Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-6197 (GCVE-0-2025-6197)
Vulnerability from cvelistv5
Published
2025-07-18 07:48
Modified
2025-07-18 13:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.
Prerequisites for exploitation:
- Multiple organizations must exist in the Grafana instance
- Victim must be on a different organization than the one specified in the URL
References
Impacted products
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-6197",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-18T13:45:54.505880Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-18T13:46:01.307Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Grafana",
"vendor": "Grafana",
"versions": [
{
"lessThan": "12.0.2+security-01",
"status": "affected",
"version": "12.0.x",
"versionType": "semver"
},
{
"lessThan": "11.6.3+security-01",
"status": "affected",
"version": "11.6.x",
"versionType": "semver"
},
{
"lessThan": "11.5.6+security-01",
"status": "affected",
"version": "11.5.x",
"versionType": "semver"
},
{
"lessThan": "11.4.6+security-01",
"status": "affected",
"version": "11.4.x",
"versionType": "semver"
},
{
"lessThan": "11.3.8+security-01",
"status": "affected",
"version": "11.3.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Dat Phung"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eAn open redirect vulnerability has been identified in Grafana OSS organization switching functionality.\u003cbr\u003e\u003c/p\u003e\u003cp\u003ePrerequisites for exploitation:\u003c/p\u003e\u003cp\u003e- Multiple organizations must exist in the Grafana instance\u003c/p\u003e\u003cp\u003e- Victim must be on a different organization than the one specified in the URL\u003c/p\u003e\u003cp\u003e\u003cbr\u003e\u003c/p\u003e"
}
],
"value": "An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.\n\n\nPrerequisites for exploitation:\n\n- Multiple organizations must exist in the Grafana instance\n\n- Victim must be on a different organization than the one specified in the URL"
}
],
"impacts": [
{
"capecId": "CAPEC-194",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-194"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-601",
"description": "CWE-601",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-18T07:49:16.382Z",
"orgId": "57da9224-a3e2-4646-9d0e-c4dc2e05e7da",
"shortName": "GRAFANA"
},
"references": [
{
"name": "Vulnerable code location",
"tags": [
"vendor-advisory"
],
"url": "https://grafana.com/security/security-advisories/cve-2025-6197/"
},
{
"tags": [
"mitigation",
"release-notes"
],
"url": "https://grafana.com/blog/2025/07/17/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-6197-and-cve-2025-6023/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "57da9224-a3e2-4646-9d0e-c4dc2e05e7da",
"assignerShortName": "GRAFANA",
"cveId": "CVE-2025-6197",
"datePublished": "2025-07-18T07:48:22.523Z",
"dateReserved": "2025-06-17T07:22:18.547Z",
"dateUpdated": "2025-07-18T13:46:01.307Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-6197\",\"sourceIdentifier\":\"security@grafana.com\",\"published\":\"2025-07-18T08:15:28.187\",\"lastModified\":\"2025-07-22T13:06:27.983\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.\\n\\n\\nPrerequisites for exploitation:\\n\\n- Multiple organizations must exist in the Grafana instance\\n\\n- Victim must be on a different organization than the one specified in the URL\"},{\"lang\":\"es\",\"value\":\"Se ha identificado una vulnerabilidad de redirecci\u00f3n abierta en la funcionalidad de cambio de organizaci\u00f3n de Grafana OSS. Requisitos para su explotaci\u00f3n: - Deben existir varias organizaciones en la instancia de Grafana. - La v\u00edctima debe pertenecer a una organizaci\u00f3n diferente a la especificada en la URL.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@grafana.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N\",\"baseScore\":4.2,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"security@grafana.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-601\"}]}],\"references\":[{\"url\":\"https://grafana.com/blog/2025/07/17/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-6197-and-cve-2025-6023/\",\"source\":\"security@grafana.com\"},{\"url\":\"https://grafana.com/security/security-advisories/cve-2025-6197/\",\"source\":\"security@grafana.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-6197\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-18T13:45:54.505880Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-18T13:45:58.520Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Dat Phung\"}], \"impacts\": [{\"capecId\": \"CAPEC-194\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-194\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.2, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Grafana\", \"product\": \"Grafana\", \"versions\": [{\"status\": \"affected\", \"version\": \"12.0.x\", \"lessThan\": \"12.0.2+security-01\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.6.x\", \"lessThan\": \"11.6.3+security-01\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.5.x\", \"lessThan\": \"11.5.6+security-01\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.4.x\", \"lessThan\": \"11.4.6+security-01\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.3.x\", \"lessThan\": \"11.3.8+security-01\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://grafana.com/security/security-advisories/cve-2025-6197/\", \"name\": \"Vulnerable code location\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://grafana.com/blog/2025/07/17/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-6197-and-cve-2025-6023/\", \"tags\": [\"mitigation\", \"release-notes\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.\\n\\n\\nPrerequisites for exploitation:\\n\\n- Multiple organizations must exist in the Grafana instance\\n\\n- Victim must be on a different organization than the one specified in the URL\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eAn open redirect vulnerability has been identified in Grafana OSS organization switching functionality.\u003cbr\u003e\u003c/p\u003e\u003cp\u003ePrerequisites for exploitation:\u003c/p\u003e\u003cp\u003e- Multiple organizations must exist in the Grafana instance\u003c/p\u003e\u003cp\u003e- Victim must be on a different organization than the one specified in the URL\u003c/p\u003e\u003cp\u003e\u003cbr\u003e\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-601\", \"description\": \"CWE-601\"}]}], \"providerMetadata\": {\"orgId\": \"57da9224-a3e2-4646-9d0e-c4dc2e05e7da\", \"shortName\": \"GRAFANA\", \"dateUpdated\": \"2025-07-18T07:49:16.382Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-6197\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-07-18T13:46:01.307Z\", \"dateReserved\": \"2025-06-17T07:22:18.547Z\", \"assignerOrgId\": \"57da9224-a3e2-4646-9d0e-c4dc2e05e7da\", \"datePublished\": \"2025-07-18T07:48:22.523Z\", \"assignerShortName\": \"GRAFANA\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
suse-su-2025:3819-1
Vulnerability from csaf_suse
Published
2025-10-28 07:20
Modified
2025-10-28 07:20
Summary
Security update 5.1.1 for Multi-Linux Manager Client Tools
Notes
Title of the patch
Security update 5.1.1 for Multi-Linux Manager Client Tools
Description of the patch
This update fixes the following issues:
dracut-saltboot was updated from version 0.1 to version 1.0.0:
- Version 1.0.0 bugs fixed:
* Reboot on salt key timeout (bsc#1237495)
* Fixed parsing files with space in the name (bsc#1252100)
golang-github-prometheus-alertmanager was updated from version 0.26.0 to 0.28.1 to :
- Security issues fixed:
* CVE-2025-47908: Fixed a Denial of Service vulnerability (bsc#1247748)
- Version 0.28.1 changes and bugs fixed (jsc#PED-13285):
* Improved performance of inhibition rules when using Equal
labels.
* Improve the documentation on escaping in UTF-8 matchers.
* Update alertmanager_config_hash metric help to document the
hash is not cryptographically strong.
* Fixed panic in amtool when using --verbose.
* Fixed templating of channel field for Rocket.Chat.
* Fixed rocketchat_configs written as rocket_configs in docs.
* Fixed usage for --enable-feature flag.
* Trim whitespace from OpsGenie API Key.
* Fixed Jira project template not rendered when searching for
existing issues.
* Fixed subtle bug in JSON/YAML encoding of inhibition rules that
would cause Equal labels to be omitted.
* Fixed header for slack_configs in docs.
* Fixed weight and wrap of Microsoft Teams notifications.
- Version 0.28.0 changes and bugs fixed:
* Templating errors in the SNS integration now return an error.
* Adopt log/slog, drop go-kit/log.
* Added a new Microsoft Teams integration based on Flows.
* Added a new Rocket.Chat integration.
* Added a new Jira integration.
* Added support for GOMEMLIMIT, enable it via the feature flag
--enable-feature=auto-gomemlimit.
* Added support for GOMAXPROCS, enable it via the feature flag
--enable-feature=auto-gomaxprocs.
* Added support for limits of silences including the maximum number
of active and pending silences, and the maximum size per
silence (in bytes). You can use the flags
--silences.max-silences and --silences.max-silence-size-bytes
to set them accordingly.
* Muted alerts now show whether they are suppressed or not in
both the /api/v2/alerts endpoint and the Alertmanager UI.
- Version 0.27.0 changes and bugs fixed:
* API: Removal of all api/v1/ endpoints. These endpoints
now log and return a deprecation message and respond with a
status code of 410.
* UTF-8 Support: Introduction of support for any UTF-8
character as part of label names and matchers.
* Discord Integration: Enforce max length in message.
* Metrics: Introduced the experimental feature flag
--enable-feature=receiver-name-in-metrics to include the
receiver name.
* Metrics: Introduced a new gauge named
alertmanager_inhibition_rules that counts the number of
configured inhibition rules.
* Metrics: Introduced a new counter named
alertmanager_alerts_supressed_total that tracks muted alerts,
it contains a reason label to indicate the source of the mute.
* Discord Integration: Introduced support for webhook_url_file.
* Microsoft Teams Integration: Introduced support for
webhook_url_file.
* Microsoft Teams Integration: Added support for summary.
* Metrics: Notification metrics now support two new values for
the label reason, contextCanceled and contextDeadlineExceeded.
* Email Integration: Contents of auth_password_file are now
trimmed of prefixed and suffixed whitespace.
* amtool: Fixes the error scheme required for webhook url when
using amtool with --alertmanager.url.
* Mixin: Fixed AlertmanagerFailedToSendAlerts,
AlertmanagerClusterFailedToSendAlerts, and
AlertmanagerClusterFailedToSendAlerts to make sure they ignore
the reason label.
grafana was updated to from version 11.5.5 to 11.5.7:
- Security issues fixed:
* CVE-2025-6023: Fixed cross-site-scripting via scripted dashboards (bsc#1246735)
* CVE-2025-6197: Fixed open redirect in organization switching (bsc#1246736)
* CVE-2025-3415: Fixed exposure of DingDing alerting integration URL to Viewer level users (bsc#1245302)
- Other bugs fixed:
* Azure: Fixed legend formatting.
