE Bug 1227505</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227584</URL>
      <Description>SUSE Bug 1227584</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227586</URL>
      <Description>SUSE Bug 1227586</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227588</URL>
      <Description>SUSE Bug 1227588</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227718</URL>
      <Description>SUSE Bug 1227718</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227951</URL>
      <Description>SUSE Bug 1227951</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228026</URL>
      <Description>SUSE Bug 1228026</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228183</URL>
      <Description>SUSE Bug 1228183</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228198</URL>
      <Description>SUSE Bug 1228198</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228556</URL>
      <Description>SUSE Bug 1228556</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-45142/</URL>
      <Description>SUSE CVE CVE-2023-45142 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-6104/</URL>
      <Description>SUSE CVE CVE-2024-6104 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Manager Client Tools 15">
      <Branch Type="Product Name" Name="SUSE Manager Client Tools 15">
        <FullProductName ProductID="SUSE Manager Client Tools 15">SUSE Manager Client Tools 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Client Tools for SLE Micro 5">
      <Branch Type="Product Name" Name="SUSE Manager Client Tools for SLE Micro 5">
        <FullProductName ProductID="SUSE Manager Client Tools for SLE Micro 5" CPE="cpe:/o:suse:sle-manager-tools-micro:5">SUSE Manager Client Tools for SLE Micro 5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.5">
      <Branch Type="Product Name" Name="openSUSE Leap 15.5">
        <FullProductName ProductID="openSUSE Leap 15.5" CPE="cpe:/o:opensuse:leap:15.5">openSUSE Leap 15.5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="firewalld-prometheus-config-0.1-150000.3.56.1">
      <FullProductName ProductID="firewalld-prometheus-config-0.1-150000.3.56.1">firewalld-prometheus-config-0.1-150000.3.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="golang-github-prometheus-node_exporter-1.7.0-150000.3.24.2">
      <FullProductName ProductID="golang-github-prometheus-node_exporter-1.7.0-150000.3.24.2">golang-github-prometheus-node_exporter-1.7.0-150000.3.24.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="golang-github-prometheus-prometheus-2.45.6-150000.3.56.1">
      <FullProductName ProductID="golang-github-prometheus-prometheus-2.45.6-150000.3.56.1">golang-github-prometheus-prometheus-2.45.6-150000.3.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mgrctl-0.1.21-150000.1.8.2">
      <FullProductName ProductID="mgrctl-0.1.21-150000.1.8.2">mgrctl-0.1.21-150000.1.8.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mgrctl-bash-completion-0.1.21-150000.1.8.2">
      <FullProductName ProductID="mgrctl-bash-completion-0.1.21-150000.1.8.2">mgrctl-bash-completion-0.1.21-150000.1.8.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mgrctl-lang-0.1.21-150000.1.8.2">
      <FullProductName ProductID="mgrctl-lang-0.1.21-150000.1.8.2">mgrctl-lang-0.1.21-150000.1.8.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mgrctl-zsh-completion-0.1.21-150000.1.8.2">
      <FullProductName ProductID="mgrctl-zsh-completion-0.1.21-150000.1.8.2">mgrctl-zsh-completion-0.1.21-150000.1.8.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-rhnlib-5.0.4-150000.3.46.1">
      <FullProductName ProductID="python3-rhnlib-5.0.4-150000.3.46.1">python3-rhnlib-5.0.4-150000.3.46.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="spacecmd-5.0.9-150000.3.124.1">
      <FullProductName ProductID="spacecmd-5.0.9-150000.3.124.1">spacecmd-5.0.9-150000.3.124.1</FullProductName>
    </Branch>
    <Relationship ProductReference="firewalld-prometheus-config-0.1-150000.3.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.56.1">firewalld-prometheus-config-0.1-150000.3.56.1 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="golang-github-prometheus-prometheus-2.45.6-150000.3.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.6-150000.3.56.1">golang-github-prometheus-prometheus-2.45.6-150000.3.56.1 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgrctl-0.1.21-150000.1.8.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:mgrctl-0.1.21-150000.1.8.2">mgrctl-0.1.21-150000.1.8.2 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgrctl-bash-completion-0.1.21-150000.1.8.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:mgrctl-bash-completion-0.1.21-150000.1.8.2">mgrctl-bash-completion-0.1.21-150000.1.8.2 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgrctl-lang-0.1.21-150000.1.8.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:mgrctl-lang-0.1.21-150000.1.8.2">mgrctl-lang-0.1.21-150000.1.8.2 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgrctl-zsh-completion-0.1.21-150000.1.8.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:mgrctl-zsh-completion-0.1.21-150000.1.8.2">mgrctl-zsh-completion-0.1.21-150000.1.8.2 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-rhnlib-5.0.4-150000.3.46.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:python3-rhnlib-5.0.4-150000.3.46.1">python3-rhnlib-5.0.4-150000.3.46.1 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="spacecmd-5.0.9-150000.3.124.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:spacecmd-5.0.9-150000.3.124.1">spacecmd-5.0.9-150000.3.124.1 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgrctl-0.1.21-150000.1.8.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools for SLE Micro 5">
      <FullProductName ProductID="SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.21-150000.1.8.2">mgrctl-0.1.21-150000.1.8.2 as a component of SUSE Manager Client Tools for SLE Micro 5</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgrctl-bash-completion-0.1.21-150000.1.8.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools for SLE Micro 5">
