Security update 5.1.3 for Multi-Linux Manager Client Tools
| Announcement ID: | SUSE-SU-2026:1515-1 |
|---|---|
| Release Date: | 2026-04-21T09:20:46Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves one vulnerability, contains one feature and has 15 security fixes can now be installed.
Description:
This update fixes the following issues:
spacecmd:
- Version 5.1.13-0
- Update translation strings
uyuni-tools:
- Version 5.1.26-0
- Fix applying PTF with images from RPMs (bsc#1252548)
- Ssl Key file can miss if CA password is blank (bsc#1254154)
- mgrpxy ssh tuning should happens before crypto policies (bsc#1254619)
- Fix default value for helm registry (bsc#1258927).
- Remove hub register command
- Optimize postgres migration disk space usage (bsc#1257447)
- Add continuous database backup support (bsc#1250367)
- Explicitly start proxy pods after operations (bsc#1258015)
- Use static supportconfig name to avoid dynamic search (bsc#1257941)
- Do not nest multiple tarball files and instead collect all files into one tarball (bsc#1252964)
- Show where final tarball was generated (bsc#1259208)
- Set proxy config file permissions (bsc#1257660)
- Version 5.1.25-0
- If PTF image doesn't exists, use the current service image (bsc#1258418)
venv-salt-minion:
- Backport security patch for Salt vendored tornado (bsc#1259554):
- CVE-2026-31958: Add limits on multipart form data parsing
- Add x86_64_v2 as a possible rpm package architecture
- Make users with backslash working for salt-ssh (bsc#1254629)
- Fix ansible.playbooks extra-vars quoting (bsc#1257831)
- Fix virtualenv call in test helper to use proper python version
- Fix the issue preventing SELinux profile to be loaded on SLES 16 deployed using cloud images (bsc#1258957)
- Fix the typo causing buiding EL9 bundle without binary dependencies
Special Instructions and Notes:
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Multi-Linux Manager Client Tools for Debian 12
zypper in -t patch SUSE-MultiLinuxManagerTools-Debian-12-2026-1515=1
Package List:
-
SUSE Multi-Linux Manager Client Tools for Debian 12 (all)
- mgrctl-fish-completion-5.1.26-120002.3.17.1
- mgrctl-bash-completion-5.1.26-120002.3.17.1
- mgrctl-zsh-completion-5.1.26-120002.3.17.1
- spacecmd-5.1.13-120002.3.17.1
-
SUSE Multi-Linux Manager Client Tools for Debian 12 (amd64 arm64)
- venv-salt-minion-3006.0-120002.3.20.5
- mgrctl-5.1.26-120002.3.17.1
References:
- https://www.suse.com/security/cve/CVE-2026-31958.html
- https://bugzilla.suse.com/show_bug.cgi?id=1250367
- https://bugzilla.suse.com/show_bug.cgi?id=1252548
- https://bugzilla.suse.com/show_bug.cgi?id=1252964
- https://bugzilla.suse.com/show_bug.cgi?id=1254154
- https://bugzilla.suse.com/show_bug.cgi?id=1254619
- https://bugzilla.suse.com/show_bug.cgi?id=1254629
- https://bugzilla.suse.com/show_bug.cgi?id=1257447
- https://bugzilla.suse.com/show_bug.cgi?id=1257660
- https://bugzilla.suse.com/show_bug.cgi?id=1257831
- https://bugzilla.suse.com/show_bug.cgi?id=1257941
- https://bugzilla.suse.com/show_bug.cgi?id=1258015
- https://bugzilla.suse.com/show_bug.cgi?id=1258418
- https://bugzilla.suse.com/show_bug.cgi?id=1258927
- https://bugzilla.suse.com/show_bug.cgi?id=1258957
- https://bugzilla.suse.com/show_bug.cgi?id=1259208
- https://bugzilla.suse.com/show_bug.cgi?id=1259554
- https://jira.suse.com/browse/MSQA-1048