* Azure: Fixed resource name determination in template variable queries.
mgr-push was updated from version 5.1.3 to 5.1.4:
- Use absolute paths when invoking external commands
python-defusedxml:
- New package implemented at version 0.7.1
rhnlib was updated from version 5.1.2 to 5.1.3:
- Use more secure defusedxml parser (bsc#1227577)
spacecmd was updated from version 5.1.8 to 5.1.11:
- Version 5.1.11 changes and bugs fixed:
* Make spacecmd work with Python 3.12 and higher
* Call print statements properly in Python 3
- Version 5.1.10 changes and bugs fixed:
* Fixed use of renamed config parser class where the backward
compatible alias was dropped in latest python version
(bsc#1246586)
- Version 5.1.9 changes and bugs fixed:
* Fixed installation of python lib files on Ubuntu 24.04
spacewalk-client-tools was updated from version 5.1.6 to 5.1.7:
- Fixed syntax error in changelog
supportutils-plugin-susemanager-client was updated from version 5.1.3 to 5.1.4:
- Fixed syntax error in changelog
uyuni-tools was updated from version 5.1.15 to 5.1.20:
- Version 5.1.20 changes and bugs fixed:
* Added migration for server monitoring configuration (bsc#1247688)
- Version 5.1.19 changes and bugs fixed:
* Added a lowercase version of --logLevel (bsc#1243611)
* Stop executing scripts in temporary folder (bsc#1243704)
* support config: collect podman inspect for hub container (bsc#1245099)
* Use new dedicated path for Cobbler settings (bsc#1244027)
* Migrate custom auto installation snippets (bsc#1246320)
* Added SUSE Linux Enterprise 15 SP7 to buildin productmap
* Fixed loading product map from mgradm configuration file (bsc#1246068)
* Fixed channel override for distro copy
* Do not use sudo when running as a root user (bsc#1246882)
* Do not require backups to be at the same location for restoring (bsc#1246906)
* Fixed recomputing proxy images when installing a PTF or TEST (bsc#1246553)
* Added mgradm server rename to change the server FQDN (bsc#1229825)
* If no DB SSL CA parameter is given, use the other one (bsc#1245120)
* More fault tolerant mgradm stop (bsc#1243331)
* Backup systemd dropin directory too and create if missing
* Added 3rd party SSL options for upgrade and migration scenarios
* Do not consider stderr output of podman as an error (bsc#1247836)
* Restore SELinux contexts for restored backup volumes (bsc#1244127)
* Automatically get up-to-date systemid file on salt based proxy hosts (bsc#1246789)
* Bump the default image tag to 5.1.1
- Version 5.1.18 changes and bugs fixed:
* Updated translation strings
- Version 5.1.17 changes and bugs fixed:
* Upgrade of saline should use scale function (bsc#1246864)
- Version 5.1.16 changes and bugs fixed:
* Use database backup volume as temporary backup location (bsc#1246628)
Patchnames
SUSE-2025-3819,SUSE-MultiLinuxManagerTools-SLE-15-2025-3819,SUSE-MultiLinuxManagerTools-SLE-Micro-5-2025-3819
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update 5.1.1 for Multi-Linux Manager Client Tools",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update fixes the following issues:\n\ndracut-saltboot was updated from version 0.1 to version 1.0.0:\n\n- Version 1.0.0 bugs fixed:\n \n * Reboot on salt key timeout (bsc#1237495)\n * Fixed parsing files with space in the name (bsc#1252100)\n\ngolang-github-prometheus-alertmanager was updated from version 0.26.0 to 0.28.1 to :\n\n- Security issues fixed:\n\n * CVE-2025-47908: Fixed a Denial of Service vulnerability (bsc#1247748)\n\n- Version 0.28.1 changes and bugs fixed (jsc#PED-13285):\n\n * Improved performance of inhibition rules when using Equal\n labels.\n * Improve the documentation on escaping in UTF-8 matchers.\n * Update alertmanager_config_hash metric help to document the\n hash is not cryptographically strong.\n * Fixed panic in amtool when using --verbose.\n * Fixed templating of channel field for Rocket.Chat.\n * Fixed rocketchat_configs written as rocket_configs in docs.\n * Fixed usage for --enable-feature flag.\n * Trim whitespace from OpsGenie API Key.\n * Fixed Jira project template not rendered when searching for\n existing issues.\n * Fixed subtle bug in JSON/YAML encoding of inhibition rules that\n would cause Equal labels to be omitted.\n * Fixed header for slack_configs in docs.\n * Fixed weight and wrap of Microsoft Teams notifications.\n \n- Version 0.28.0 changes and bugs fixed:\n\n * Templating errors in the SNS integration now return an error.\n * Adopt log/slog, drop go-kit/log.\n * Added a new Microsoft Teams integration based on Flows.\n * Added a new Rocket.Chat integration.\n * Added a new Jira integration.\n * Added support for GOMEMLIMIT, enable it via the feature flag\n --enable-feature=auto-gomemlimit.\n * Added support for GOMAXPROCS, enable it via the feature flag\n --enable-feature=auto-gomaxprocs.\n * Added support for limits of silences including the maximum number\n of active and pending silences, and the maximum size per\n silence (in bytes). You can use the flags\n --silences.max-silences and --silences.max-silence-size-bytes\n to set them accordingly.\n * Muted alerts now show whether they are suppressed or not in\n both the /api/v2/alerts endpoint and the Alertmanager UI.\n\n- Version 0.27.0 changes and bugs fixed:\n\n * API: Removal of all api/v1/ endpoints. These endpoints\n now log and return a deprecation message and respond with a\n status code of 410.\n * UTF-8 Support: Introduction of support for any UTF-8\n character as part of label names and matchers.\n * Discord Integration: Enforce max length in message.\n * Metrics: Introduced the experimental feature flag\n --enable-feature=receiver-name-in-metrics to include the\n receiver name.\n * Metrics: Introduced a new gauge named\n alertmanager_inhibition_rules that counts the number of\n configured inhibition rules.\n * Metrics: Introduced a new counter named\n alertmanager_alerts_supressed_total that tracks muted alerts,\n it contains a reason label to indicate the source of the mute.\n * Discord Integration: Introduced support for webhook_url_file.\n * Microsoft Teams Integration: Introduced support for\n webhook_url_file.\n * Microsoft Teams Integration: Added support for summary.\n * Metrics: Notification metrics now support two new values for\n the label reason, contextCanceled and contextDeadlineExceeded.\n * Email Integration: Contents of auth_password_file are now\n trimmed of prefixed and suffixed whitespace.\n * amtool: Fixes the error scheme required for webhook url when\n using amtool with --alertmanager.url.\n * Mixin: Fixed AlertmanagerFailedToSendAlerts,\n AlertmanagerClusterFailedToSendAlerts, and\n AlertmanagerClusterFailedToSendAlerts to make sure they ignore\n the reason label.\n\ngrafana was updated to from version 11.5.5 to 11.5.7:\n \n- Security issues fixed:\n\n * CVE-2025-6023: Fixed cross-site-scripting via scripted dashboards (bsc#1246735)\n * CVE-2025-6197: Fixed open redirect in organization switching (bsc#1246736)\n * CVE-2025-3415: Fixed exposure of DingDing alerting integration URL to Viewer level users (bsc#1245302)\n\n- Other bugs fixed:\n\n * Azure: Fixed legend formatting.\n * Azure: Fixed resource name determination in template variable queries.\n\nmgr-push was updated from version 5.1.3 to 5.1.4:\n\n- Use absolute paths when invoking external commands\n\npython-defusedxml:\n\n- New package implemented at version 0.7.1\n\nrhnlib was updated from version 5.1.2 to 5.1.3:\n\n- Use more secure defusedxml parser (bsc#1227577)\n\nspacecmd was updated from version 5.1.8 to 5.1.11:\n\n- Version 5.1.11 changes and bugs fixed:\n\n * Make spacecmd work with Python 3.12 and higher\n * Call print statements properly in Python 3\n\n- Version 5.1.10 changes and bugs fixed:\n\n * Fixed use of renamed config parser class where the backward\n compatible alias was dropped in latest python version\n (bsc#1246586)\n\n- Version 5.1.9 changes and bugs fixed:\n\n * Fixed installation of python lib files on Ubuntu 24.04\n\nspacewalk-client-tools was updated from version 5.1.6 to 5.1.7:\n\n- Fixed syntax error in changelog\n\nsupportutils-plugin-susemanager-client was updated from version 5.1.3 to 5.1.4:\n\n- Fixed syntax error in changelog\n\nuyuni-tools was updated from version 5.1.15 to 5.1.20:\n\n- Version 5.1.20 changes and bugs fixed:\n\n * Added migration for server monitoring configuration (bsc#1247688)\n\n- Version 5.1.19 changes and bugs fixed:\n\n * Added a lowercase version of --logLevel (bsc#1243611)\n * Stop executing scripts in temporary folder (bsc#1243704)\n * support config: collect podman inspect for hub container (bsc#1245099)\n * Use new dedicated path for Cobbler settings (bsc#1244027)\n * Migrate custom auto installation snippets (bsc#1246320)\n * Added SUSE Linux Enterprise 15 SP7 to buildin productmap\n * Fixed loading product map from mgradm configuration file (bsc#1246068)\n * Fixed channel override for distro copy\n * Do not use sudo when running as a root user (bsc#1246882)\n * Do not require backups to be at the same location for restoring (bsc#1246906)\n * Fixed recomputing proxy images when installing a PTF or TEST (bsc#1246553)\n * Added mgradm server rename to change the server FQDN (bsc#1229825)\n * If no DB SSL CA parameter is given, use the other one (bsc#1245120)\n * More fault tolerant mgradm stop (bsc#1243331)\n * Backup systemd dropin directory too and create if missing\n * Added 3rd party SSL options for upgrade and migration scenarios\n * Do not consider stderr output of podman as an error (bsc#1247836)\n * Restore SELinux contexts for restored backup volumes (bsc#1244127)\n * Automatically get up-to-date systemid file on salt based proxy hosts (bsc#1246789)\n * Bump the default image tag to 5.1.1\n\n- Version 5.1.18 changes and bugs fixed:\n\n * Updated translation strings\n \n- Version 5.1.17 changes and bugs fixed:\n\n * Upgrade of saline should use scale function (bsc#1246864)\n\n- Version 5.1.16 changes and bugs fixed:\n\n * Use database backup volume as temporary backup location (bsc#1246628)\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-3819,SUSE-MultiLinuxManagerTools-SLE-15-2025-3819,SUSE-MultiLinuxManagerTools-SLE-Micro-5-2025-3819",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_3819-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:3819-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253819-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:3819-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023070.html"
},
{
"category": "self",
