Security update 5.0.7 for Multi-Linux Manager Client Tools
| Announcement ID: | SUSE-SU-2026:1011-1 |
|---|---|
| Release Date: | 2026-03-25T10:10:35Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves one vulnerability, contains two features and has eight security fixes can now be installed.
Description:
This update fixes the following issues:
golang-github-QubitProducts-exporter_exporter:
- Non-customer-facing optimization and update
golang-github-boynux-squid_exporter:
-
Version update from 1.6.0 to 1.13.0 with the following highlighted changes and fixes (jsc#PED-14971):
-
Added compatibility for Squid 6 and support for the squid-internal-mgr metrics path.
- Added TLS and Basic Authentication to the exporter’s web interface.
- Added support for the exporter to authenticate against the Squid proxy itself.
- Allow the gathering of process information without requiring root privileges
- The exporter can now be configured using environment variables
- Added support for custom labels to all exported metrics for better data filtering.
- New metrics to track if Squid is running (squid_up), how long a scrape takes, and if any errors occurred.
- Added "service time" metrics to analyze proxy speed and performance.
- Added a metric for open file descriptors (process_open_fds) to help prevent connection bottlenecks.
- Corrected the squid_client_http_requests_total metric to ensure accurate reporting.
golang-github-lusitaniae-apache_exporter:
-
Version update from 1.0.8 to 1.0.10:
-
Updated github.com/prometheus/client_golang to 1.21.1
- Updated github.com/prometheus/common to 0.63.0
- Updated github.com/prometheus/exporter-toolkit to 0.14.0
- Fixed signal handler logging
- Migrated logging to log/slog
golang-github-prometheus-alertmanager:
- Non-customer-facing optimization and update
golang-github-prometheus-node_exporter:
- Non-customer-facing optimization and update
golang-github-prometheus-promu:
- Non-customer-facing optimization and update
spacecmd:
- Version 5.0.15-0
- Fix typo in spacecmd help ca-cert flag (bsc#1253174)
- Convert cached IDs to int (bsc#1251995)
- Fix spacecmd binary file upload (bsc#1253659)
uyuni-tools:
- Version 0.1.38-0
- Fix cobbler config migration to standalone files (bsc#1256803)
- Detect custom apache and squid config in the /etc/uyuni/proxy folder
- Add ssh tuning to configure sshd (bsc#1253738)
- Ignore supportconfig errors (bsc#1255781)
- Bump the default image tag to 5.0.7
- Remove cgroup mount for podman containers (bsc#1253347)
- Registry flag can be a string (bsc#1254589)
- Use static supportconfig name to avoid dynamic search (bsc#1257941)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Manager Client Tools for SLE 12
zypper in -t patch SUSE-SLE-Manager-Tools-12-2026-1011=1 -
SUSE Linux Enterprise Server 12 SP5 LTSS
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-1011=1 -
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-1011=1
Package List:
-
SUSE Manager Client Tools for SLE 12 (aarch64 ppc64le s390x x86_64)
- golang-github-lusitaniae-apache_exporter-1.0.10-1.27.3
- golang-github-boynux-squid_exporter-1.13.0-1.12.2
- golang-github-QubitProducts-exporter_exporter-0.4.0-1.15.2
- mgrctl-0.1.38-1.30.2
- mgrctl-debuginfo-0.1.38-1.30.2
- golang-github-prometheus-promu-0.17.0-1.30.2
- golang-github-prometheus-node_exporter-1.9.1-1.39.2
-
SUSE Manager Client Tools for SLE 12 (noarch)
- spacecmd-5.0.15-38.165.2
- mgrctl-zsh-completion-0.1.38-1.30.2
- mgrctl-bash-completion-0.1.38-1.30.2
-
SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
- golang-github-prometheus-node_exporter-1.9.1-1.39.2
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
- golang-github-prometheus-node_exporter-1.9.1-1.39.2
References:
- https://www.suse.com/security/cve/CVE-2025-1365.html
- https://bugzilla.suse.com/show_bug.cgi?id=1251995
- https://bugzilla.suse.com/show_bug.cgi?id=1253174
- https://bugzilla.suse.com/show_bug.cgi?id=1253347
- https://bugzilla.suse.com/show_bug.cgi?id=1253659
- https://bugzilla.suse.com/show_bug.cgi?id=1253738
- https://bugzilla.suse.com/show_bug.cgi?id=1254589
- https://bugzilla.suse.com/show_bug.cgi?id=1255781
- https://bugzilla.suse.com/show_bug.cgi?id=1256803
- https://bugzilla.suse.com/show_bug.cgi?id=1257941
- https://jira.suse.com/browse/MSQA-1045
- https://jira.suse.com/browse/PED-14971