      <FullProductName ProductID="SUSE Manager Client Tools for SLE Micro 5:mgrctl-bash-completion-0.1.21-150000.1.8.2">mgrctl-bash-completion-0.1.21-150000.1.8.2 as a component of SUSE Manager Client Tools for SLE Micro 5</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgrctl-lang-0.1.21-150000.1.8.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools for SLE Micro 5">
      <FullProductName ProductID="SUSE Manager Client Tools for SLE Micro 5:mgrctl-lang-0.1.21-150000.1.8.2">mgrctl-lang-0.1.21-150000.1.8.2 as a component of SUSE Manager Client Tools for SLE Micro 5</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgrctl-zsh-completion-0.1.21-150000.1.8.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools for SLE Micro 5">
      <FullProductName ProductID="SUSE Manager Client Tools for SLE Micro 5:mgrctl-zsh-completion-0.1.21-150000.1.8.2">mgrctl-zsh-completion-0.1.21-150000.1.8.2 as a component of SUSE Manager Client Tools for SLE Micro 5</FullProductName>
    </Relationship>
    <Relationship ProductReference="spacecmd-5.0.9-150000.3.124.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:spacecmd-5.0.9-150000.3.124.1">spacecmd-5.0.9-150000.3.124.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="spacecmd-5.0.9-150000.3.124.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:spacecmd-5.0.9-150000.3.124.1">spacecmd-5.0.9-150000.3.124.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. A handler wrapper out of the box adds labels `http.user_agent` and `http.method` that have unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent to it. HTTP header User-Agent or HTTP method for requests can be easily set by an attacker to be random and long. The library internally uses `httpconv.ServerRequest` that records every value for HTTP `method` and `User-Agent`. In order to be affected, a program has to use the `otelhttp.NewHandler` wrapper and not filter any unknown HTTP methods or User agents on the level of CDN, LB, previous middleware, etc. Version 0.44.0 fixed this issue when the values collected for attribute `http.request.method` were changed to be restricted to a set of well-known values and other high cardinality attributes were removed. As a workaround to stop being affected, `otelhttp.WithFilter()` can be used, but it requires manual careful configuration to not log certain requests entirely. For convenience and safe usage of this library, it should by default mark with the label `unknown` non-standard HTTP methods and User agents to show that such requests were made but do not increase cardinality. In case someone wants to stay with the current behavior, library API should allow to enable it.</Note>
    </Notes>
    <CVE>CVE-2023-45142</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.56.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.6-150000.3.56.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgrctl-0.1.21-150000.1.8.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgrctl-bash-completion-0.1.21-150000.1.8.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgrctl-lang-0.1.21-150000.1.8.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgrctl-zsh-completion-0.1.21-150000.1.8.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-rhnlib-5.0.4-150000.3.46.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacecmd-5.0.9-150000.3.124.1</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.21-150000.1.8.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:mgrctl-bash-completion-0.1.21-150000.1.8.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:mgrctl-lang-0.1.21-150000.1.8.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:mgrctl-zsh-completion-0.1.21-150000.1.8.2</ProductID>
        <ProductID>openSUSE Leap 15.5:spacecmd-5.0.9-150000.3.124.1</ProductID>
        <ProductID>openSUSE Leap 15.6:spacecmd-5.0.9-150000.3.124.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243267-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-45142.html</URL>
        <Description>CVE-2023-45142</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228553</URL>
        <Description>SUSE Bug 1228553</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">go-retryablehttp prior to 0.7.7 did not sanitize urls when writing them to its log file. This could lead to go-retryablehttp writing sensitive HTTP basic auth credentials to its log file. This vulnerability, CVE-2024-6104, was fixed in go-retryablehttp 0.7.7.</Note>
    </Notes>
    <CVE>CVE-2024-6104</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Manager Client Tools 15:firewalld-prometheus-config-0.1-150000.3.56.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:golang-github-prometheus-prometheus-2.45.6-150000.3.56.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgrctl-0.1.21-150000.1.8.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgrctl-bash-completion-0.1.21-150000.1.8.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgrctl-lang-0.1.21-150000.1.8.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgrctl-zsh-completion-0.1.21-150000.1.8.2</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-rhnlib-5.0.4-150000.3.46.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacecmd-5.0.9-150000.3.124.1</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.21-150000.1.8.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:mgrctl-bash-completion-0.1.21-150000.1.8.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:mgrctl-lang-0.1.21-150000.1.8.2</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:mgrctl-zsh-completion-0.1.21-150000.1.8.2</ProductID>
        <ProductID>openSUSE Leap 15.5:spacecmd-5.0.9-150000.3.124.1</ProductID>
        <ProductID>openSUSE Leap 15.6:spacecmd-5.0.9-150000.3.124.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243267-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-6104.html</URL>
        <Description>CVE-2024-6104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227024</URL>
        <Description>SUSE Bug 1227024</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