"summary": "SUSE Bug 1019074",
"url": "https://bugzilla.suse.com/1019074"
},
{
"category": "self",
"summary": "SUSE Bug 1227577",
"url": "https://bugzilla.suse.com/1227577"
},
{
"category": "self",
"summary": "SUSE Bug 1229825",
"url": "https://bugzilla.suse.com/1229825"
},
{
"category": "self",
"summary": "SUSE Bug 1237495",
"url": "https://bugzilla.suse.com/1237495"
},
{
"category": "self",
"summary": "SUSE Bug 1243331",
"url": "https://bugzilla.suse.com/1243331"
},
{
"category": "self",
"summary": "SUSE Bug 1243611",
"url": "https://bugzilla.suse.com/1243611"
},
{
"category": "self",
"summary": "SUSE Bug 1243704",
"url": "https://bugzilla.suse.com/1243704"
},
{
"category": "self",
"summary": "SUSE Bug 1244027",
"url": "https://bugzilla.suse.com/1244027"
},
{
"category": "self",
"summary": "SUSE Bug 1244127",
"url": "https://bugzilla.suse.com/1244127"
},
{
"category": "self",
"summary": "SUSE Bug 1245099",
"url": "https://bugzilla.suse.com/1245099"
},
{
"category": "self",
"summary": "SUSE Bug 1245120",
"url": "https://bugzilla.suse.com/1245120"
},
{
"category": "self",
"summary": "SUSE Bug 1245302",
"url": "https://bugzilla.suse.com/1245302"
},
{
"category": "self",
"summary": "SUSE Bug 1246068",
"url": "https://bugzilla.suse.com/1246068"
},
{
"category": "self",
"summary": "SUSE Bug 1246320",
"url": "https://bugzilla.suse.com/1246320"
},
{
"category": "self",
"summary": "SUSE Bug 1246553",
"url": "https://bugzilla.suse.com/1246553"
},
{
"category": "self",
"summary": "SUSE Bug 1246586",
"url": "https://bugzilla.suse.com/1246586"
},
{
"category": "self",
"summary": "SUSE Bug 1246628",
"url": "https://bugzilla.suse.com/1246628"
},
{
"category": "self",
"summary": "SUSE Bug 1246735",
"url": "https://bugzilla.suse.com/1246735"
},
{
"category": "self",
"summary": "SUSE Bug 1246736",
"url": "https://bugzilla.suse.com/1246736"
},
{
"category": "self",
"summary": "SUSE Bug 1246789",
"url": "https://bugzilla.suse.com/1246789"
},
{
"category": "self",
"summary": "SUSE Bug 1246864",
"url": "https://bugzilla.suse.com/1246864"
},
{
"category": "self",
"summary": "SUSE Bug 1246882",
"url": "https://bugzilla.suse.com/1246882"
},
{
"category": "self",
"summary": "SUSE Bug 1246906",
"url": "https://bugzilla.suse.com/1246906"
},
{
"category": "self",
"summary": "SUSE Bug 1247688",
"url": "https://bugzilla.suse.com/1247688"
},
{
"category": "self",
"summary": "SUSE Bug 1247748",
"url": "https://bugzilla.suse.com/1247748"
},
{
"category": "self",
"summary": "SUSE Bug 1247836",
"url": "https://bugzilla.suse.com/1247836"
},
{
"category": "self",
"summary": "SUSE Bug 1252100",
"url": "https://bugzilla.suse.com/1252100"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-3415 page",
"url": "https://www.suse.com/security/cve/CVE-2025-3415/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47908 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47908/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6023 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6023/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6197/"
}
],
"title": "Security update 5.1.1 for Multi-Linux Manager Client Tools",
"tracking": {
"current_release_date": "2025-10-28T07:20:07Z",
"generator": {
"date": "2025-10-28T07:20:07Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:3819-1",
"initial_release_date": "2025-10-28T07:20:07Z",
"revision_history": [
{
"date": "2025-10-28T07:20:07Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64"
}
},
{
"category": "product_version",
"name": "grafana-11.5.7-150002.4.3.3.aarch64",
"product": {
"name": "grafana-11.5.7-150002.4.3.3.aarch64",
"product_id": "grafana-11.5.7-150002.4.3.3.aarch64"
}
},
{
"category": "product_version",
"name": "mgrctl-5.1.20-150002.3.3.3.aarch64",
"product": {
"name": "mgrctl-5.1.20-150002.3.3.3.aarch64",
"product_id": "mgrctl-5.1.20-150002.3.3.3.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"product": {
"name": "dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"product_id": "dracut-saltboot-1.0.0-150002.3.3.1.noarch"
}
},
{
"category": "product_version",
"name": "mgr-push-5.1.4-150002.3.3.3.noarch",
"product": {
"name": "mgr-push-5.1.4-150002.3.3.3.noarch",
"product_id": "mgr-push-5.1.4-150002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"product": {
"name": "mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"product_id": "mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"product": {
"name": "mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"product_id": "mgrctl-lang-5.1.20-150002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"product": {
"name": "mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"product_id": "mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "python2-defusedxml-0.7.1-150002.1.3.2.noarch",
"product": {
"name": "python2-defusedxml-0.7.1-150002.1.3.2.noarch",
"product_id": "python2-defusedxml-0.7.1-150002.1.3.2.noarch"
}
},
{
"category": "product_version",
"name": "python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"product": {
"name": "python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"product_id": "python3-defusedxml-0.7.1-150002.1.3.2.noarch"
}
},
{
"category": "product_version",
"name": "python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"product": {
"name": "python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"product_id": "python3-mgr-push-5.1.4-150002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"product": {
"name": "python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"product_id": "python3-rhnlib-5.1.3-150002.3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"product": {
"name": "python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"product_id": "python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "spacecmd-5.1.11-150002.3.3.2.noarch",
"product": {
"name": "spacecmd-5.1.11-150002.3.3.2.noarch",
"product_id": "spacecmd-5.1.11-150002.3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"product": {
"name": "spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"product_id": "spacewalk-client-tools-5.1.7-150002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"product": {
"name": "supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"product_id": "supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le"
}
},
{
"category": "product_version",
"name": "grafana-11.5.7-150002.4.3.3.ppc64le",
"product": {
"name": "grafana-11.5.7-150002.4.3.3.ppc64le",
"product_id": "grafana-11.5.7-150002.4.3.3.ppc64le"
}
},
{
"category": "product_version",
"name": "mgrctl-5.1.20-150002.3.3.3.ppc64le",
"product": {
"name": "mgrctl-5.1.20-150002.3.3.3.ppc64le",
"product_id": "mgrctl-5.1.20-150002.3.3.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x"
}
},
{
"category": "product_version",
"name": "grafana-11.5.7-150002.4.3.3.s390x",
"product": {
"name": "grafana-11.5.7-150002.4.3.3.s390x",
"product_id": "grafana-11.5.7-150002.4.3.3.s390x"
}
},
{
"category": "product_version",
"name": "mgrctl-5.1.20-150002.3.3.3.s390x",
"product": {
"name": "mgrctl-5.1.20-150002.3.3.3.s390x",
"product_id": "mgrctl-5.1.20-150002.3.3.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "grafana-11.5.7-150002.4.3.3.x86_64",
"product": {
"name": "grafana-11.5.7-150002.4.3.3.x86_64",
"product_id": "grafana-11.5.7-150002.4.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "mgrctl-5.1.20-150002.3.3.3.x86_64",
"product": {
"name": "mgrctl-5.1.20-150002.3.3.3.x86_64",
"product_id": "mgrctl-5.1.20-150002.3.3.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Multi Linux Manager Tools SLE-15",
"product": {
"name": "SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15"
}
},
{
"category": "product_name",
"name": "SUSE Multi Linux Manager Tools SLE-Micro-5",
"product": {
"name": "SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-saltboot-1.0.0-150002.3.3.1.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch"
},
"product_reference": "dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64 as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64 as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.7-150002.4.3.3.aarch64 as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64"
},
"product_reference": "grafana-11.5.7-150002.4.3.3.aarch64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.7-150002.4.3.3.ppc64le as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le"
},
"product_reference": "grafana-11.5.7-150002.4.3.3.ppc64le",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.7-150002.4.3.3.s390x as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x"
},
"product_reference": "grafana-11.5.7-150002.4.3.3.s390x",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.7-150002.4.3.3.x86_64 as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64"
},
"product_reference": "grafana-11.5.7-150002.4.3.3.x86_64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgr-push-5.1.4-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch"
},
"product_reference": "mgr-push-5.1.4-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-5.1.20-150002.3.3.3.aarch64 as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64"
},
"product_reference": "mgrctl-5.1.20-150002.3.3.3.aarch64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-5.1.20-150002.3.3.3.ppc64le as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le"
},
"product_reference": "mgrctl-5.1.20-150002.3.3.3.ppc64le",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-5.1.20-150002.3.3.3.s390x as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x"
},
"product_reference": "mgrctl-5.1.20-150002.3.3.3.s390x",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-5.1.20-150002.3.3.3.x86_64 as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64"
},
"product_reference": "mgrctl-5.1.20-150002.3.3.3.x86_64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch"
},
"product_reference": "mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-lang-5.1.20-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch"
},
"product_reference": "mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
},
"product_reference": "mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-defusedxml-0.7.1-150002.1.3.2.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch"
},
"product_reference": "python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-mgr-push-5.1.4-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch"
},
"product_reference": "python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rhnlib-5.1.3-150002.3.3.2.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch"
},
"product_reference": "python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch"
},
"product_reference": "python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacecmd-5.1.11-150002.3.3.2.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch"
},
"product_reference": "spacecmd-5.1.11-150002.3.3.2.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-client-tools-5.1.7-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch"
},
"product_reference": "spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch"
},
"product_reference": "supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-saltboot-1.0.0-150002.3.3.1.noarch as component of SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch"
},
"product_reference": "dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-Micro-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-5.1.20-150002.3.3.3.aarch64 as component of SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64"
},
"product_reference": "mgrctl-5.1.20-150002.3.3.3.aarch64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-Micro-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-5.1.20-150002.3.3.3.ppc64le as component of SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le"
},
"product_reference": "mgrctl-5.1.20-150002.3.3.3.ppc64le",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-Micro-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-5.1.20-150002.3.3.3.s390x as component of SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x"
},
"product_reference": "mgrctl-5.1.20-150002.3.3.3.s390x",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-Micro-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-5.1.20-150002.3.3.3.x86_64 as component of SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64"
},
"product_reference": "mgrctl-5.1.20-150002.3.3.3.x86_64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-Micro-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch"
},
"product_reference": "mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-Micro-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-lang-5.1.20-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch"
},
"product_reference": "mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-Micro-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
},
"product_reference": "mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-Micro-5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-3415",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-3415"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. The Grafana Alerting DingDing integration was not properly protected and could be exposed to users with Viewer permission. \nFixed in versions 10.4.19+security-01, 11.2.10+security-01, 11.3.7+security-01, 11.4.5+security-01, 11.5.5+security-01, 11.6.2+security-01 and 12.0.1+security-01",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-3415",
"url": "https://www.suse.com/security/cve/CVE-2025-3415"
},
{
"category": "external",
"summary": "SUSE Bug 1245302 for CVE-2025-3415",
"url": "https://bugzilla.suse.com/1245302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-28T07:20:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-3415"
},
{
"cve": "CVE-2025-47908",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47908"
}
],
"notes": [
{
"category": "general",
"text": "Middleware causes a prohibitive amount of heap allocations when processing malicious preflight requests that include a Access-Control-Request-Headers (ACRH) header whose value contains many commas. This behavior can be abused by attackers to produce undue load on the middleware/server as an attempt to cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47908",
"url": "https://www.suse.com/security/cve/CVE-2025-47908"
},
{
"category": "external",
"summary": "SUSE Bug 1247746 for CVE-2025-47908",
"url": "https://bugzilla.suse.com/1247746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-28T07:20:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-47908"
},
{
"cve": "CVE-2025-6023",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6023"
}
],
"notes": [
{
"category": "general",
"text": "An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.\n\nThe open redirect can be chained with path traversal vulnerabilities to achieve XSS.\n\nFixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6023",
"url": "https://www.suse.com/security/cve/CVE-2025-6023"
},
{
"category": "external",
"summary": "SUSE Bug 1246735 for CVE-2025-6023",
"url": "https://bugzilla.suse.com/1246735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-28T07:20:07Z",
"details": "important"
}
],
"title": "CVE-2025-6023"
},
{
"cve": "CVE-2025-6197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6197"
}
],
"notes": [
{
"category": "general",
"text": "An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.\n\n\nPrerequisites for exploitation:\n\n- Multiple organizations must exist in the Grafana instance\n\n- Victim must be on a different organization than the one specified in the URL",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6197",
"url": "https://www.suse.com/security/cve/CVE-2025-6197"
},
{
"category": "external",
"summary": "SUSE Bug 1246736 for CVE-2025-6197",
"url": "https://bugzilla.suse.com/1246736"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-28T07:20:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-6197"
}
]
}
suse-su-2025:3817-1
Vulnerability from csaf_suse
Published
2025-10-28 07:19
Modified
2025-10-28 07:19
Summary
Security update 5.1.1 for Multi-Linux Manager Client Tools
Notes
Title of the patch
Security update 5.1.1 for Multi-Linux Manager Client Tools
Description of the patch
This update fixes the following issues:
golang-github-prometheus-alertmanager:
- Update to version 0.28.1 (jsc#PED-13285):
* Improved performance of inhibition rules when using Equal
labels.
* Improve the documentation on escaping in UTF-8 matchers.
* Update alertmanager_config_hash metric help to document the
hash is not cryptographically strong.
* Fix panic in amtool when using --verbose.
* Fix templating of channel field for Rocket.Chat.
* Fix rocketchat_configs written as rocket_configs in docs.
* Fix usage for --enable-feature flag.
* Trim whitespace from OpsGenie API Key.
* Fix Jira project template not rendered when searching for
existing issues.
* Fix subtle bug in JSON/YAML encoding of inhibition rules that
would cause Equal labels to be omitted.
* Fix header for slack_configs in docs.
* Fix weight and wrap of Microsoft Teams notifications.
- Upgrade to version 0.28.0:
* CVE-2025-47908: Bump github.com/rs/cors (bsc#1247748).
* Templating errors in the SNS integration now return an error.
* Adopt log/slog, drop go-kit/log.
* Add a new Microsoft Teams integration based on Flows.
* Add a new Rocket.Chat integration.
* Add a new Jira integration.
* Add support for GOMEMLIMIT, enable it via the feature flag
--enable-feature=auto-gomemlimit.
* Add support for GOMAXPROCS, enable it via the feature flag
--enable-feature=auto-gomaxprocs.
* Add support for limits of silences including the maximum number
of active and pending silences, and the maximum size per
silence (in bytes). You can use the flags
--silences.max-silences and --silences.max-silence-size-bytes
to set them accordingly.
* Muted alerts now show whether they are suppressed or not in
both the /api/v2/alerts endpoint and the Alertmanager UI.
- Upgrade to version 0.27.0:
* API: Removal of all api/v1/ endpoints. These endpoints
now log and return a deprecation message and respond with a
status code of 410.
* UTF-8 Support: Introduction of support for any UTF-8
character as part of label names and matchers.
* Discord Integration: Enforce max length in message.
* Metrics: Introduced the experimental feature flag
--enable-feature=receiver-name-in-metrics to include the
receiver name.
* Metrics: Introduced a new gauge named
alertmanager_inhibition_rules that counts the number of
configured inhibition rules.
* Metrics: Introduced a new counter named
alertmanager_alerts_supressed_total that tracks muted alerts,
it contains a reason label to indicate the source of the mute.
* Discord Integration: Introduced support for webhook_url_file.
* Microsoft Teams Integration: Introduced support for
webhook_url_file.
* Microsoft Teams Integration: Add support for summary.
* Metrics: Notification metrics now support two new values for
the label reason, contextCanceled and contextDeadlineExceeded.
* Email Integration: Contents of auth_password_file are now
trimmed of prefixed and suffixed whitespace.
* amtool: Fixes the error scheme required for webhook url when
using amtool with --alertmanager.url.
* Mixin: Fix AlertmanagerFailedToSendAlerts,
AlertmanagerClusterFailedToSendAlerts, and
AlertmanagerClusterFailedToSendAlerts to make sure they ignore
the reason label.
grafana:
- Update to version 11.5.7:
* Security:
CVE-2025-6023: Fix cross-site-scripting via scripted dashboards
(bsc#1246735)
CVE-2025-6197: Fix open redirect in organization switching
(bsc#1246736)
* Bug fixes:
Azure: Fix legend formatting.
Azure: Fix resource name determination in template variable
queries.
- Update to version 11.5.6:
CVE-2025-3415: Fix exposure of DingDing alerting integration
URL to Viewer level users (bsc#1245302)
mgr-push:
- Version 5.1.4-0
* Use absolute paths when invoking external commands
* Fix syntax error in changelog
python-defusedxml:
- Update to 0.6.0
* Increase test coverage.
* Add badges to README.
* Test on Python 3.7 stable and 3.8-dev
* Drop support for Python 3.4
* No longer pass *html* argument to XMLParse. It has been deprecated and
ignored for a long time. The DefusedXMLParser still takes a html argument.
A deprecation warning is issued when the argument is False and a TypeError
when it's True.
* defusedxml now fails early when pyexpat stdlib module is not available or
broken.
* defusedxml.ElementTree.__all__ now lists ParseError as public attribute.
* The defusedxml.ElementTree and defusedxml.cElementTree modules had a typo
and used XMLParse instead of XMLParser as an alias for DefusedXMLParser.
Both the old and fixed name are now available.
- Remove superfluous devel dependency for noarch package
- Fix source url.
- Update to 5.0
* Add compatibility with Python 3.6
* Drop support for Python 2.6, 3.1, 3.2, 3.3
* Fix lxml tests (XMLSyntaxError: Detected an entity reference loop)
- Implement single-spec version.
- Dummy changelog for bsc#1019074, FATE#322329
- Initial packaging.
rhnlib:
- Version 5.1.3-0
* Fix syntax error in changelog
* Use more secure defusedxml parser (bsc#1227577)
spacecmd:
- Version 5.1.11-0
* Make spacecmd work with Python 3.12 and higher
* Call print statements properly in Python 3
- Version 5.1.10-0
* Fix use of renamed config parser class where the backward
compatible alias was dropped in latest python version
(bsc#1246586)
- Version 5.1.9-0
* Fix installation of python lib files on Ubuntu 24.04
spacewalk-client-tools:
- Version 5.1.7-0
* Fix syntax error in changelog
supportutils-plugin-susemanager-client:
- Version 5.1.4-0
* Fix syntax error in changelog
uyuni-tools:
- version 5.1.20-0
* Add migration for server monitoring configuration (bsc#1247688)
- version 5.1.19-0
* Add a lowercase version of --logLevel (bsc#1243611)
* Stop executing scripts in temporary folder (bsc#1243704)
* support config: collect podman inspect for hub container
(bsc#1245099)
* Use new dedicated path for Cobbler settings (bsc#1244027)
* Migrate custom auto installation snippets (bsc#1246320)
* Add SUSE Linux Enterprise 15 SP7 to buildin productmap
* Fix loading product map from mgradm configuration file
(bsc#1246068)
* Fix channel override for distro copy
* Do not use sudo when running as a root user (bsc#1246882)
* Do not require backups to be at the same location for restoring
(bsc#1246906)
* Fix recomputing proxy images when installing a PTF or TEST
(bsc#1246553)
* Add mgradm server rename to change the server FQDN (bsc#1229825)
* If no DB SSL CA parameter is given, use the other one
(bsc#1245120)
* More fault tolerant mgradm stop (bsc#1243331)
* Backup systemd dropin directory too and create if missing
* Add 3rd party SSL options for upgrade and migration scenarios
* Do not consider stderr output of podman as an error
(bsc#1247836)
* Restore SELinux contexts for restored backup volumes
(bsc#1244127)
* Automatically get up-to-date systemid file on salt based proxy
hosts (bsc#1246789)
* Bump the default image tag to 5.1.1
- version 5.1.18-0
* Update translation strings
- version 5.1.17-0
* upgrade saline should use scale function (bsc#1246864)
- version 5.1.16-0
* Use database backup volume as temporary backup location
(bsc#1246628)
Patchnames
SUSE-2025-3817,SUSE-MultiLinuxManagerTools-SLE-12-2025-3817
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update 5.1.1 for Multi-Linux Manager Client Tools",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update fixes the following issues:\n\ngolang-github-prometheus-alertmanager:\n\n- Update to version 0.28.1 (jsc#PED-13285):\n * Improved performance of inhibition rules when using Equal\n labels.\n * Improve the documentation on escaping in UTF-8 matchers.\n * Update alertmanager_config_hash metric help to document the\n hash is not cryptographically strong.\n * Fix panic in amtool when using --verbose.\n * Fix templating of channel field for Rocket.Chat.\n * Fix rocketchat_configs written as rocket_configs in docs.\n * Fix usage for --enable-feature flag.\n * Trim whitespace from OpsGenie API Key.\n * Fix Jira project template not rendered when searching for\n existing issues.\n * Fix subtle bug in JSON/YAML encoding of inhibition rules that\n would cause Equal labels to be omitted.\n * Fix header for slack_configs in docs.\n * Fix weight and wrap of Microsoft Teams notifications.\n- Upgrade to version 0.28.0:\n * CVE-2025-47908: Bump github.com/rs/cors (bsc#1247748).\n * Templating errors in the SNS integration now return an error.\n * Adopt log/slog, drop go-kit/log.\n * Add a new Microsoft Teams integration based on Flows.\n * Add a new Rocket.Chat integration.\n * Add a new Jira integration.\n * Add support for GOMEMLIMIT, enable it via the feature flag\n --enable-feature=auto-gomemlimit.\n * Add support for GOMAXPROCS, enable it via the feature flag\n --enable-feature=auto-gomaxprocs.\n * Add support for limits of silences including the maximum number\n of active and pending silences, and the maximum size per\n silence (in bytes). You can use the flags\n --silences.max-silences and --silences.max-silence-size-bytes\n to set them accordingly.\n * Muted alerts now show whether they are suppressed or not in\n both the /api/v2/alerts endpoint and the Alertmanager UI.\n- Upgrade to version 0.27.0:\n * API: Removal of all api/v1/ endpoints. These endpoints\n now log and return a deprecation message and respond with a\n status code of 410.\n * UTF-8 Support: Introduction of support for any UTF-8\n character as part of label names and matchers.\n * Discord Integration: Enforce max length in message.\n * Metrics: Introduced the experimental feature flag\n --enable-feature=receiver-name-in-metrics to include the\n receiver name.\n * Metrics: Introduced a new gauge named\n alertmanager_inhibition_rules that counts the number of\n configured inhibition rules.\n * Metrics: Introduced a new counter named\n alertmanager_alerts_supressed_total that tracks muted alerts,\n it contains a reason label to indicate the source of the mute.\n * Discord Integration: Introduced support for webhook_url_file.\n * Microsoft Teams Integration: Introduced support for\n webhook_url_file.\n * Microsoft Teams Integration: Add support for summary.\n * Metrics: Notification metrics now support two new values for\n the label reason, contextCanceled and contextDeadlineExceeded.\n * Email Integration: Contents of auth_password_file are now\n trimmed of prefixed and suffixed whitespace.\n * amtool: Fixes the error scheme required for webhook url when\n using amtool with --alertmanager.url.\n * Mixin: Fix AlertmanagerFailedToSendAlerts,\n AlertmanagerClusterFailedToSendAlerts, and\n AlertmanagerClusterFailedToSendAlerts to make sure they ignore\n the reason label.\n\ngrafana:\n\n- Update to version 11.5.7:\n * Security:\n CVE-2025-6023: Fix cross-site-scripting via scripted dashboards\n (bsc#1246735)\n CVE-2025-6197: Fix open redirect in organization switching\n (bsc#1246736)\n * Bug fixes:\n Azure: Fix legend formatting.\n Azure: Fix resource name determination in template variable\n queries.\n- Update to version 11.5.6:\n CVE-2025-3415: Fix exposure of DingDing alerting integration\n URL to Viewer level users (bsc#1245302)\n\nmgr-push:\n\n- Version 5.1.4-0\n * Use absolute paths when invoking external commands\n * Fix syntax error in changelog\n\npython-defusedxml:\n\n- Update to 0.6.0\n * Increase test coverage.\n * Add badges to README.\n * Test on Python 3.7 stable and 3.8-dev\n * Drop support for Python 3.4\n * No longer pass *html* argument to XMLParse. It has been deprecated and\n ignored for a long time. The DefusedXMLParser still takes a html argument.\n A deprecation warning is issued when the argument is False and a TypeError\n when it\u0027s True.\n * defusedxml now fails early when pyexpat stdlib module is not available or\n broken.\n * defusedxml.ElementTree.__all__ now lists ParseError as public attribute.\n * The defusedxml.ElementTree and defusedxml.cElementTree modules had a typo\n and used XMLParse instead of XMLParser as an alias for DefusedXMLParser.\n Both the old and fixed name are now available.\n- Remove superfluous devel dependency for noarch package\n- Fix source url.\n- Update to 5.0\n * Add compatibility with Python 3.6\n * Drop support for Python 2.6, 3.1, 3.2, 3.3\n * Fix lxml tests (XMLSyntaxError: Detected an entity reference loop)\n- Implement single-spec version.\n- Dummy changelog for bsc#1019074, FATE#322329\n- Initial packaging.\n\nrhnlib:\n\n- Version 5.1.3-0\n * Fix syntax error in changelog\n * Use more secure defusedxml parser (bsc#1227577)\n\nspacecmd:\n\n- Version 5.1.11-0\n * Make spacecmd work with Python 3.12 and higher\n * Call print statements properly in Python 3\n- Version 5.1.10-0\n * Fix use of renamed config parser class where the backward\n compatible alias was dropped in latest python version\n (bsc#1246586)\n- Version 5.1.9-0\n * Fix installation of python lib files on Ubuntu 24.04\n\nspacewalk-client-tools:\n\n- Version 5.1.7-0\n * Fix syntax error in changelog\n\nsupportutils-plugin-susemanager-client:\n\n- Version 5.1.4-0\n * Fix syntax error in changelog\n\nuyuni-tools:\n\n- version 5.1.20-0\n * Add migration for server monitoring configuration (bsc#1247688)\n\n- version 5.1.19-0\n * Add a lowercase version of --logLevel (bsc#1243611)\n * Stop executing scripts in temporary folder (bsc#1243704)\n * support config: collect podman inspect for hub container\n (bsc#1245099)\n * Use new dedicated path for Cobbler settings (bsc#1244027)\n * Migrate custom auto installation snippets (bsc#1246320)\n * Add SUSE Linux Enterprise 15 SP7 to buildin productmap\n * Fix loading product map from mgradm configuration file\n (bsc#1246068)\n * Fix channel override for distro copy\n * Do not use sudo when running as a root user (bsc#1246882)\n * Do not require backups to be at the same location for restoring\n (bsc#1246906)\n * Fix recomputing proxy images when installing a PTF or TEST\n (bsc#1246553)\n * Add mgradm server rename to change the server FQDN (bsc#1229825)\n * If no DB SSL CA parameter is given, use the other one\n (bsc#1245120)\n * More fault tolerant mgradm stop (bsc#1243331)\n * Backup systemd dropin directory too and create if missing\n * Add 3rd party SSL options for upgrade and migration scenarios\n * Do not consider stderr output of podman as an error\n (bsc#1247836)\n * Restore SELinux contexts for restored backup volumes\n (bsc#1244127)\n * Automatically get up-to-date systemid file on salt based proxy\n hosts (bsc#1246789)\n * Bump the default image tag to 5.1.1\n\n- version 5.1.18-0\n * Update translation strings\n\n- version 5.1.17-0\n * upgrade saline should use scale function (bsc#1246864)\n\n- version 5.1.16-0\n * Use database backup volume as temporary backup location\n (bsc#1246628)\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-3817,SUSE-MultiLinuxManagerTools-SLE-12-2025-3817",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_3817-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:3817-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253817-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:3817-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023071.html"
},
{
"category": "self",
"summary": "SUSE Bug 1019074",
"url": "https://bugzilla.suse.com/1019074"
},
{
"category": "self",
"summary": "SUSE Bug 1227577",
"url": "https://bugzilla.suse.com/1227577"
},
{
"category": "self",
"summary": "SUSE Bug 1229825",
"url": "https://bugzilla.suse.com/1229825"
},
{
"category": "self",
"summary": "SUSE Bug 1243331",
"url": "https://bugzilla.suse.com/1243331"
},
{
"category": "self",
"summary": "SUSE Bug 1243611",
"url": "https://bugzilla.suse.com/1243611"
},
{
"category": "self",
"summary": "SUSE Bug 1243704",
"url": "https://bugzilla.suse.com/1243704"
},
{
"category": "self",
"summary": "SUSE Bug 1244027",
"url": "https://bugzilla.suse.com/1244027"
},
{
"category": "self",
"summary": "SUSE Bug 1244127",
"url": "https://bugzilla.suse.com/1244127"
},
{
"category": "self",
"summary": "SUSE Bug 1245099",
"url": "https://bugzilla.suse.com/1245099"
},
{
"category": "self",
"summary": "SUSE Bug 1245120",
"url": "https://bugzilla.suse.com/1245120"
},
{
"category": "self",
"summary": "SUSE Bug 1245302",
"url": "https://bugzilla.suse.com/1245302"
},
{
"category": "self",
"summary": "SUSE Bug 1246068",
"url": "https://bugzilla.suse.com/1246068"
},
{
"category": "self",
"summary": "SUSE Bug 1246320",
"url": "https://bugzilla.suse.com/1246320"
},
{
"category": "self",
"summary": "SUSE Bug 1246553",
"url": "https://bugzilla.suse.com/1246553"
},
{
"category": "self",
"summary": "SUSE Bug 1246586",
"url": "https://bugzilla.suse.com/1246586"
},
{
"category": "self",
"summary": "SUSE Bug 1246628",
"url": "https://bugzilla.suse.com/1246628"
},
{
"category": "self",
"summary": "SUSE Bug 1246735",
"url": "https://bugzilla.suse.com/1246735"
},
{
"category": "self",
"summary": "SUSE Bug 1246736",
"url": "https://bugzilla.suse.com/1246736"
},
{
"category": "self",
"summary": "SUSE Bug 1246789",
"url": "https://bugzilla.suse.com/1246789"
},
{
"category": "self",
"summary": "SUSE Bug 1246864",
"url": "https://bugzilla.suse.com/1246864"
},
{
"category": "self",
"summary": "SUSE Bug 1246882",
"url": "https://bugzilla.suse.com/1246882"
},
{
"category": "self",
"summary": "SUSE Bug 1246906",
"url": "https://bugzilla.suse.com/1246906"
},
{
"category": "self",
"summary": "SUSE Bug 1247688",
"url": "https://bugzilla.suse.com/1247688"
},
{
"category": "self",
"summary": "SUSE Bug 1247748",
"url": "https://bugzilla.suse.com/1247748"
},
{
"category": "self",
"summary": "SUSE Bug 1247836",
"url": "https://bugzilla.suse.com/1247836"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-3415 page",
"url": "https://www.suse.com/security/cve/CVE-2025-3415/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47908 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47908/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6023 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6023/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6197/"
}
],
"title": "Security update 5.1.1 for Multi-Linux Manager Client Tools",
"tracking": {
"current_release_date": "2025-10-28T07:19:09Z",
"generator": {
"date": "2025-10-28T07:19:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:3817-1",
"initial_release_date": "2025-10-28T07:19:09Z",
"revision_history": [
{
"date": "2025-10-28T07:19:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"product": {
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"product_id": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"product": {
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"product_id": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "grafana-11.5.7-120002.4.3.2.aarch64",
"product": {
"name": "grafana-11.5.7-120002.4.3.2.aarch64",
"product_id": "grafana-11.5.7-120002.4.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "mgrctl-5.1.20-120002.3.3.2.aarch64",
"product": {
"name": "mgrctl-5.1.20-120002.3.3.2.aarch64",
"product_id": "mgrctl-5.1.20-120002.3.3.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "mgr-push-5.1.4-120002.3.3.3.noarch",
"product": {
"name": "mgr-push-5.1.4-120002.3.3.3.noarch",
"product_id": "mgr-push-5.1.4-120002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "mgrctl-bash-completion-5.1.20-120002.3.3.2.noarch",
"product": {
"name": "mgrctl-bash-completion-5.1.20-120002.3.3.2.noarch",
"product_id": "mgrctl-bash-completion-5.1.20-120002.3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "mgrctl-lang-5.1.20-120002.3.3.2.noarch",
"product": {
"name": "mgrctl-lang-5.1.20-120002.3.3.2.noarch",
"product_id": "mgrctl-lang-5.1.20-120002.3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "mgrctl-zsh-completion-5.1.20-120002.3.3.2.noarch",
"product": {
"name": "mgrctl-zsh-completion-5.1.20-120002.3.3.2.noarch",
"product_id": "mgrctl-zsh-completion-5.1.20-120002.3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "python-defusedxml-0.6.0-120002.1.3.1.noarch",
"product": {
"name": "python-defusedxml-0.6.0-120002.1.3.1.noarch",
"product_id": "python-defusedxml-0.6.0-120002.1.3.1.noarch"
}
},
{
"category": "product_version",
"name": "python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"product": {
"name": "python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"product_id": "python2-mgr-push-5.1.4-120002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"product": {
"name": "python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"product_id": "python2-rhnlib-5.1.3-120002.3.3.1.noarch"
}
},
{
"category": "product_version",
"name": "python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"product": {
"name": "python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"product_id": "python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "python3-defusedxml-0.6.0-120002.1.3.1.noarch",
"product": {
"name": "python3-defusedxml-0.6.0-120002.1.3.1.noarch",
"product_id": "python3-defusedxml-0.6.0-120002.1.3.1.noarch"
}
},
{
"category": "product_version",
"name": "spacecmd-5.1.11-120002.3.3.2.noarch",
"product": {
"name": "spacecmd-5.1.11-120002.3.3.2.noarch",
"product_id": "spacecmd-5.1.11-120002.3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"product": {
"name": "spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"product_id": "spacewalk-client-tools-5.1.7-120002.3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch",
"product": {
"name": "supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch",
"product_id": "supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"product": {
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"product_id": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"product": {
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"product_id": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "grafana-11.5.7-120002.4.3.2.ppc64le",
"product": {
"name": "grafana-11.5.7-120002.4.3.2.ppc64le",
"product_id": "grafana-11.5.7-120002.4.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "mgrctl-5.1.20-120002.3.3.2.ppc64le",
"product": {
"name": "mgrctl-5.1.20-120002.3.3.2.ppc64le",
"product_id": "mgrctl-5.1.20-120002.3.3.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"product": {
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"product_id": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x"
}
},
{
"category": "product_version",
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"product": {
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"product_id": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x"
}
},
{
"category": "product_version",
"name": "grafana-11.5.7-120002.4.3.2.s390x",
"product": {
"name": "grafana-11.5.7-120002.4.3.2.s390x",
"product_id": "grafana-11.5.7-120002.4.3.2.s390x"
}
},
{
"category": "product_version",
"name": "mgrctl-5.1.20-120002.3.3.2.s390x",
"product": {
"name": "mgrctl-5.1.20-120002.3.3.2.s390x",
"product_id": "mgrctl-5.1.20-120002.3.3.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"product": {
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"product_id": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"product": {
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"product_id": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "grafana-11.5.7-120002.4.3.2.x86_64",
"product": {
"name": "grafana-11.5.7-120002.4.3.2.x86_64",
"product_id": "grafana-11.5.7-120002.4.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "mgrctl-5.1.20-120002.3.3.2.x86_64",
"product": {
"name": "mgrctl-5.1.20-120002.3.3.2.x86_64",
"product_id": "mgrctl-5.1.20-120002.3.3.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Multi Linux Manager Tools SLE-12",
"product": {
"name": "SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64 as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64"
},
"product_reference": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le"
},
"product_reference": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x"
},
"product_reference": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64 as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64"
},
"product_reference": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64 as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64"
},
"product_reference": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le"
},
"product_reference": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x"
},
"product_reference": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64 as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64"
},
"product_reference": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64 as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64 as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.7-120002.4.3.2.aarch64 as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64"
},
"product_reference": "grafana-11.5.7-120002.4.3.2.aarch64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.7-120002.4.3.2.ppc64le as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le"
},
"product_reference": "grafana-11.5.7-120002.4.3.2.ppc64le",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.7-120002.4.3.2.s390x as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x"
},
"product_reference": "grafana-11.5.7-120002.4.3.2.s390x",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.7-120002.4.3.2.x86_64 as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64"
},
"product_reference": "grafana-11.5.7-120002.4.3.2.x86_64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgr-push-5.1.4-120002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch"
},
"product_reference": "mgr-push-5.1.4-120002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-defusedxml-0.6.0-120002.1.3.1.noarch as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch"
},
"product_reference": "python-defusedxml-0.6.0-120002.1.3.1.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-mgr-push-5.1.4-120002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch"
},
"product_reference": "python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-rhnlib-5.1.3-120002.3.3.1.noarch as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch"
},
"product_reference": "python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch"
},
"product_reference": "python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacecmd-5.1.11-120002.3.3.2.noarch as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch"
},
"product_reference": "spacecmd-5.1.11-120002.3.3.2.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-client-tools-5.1.7-120002.3.3.2.noarch as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch"
},
"product_reference": "spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
},
"product_reference": "supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-3415",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-3415"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. The Grafana Alerting DingDing integration was not properly protected and could be exposed to users with Viewer permission. \nFixed in versions 10.4.19+security-01, 11.2.10+security-01, 11.3.7+security-01, 11.4.5+security-01, 11.5.5+security-01, 11.6.2+security-01 and 12.0.1+security-01",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-3415",
"url": "https://www.suse.com/security/cve/CVE-2025-3415"
},
{
"category": "external",
"summary": "SUSE Bug 1245302 for CVE-2025-3415",
"url": "https://bugzilla.suse.com/1245302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-28T07:19:09Z",
"details": "moderate"
}
],
"title": "CVE-2025-3415"
},
{
"cve": "CVE-2025-47908",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47908"
}
],
"notes": [
{
"category": "general",
"text": "Middleware causes a prohibitive amount of heap allocations when processing malicious preflight requests that include a Access-Control-Request-Headers (ACRH) header whose value contains many commas. This behavior can be abused by attackers to produce undue load on the middleware/server as an attempt to cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47908",
"url": "https://www.suse.com/security/cve/CVE-2025-47908"
},
{
"category": "external",
"summary": "SUSE Bug 1247746 for CVE-2025-47908",
"url": "https://bugzilla.suse.com/1247746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-28T07:19:09Z",
"details": "moderate"
}
],
"title": "CVE-2025-47908"
},
{
"cve": "CVE-2025-6023",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6023"
}
],
"notes": [
{
"category": "general",
"text": "An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.\n\nThe open redirect can be chained with path traversal vulnerabilities to achieve XSS.\n\nFixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6023",
"url": "https://www.suse.com/security/cve/CVE-2025-6023"
},
{
"category": "external",
"summary": "SUSE Bug 1246735 for CVE-2025-6023",
"url": "https://bugzilla.suse.com/1246735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-28T07:19:09Z",
"details": "important"
}
],
"title": "CVE-2025-6023"
},
{
"cve": "CVE-2025-6197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6197"
}
],
"notes": [
{
"category": "general",
"text": "An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.\n\n\nPrerequisites for exploitation:\n\n- Multiple organizations must exist in the Grafana instance\n\n- Victim must be on a different organization than the one specified in the URL",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6197",
"url": "https://www.suse.com/security/cve/CVE-2025-6197"
},
{
"category": "external",
"summary": "SUSE Bug 1246736 for CVE-2025-6197",
"url": "https://bugzilla.suse.com/1246736"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-28T07:19:09Z",
"details": "moderate"
}
],
"title": "CVE-2025-6197"
}
]
}
suse-su-2025:4458-1
Vulnerability from csaf_suse
Published
2025-12-18 11:57
Modified
2025-12-18 11:57
Summary
Security update 5.0.6 for Multi-Linux Manager Client Tools
Notes
Title of the patch
Security update 5.0.6 for Multi-Linux Manager Client Tools
Description of the patch
This update fixes the following issues:
dracut-saltboot:
- Update to version 1.0.0
* Reboot on salt key timeout (bsc#1237495)
* Fixed parsing files with space in the name (bsc#1252100)
grafana was updated from version 11.5.5 to 11.5.10:
- Security issues fixed:
* CVE-2025-47911: Fix parsing HTML documents (bsc#1251454)
* CVE-2025-58190: Fix excessive memory consumption (bsc#1251657)
* CVE-2025-64751: Drop experimental implementation of authorization Zanzana server/client
(bsc#1254113)
* CVE-2025-11065: Fixed sensitive information leak in logs (version 11.5.9) (bsc#1250616)
* CVE-2025-6023: Fixed cross-site-scripting via scripted dashboards (version 11.5.7) (bsc#1246735)
* CVE-2025-6197: Fixed open redirect in organization switching (version 11.5.7) (bsc#1246736)
* CVE-2025-3415: Fixed exposure of DingDing alerting integration URL to Viewer level users (version 11.5.6)
(bsc#1245302)
- Other changes, new features and bugs fixed:
* Version 11.5.10:
+ Update to Go 1.25
+ Update to golang.org/x/net v0.45.0
+ Auth: Fix render user OAuth passthrough
+ LDAP Authentication: Fix URL to propagate username context as parameter
* Version 11.5.9:
+ Auditing: Document new options for recording datasource query request/response body.
+ Login: Fixed redirection after login when Grafana is served from subpath.
* Version 11.5.7:
+ Azure: Fixed legend formatting and resource name determination in template variable queries.
mgr-push:
- Version 5.0.3-0
* Fixed syntax error in changelog
rhnlib:
- Version 5.0.6-0
* Use more secure defusedxml parser (bsc#1227577)
spacecmd:
- Version 5.0.14-0
* Fixed installation of python lib files on Ubuntu 24.04 (bsc#1246586)
* Use JSON instead of pickle for spacecmd cache (bsc#1227579)
* Make spacecmd to work with Python 3.12 and higher
* Call print statements properly in Python 3
uyuni-tools:
- Version 0.1.37-0
* Handle CA files with symlinks during migration (bsc#1251044)
* Add a lowercase version of --logLevel (bsc#1243611)
* Adjust traefik exposed configuration for chart v27+ (bsc#1247721)
* Stop executing scripts in temporary folder (bsc#1243704)
* Convert the traefik install time to local time (bsc#1251138)
* Run smdba and reindex only during migration (bsc#1244534)
* Support config: collect podman inspect for hub container (bsc#1245099)
* Add --registry-host, --registry-user and --registry-password to pull images from an authenticate registry
* Deprecate --registry
* Use new dedicated path for Cobbler settings (bsc#1244027)
* Migrate custom auto installation snippets (bsc#1246320)
* Add SLE15SP7 to buildin productmap
* Fix loading product map from mgradm configuration file (bsc#1246068)
* Fix channel override for distro copy
* Do not use sudo when running as a root user (bsc#1246882)
* Do not require backups to be at the same location for restoring (bsc#1246906)
* Check for restorecon presence before calling (bsc#1246925)
* Automatically get up-to-date systemid file on salt based proxy hosts (bsc#1246789)
* Fix recomputing proxy images when installing a ptf or test (bsc#1246553)
* Add migration for server monitoring configuration (bsc#1247688)
- Version 0.1.36-0
* Bump the default image tag
- Version 0.1.35-0
* Restore SELinux contexts for restored backup volumes (bsc#1244127)
- Version 0.1.34-0
* Fix mgradm backup create handling of images and systemd files (bsc#1246738)
- Version 0.1.33-0
* Restore volumes using tar instead of podman import (bsc#1244127)
Patchnames
SUSE-2025-4458,SUSE-SLE-Manager-Tools-15-2025-4458,SUSE-SLE-Manager-Tools-For-Micro-5-2025-4458,openSUSE-SLE-15.6-2025-4458
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update 5.0.6 for Multi-Linux Manager Client Tools",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update fixes the following issues:\n\ndracut-saltboot:\n\n- Update to version 1.0.0\n * Reboot on salt key timeout (bsc#1237495)\n * Fixed parsing files with space in the name (bsc#1252100)\n\ngrafana was updated from version 11.5.5 to 11.5.10:\n\n- Security issues fixed:\n\n * CVE-2025-47911: Fix parsing HTML documents (bsc#1251454)\n * CVE-2025-58190: Fix excessive memory consumption (bsc#1251657)\n * CVE-2025-64751: Drop experimental implementation of authorization Zanzana server/client\n (bsc#1254113)\n * CVE-2025-11065: Fixed sensitive information leak in logs (version 11.5.9) (bsc#1250616)\n * CVE-2025-6023: Fixed cross-site-scripting via scripted dashboards (version 11.5.7) (bsc#1246735)\n * CVE-2025-6197: Fixed open redirect in organization switching (version 11.5.7) (bsc#1246736)\n * CVE-2025-3415: Fixed exposure of DingDing alerting integration URL to Viewer level users (version 11.5.6)\n (bsc#1245302)\n\n- Other changes, new features and bugs fixed:\n \n * Version 11.5.10:\n + Update to Go 1.25\n + Update to golang.org/x/net v0.45.0\n + Auth: Fix render user OAuth passthrough\n + LDAP Authentication: Fix URL to propagate username context as parameter\n\n * Version 11.5.9:\n + Auditing: Document new options for recording datasource query request/response body.\n + Login: Fixed redirection after login when Grafana is served from subpath.\n\n * Version 11.5.7:\n + Azure: Fixed legend formatting and resource name determination in template variable queries.\n\nmgr-push:\n\n- Version 5.0.3-0\n * Fixed syntax error in changelog\n\nrhnlib:\n\n- Version 5.0.6-0\n * Use more secure defusedxml parser (bsc#1227577)\n\nspacecmd:\n\n- Version 5.0.14-0\n * Fixed installation of python lib files on Ubuntu 24.04 (bsc#1246586)\n * Use JSON instead of pickle for spacecmd cache (bsc#1227579)\n * Make spacecmd to work with Python 3.12 and higher\n * Call print statements properly in Python 3\n\nuyuni-tools:\n\n- Version 0.1.37-0\n * Handle CA files with symlinks during migration (bsc#1251044)\n * Add a lowercase version of --logLevel (bsc#1243611)\n * Adjust traefik exposed configuration for chart v27+ (bsc#1247721)\n * Stop executing scripts in temporary folder (bsc#1243704)\n * Convert the traefik install time to local time (bsc#1251138)\n * Run smdba and reindex only during migration (bsc#1244534)\n * Support config: collect podman inspect for hub container (bsc#1245099)\n * Add --registry-host, --registry-user and --registry-password to pull images from an authenticate registry\n * Deprecate --registry\n * Use new dedicated path for Cobbler settings (bsc#1244027)\n * Migrate custom auto installation snippets (bsc#1246320)\n * Add SLE15SP7 to buildin productmap\n * Fix loading product map from mgradm configuration file (bsc#1246068)\n * Fix channel override for distro copy\n * Do not use sudo when running as a root user (bsc#1246882)\n * Do not require backups to be at the same location for restoring (bsc#1246906)\n * Check for restorecon presence before calling (bsc#1246925)\n * Automatically get up-to-date systemid file on salt based proxy hosts (bsc#1246789)\n * Fix recomputing proxy images when installing a ptf or test (bsc#1246553)\n * Add migration for server monitoring configuration (bsc#1247688)\n- Version 0.1.36-0\n * Bump the default image tag\n- Version 0.1.35-0\n * Restore SELinux contexts for restored backup volumes (bsc#1244127)\n- Version 0.1.34-0\n * Fix mgradm backup create handling of images and systemd files (bsc#1246738)\n- Version 0.1.33-0\n * Restore volumes using tar instead of podman import (bsc#1244127)\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4458,SUSE-SLE-Manager-Tools-15-2025-4458,SUSE-SLE-Manager-Tools-For-Micro-5-2025-4458,openSUSE-SLE-15.6-2025-4458",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4458-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4458-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254458-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4458-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023628.html"
},
{
"category": "self",
"summary": "SUSE Bug 1227577",
"url": "https://bugzilla.suse.com/1227577"
},
{
"category": "self",
"summary": "SUSE Bug 1227579",
"url": "https://bugzilla.suse.com/1227579"
},
{
"category": "self",
"summary": "SUSE Bug 1237495",
"url": "https://bugzilla.suse.com/1237495"
},
{
"category": "self",
"summary": "SUSE Bug 1243611",
"url": "https://bugzilla.suse.com/1243611"
},
{
"category": "self",
"summary": "SUSE Bug 1243704",
"url": "https://bugzilla.suse.com/1243704"
},
{
"category": "self",
"summary": "SUSE Bug 1244027",
"url": "https://bugzilla.suse.com/1244027"
},
{
"category": "self",
"summary": "SUSE Bug 1244127",
"url": "https://bugzilla.suse.com/1244127"
},
{
"category": "self",
"summary": "SUSE Bug 1244534",
"url": "https://bugzilla.suse.com/1244534"
},
{
"category": "self",
"summary": "SUSE Bug 1245099",
"url": "https://bugzilla.suse.com/1245099"
},
{
"category": "self",
"summary": "SUSE Bug 1245302",
"url": "https://bugzilla.suse.com/1245302"
},
{
"category": "self",
"summary": "SUSE Bug 1246068",
"url": "https://bugzilla.suse.com/1246068"
},
{
"category": "self",
"summary": "SUSE Bug 1246320",
"url": "https://bugzilla.suse.com/1246320"
},
{
"category": "self",
"summary": "SUSE Bug 1246553",
"url": "https://bugzilla.suse.com/1246553"
},
{
"category": "self",
"summary": "SUSE Bug 1246586",
"url": "https://bugzilla.suse.com/1246586"
},
{
"category": "self",
"summary": "SUSE Bug 1246662",
"url": "https://bugzilla.suse.com/1246662"
},
{
"category": "self",
"summary": "SUSE Bug 1246735",
"url": "https://bugzilla.suse.com/1246735"
},
{
"category": "self",
"summary": "SUSE Bug 1246736",
"url": "https://bugzilla.suse.com/1246736"
},
{
"category": "self",
"summary": "SUSE Bug 1246738",
"url": "https://bugzilla.suse.com/1246738"
},
{
"category": "self",
"summary": "SUSE Bug 1246789",
"url": "https://bugzilla.suse.com/1246789"
},
{
"category": "self",
"summary": "SUSE Bug 1246882",
"url": "https://bugzilla.suse.com/1246882"
},
{
"category": "self",
"summary": "SUSE Bug 1246906",
"url": "https://bugzilla.suse.com/1246906"
},
{
"category": "self",
"summary": "SUSE Bug 1246925",
"url": "https://bugzilla.suse.com/1246925"
},
{
"category": "self",
"summary": "SUSE Bug 1247688",
"url": "https://bugzilla.suse.com/1247688"
},
{
"category": "self",
"summary": "SUSE Bug 1247721",
"url": "https://bugzilla.suse.com/1247721"
},
{
"category": "self",
"summary": "SUSE Bug 1250616",
"url": "https://bugzilla.suse.com/1250616"
},
{
"category": "self",
"summary": "SUSE Bug 1251044",
"url": "https://bugzilla.suse.com/1251044"
},
{
"category": "self",
"summary": "SUSE Bug 1251138",
"url": "https://bugzilla.suse.com/1251138"
},
{
"category": "self",
"summary": "SUSE Bug 1252100",
"url": "https://bugzilla.suse.com/1252100"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-11065 page",
"url": "https://www.suse.com/security/cve/CVE-2025-11065/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-3415 page",
"url": "https://www.suse.com/security/cve/CVE-2025-3415/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6023 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6023/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6197/"
}
],
"title": "Security update 5.0.6 for Multi-Linux Manager Client Tools",
"tracking": {
"current_release_date": "2025-12-18T11:57:30Z",
"generator": {
"date": "2025-12-18T11:57:30Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4458-1",
"initial_release_date": "2025-12-18T11:57:30Z",
"revision_history": [
{
"date": "2025-12-18T11:57:30Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-150000.9.1.aarch64",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150000.9.1.aarch64",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-150000.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "grafana-11.5.10-150000.1.87.1.aarch64",
"product": {
"name": "grafana-11.5.10-150000.1.87.1.aarch64",
"product_id": "grafana-11.5.10-150000.1.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "mgrctl-0.1.37-150000.1.27.1.aarch64",
"product": {
"name": "mgrctl-0.1.37-150000.1.27.1.aarch64",
"product_id": "mgrctl-0.1.37-150000.1.27.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-150000.9.1.i586",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150000.9.1.i586",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-150000.9.1.i586"
}
},
{
"category": "product_version",
"name": "mgrctl-0.1.37-150000.1.27.1.i586",
"product": {
"name": "mgrctl-0.1.37-150000.1.27.1.i586",
"product_id": "mgrctl-0.1.37-150000.1.27.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"product": {
"name": "dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"product_id": "dracut-saltboot-1.0.0-150000.1.62.1.noarch"
}
},
{
"category": "product_version",
"name": "mgr-push-5.0.3-150000.1.30.1.noarch",
"product": {
"name": "mgr-push-5.0.3-150000.1.30.1.noarch",
"product_id": "mgr-push-5.0.3-150000.1.30.1.noarch"
}
},
{
"category": "product_version",
"name": "mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"product": {
"name": "mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"product_id": "mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch"
}
},
{
"category": "product_version",
"name": "mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"product": {
"name": "mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"product_id": "mgrctl-lang-0.1.37-150000.1.27.1.noarch"
}
},
{
"category": "product_version",
"name": "mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"product": {
"name": "mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"product_id": "mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-mgr-push-5.0.3-150000.1.30.1.noarch",
"product": {
"name": "python3-mgr-push-5.0.3-150000.1.30.1.noarch",
"product_id": "python3-mgr-push-5.0.3-150000.1.30.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-rhnlib-5.0.6-150000.3.49.1.noarch",
"product": {
"name": "python3-rhnlib-5.0.6-150000.3.49.1.noarch",
"product_id": "python3-rhnlib-5.0.6-150000.3.49.1.noarch"
}
},
{
"category": "product_version",
"name": "spacecmd-5.0.14-150000.3.139.1.noarch",
"product": {
"name": "spacecmd-5.0.14-150000.3.139.1.noarch",
"product_id": "spacecmd-5.0.14-150000.3.139.1.noarch"
}
},
{
"category": "product_version",
"name": "supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch",
"product": {
"name": "supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch",
"product_id": "supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-150000.9.1.ppc64le",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150000.9.1.ppc64le",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-150000.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "grafana-11.5.10-150000.1.87.1.ppc64le",
"product": {
"name": "grafana-11.5.10-150000.1.87.1.ppc64le",
"product_id": "grafana-11.5.10-150000.1.87.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mgrctl-0.1.37-150000.1.27.1.ppc64le",
"product": {
"name": "mgrctl-0.1.37-150000.1.27.1.ppc64le",
"product_id": "mgrctl-0.1.37-150000.1.27.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-150000.9.1.s390x",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150000.9.1.s390x",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-150000.9.1.s390x"
}
},
{
"category": "product_version",
"name": "grafana-11.5.10-150000.1.87.1.s390x",
"product": {
"name": "grafana-11.5.10-150000.1.87.1.s390x",
"product_id": "grafana-11.5.10-150000.1.87.1.s390x"
}
},
{
"category": "product_version",
"name": "mgrctl-0.1.37-150000.1.27.1.s390x",
"product": {
"name": "mgrctl-0.1.37-150000.1.27.1.s390x",
"product_id": "mgrctl-0.1.37-150000.1.27.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-150000.9.1.x86_64",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150000.9.1.x86_64",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-150000.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "grafana-11.5.10-150000.1.87.1.x86_64",
"product": {
"name": "grafana-11.5.10-150000.1.87.1.x86_64",
"product_id": "grafana-11.5.10-150000.1.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "mgrctl-0.1.37-150000.1.27.1.x86_64",
"product": {
"name": "mgrctl-0.1.37-150000.1.27.1.x86_64",
"product_id": "mgrctl-0.1.37-150000.1.27.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Manager Client Tools 15",
"product": {
"name": "SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15"
}
},
{
"category": "product_name",
"name": "SUSE Manager Client Tools for SLE Micro 5",
"product": {
"name": "SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-manager-tools-micro:5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-saltboot-1.0.0-150000.1.62.1.noarch as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:dracut-saltboot-1.0.0-150000.1.62.1.noarch"
},
"product_reference": "dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.10-150000.1.87.1.aarch64 as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.aarch64"
},
"product_reference": "grafana-11.5.10-150000.1.87.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.10-150000.1.87.1.ppc64le as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.ppc64le"
},
"product_reference": "grafana-11.5.10-150000.1.87.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.10-150000.1.87.1.s390x as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.s390x"
},
"product_reference": "grafana-11.5.10-150000.1.87.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.10-150000.1.87.1.x86_64 as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.x86_64"
},
"product_reference": "grafana-11.5.10-150000.1.87.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgr-push-5.0.3-150000.1.30.1.noarch as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:mgr-push-5.0.3-150000.1.30.1.noarch"
},
"product_reference": "mgr-push-5.0.3-150000.1.30.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-0.1.37-150000.1.27.1.aarch64 as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.aarch64"
},
"product_reference": "mgrctl-0.1.37-150000.1.27.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-0.1.37-150000.1.27.1.ppc64le as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.ppc64le"
},
"product_reference": "mgrctl-0.1.37-150000.1.27.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-0.1.37-150000.1.27.1.s390x as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.s390x"
},
"product_reference": "mgrctl-0.1.37-150000.1.27.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-0.1.37-150000.1.27.1.x86_64 as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.x86_64"
},
"product_reference": "mgrctl-0.1.37-150000.1.27.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch"
},
"product_reference": "mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-lang-0.1.37-150000.1.27.1.noarch as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:mgrctl-lang-0.1.37-150000.1.27.1.noarch"
},
"product_reference": "mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch"
},
"product_reference": "mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-mgr-push-5.0.3-150000.1.30.1.noarch as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:python3-mgr-push-5.0.3-150000.1.30.1.noarch"
},
"product_reference": "python3-mgr-push-5.0.3-150000.1.30.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rhnlib-5.0.6-150000.3.49.1.noarch as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:python3-rhnlib-5.0.6-150000.3.49.1.noarch"
},
"product_reference": "python3-rhnlib-5.0.6-150000.3.49.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacecmd-5.0.14-150000.3.139.1.noarch as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:spacecmd-5.0.14-150000.3.139.1.noarch"
},
"product_reference": "spacecmd-5.0.14-150000.3.139.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch as component of SUSE Manager Client Tools 15",
"product_id": "SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch"
},
"product_reference": "supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-saltboot-1.0.0-150000.1.62.1.noarch as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-1.0.0-150000.1.62.1.noarch"
},
"product_reference": "dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-0.1.37-150000.1.27.1.aarch64 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.aarch64"
},
"product_reference": "mgrctl-0.1.37-150000.1.27.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-0.1.37-150000.1.27.1.s390x as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.s390x"
},
"product_reference": "mgrctl-0.1.37-150000.1.27.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-0.1.37-150000.1.27.1.x86_64 as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.x86_64"
},
"product_reference": "mgrctl-0.1.37-150000.1.27.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch"
},
"product_reference": "mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-lang-0.1.37-150000.1.27.1.noarch as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:mgrctl-lang-0.1.37-150000.1.27.1.noarch"
},
"product_reference": "mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch as component of SUSE Manager Client Tools for SLE Micro 5",
"product_id": "SUSE Manager Client Tools for SLE Micro 5:mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch"
},
"product_reference": "mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-saltboot-1.0.0-150000.1.62.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dracut-saltboot-1.0.0-150000.1.62.1.noarch"
},
"product_reference": "dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacecmd-5.0.14-150000.3.139.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:spacecmd-5.0.14-150000.3.139.1.noarch"
},
"product_reference": "spacecmd-5.0.14-150000.3.139.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch"
},
"product_reference": "supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-11065",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-11065"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.aarch64",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.ppc64le",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.s390x",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.x86_64",
"SUSE Manager Client Tools 15:mgr-push-5.0.3-150000.1.30.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.aarch64",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.ppc64le",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.s390x",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.x86_64",
"SUSE Manager Client Tools 15:mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:python3-mgr-push-5.0.3-150000.1.30.1.noarch",
"SUSE Manager Client Tools 15:python3-rhnlib-5.0.6-150000.3.49.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-5.0.14-150000.3.139.1.noarch",
"SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"openSUSE Leap 15.6:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"openSUSE Leap 15.6:spacecmd-5.0.14-150000.3.139.1.noarch",
"openSUSE Leap 15.6:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-11065",
"url": "https://www.suse.com/security/cve/CVE-2025-11065"
},
{
"category": "external",
"summary": "SUSE Bug 1250608 for CVE-2025-11065",
"url": "https://bugzilla.suse.com/1250608"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.aarch64",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.ppc64le",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.s390x",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.x86_64",
"SUSE Manager Client Tools 15:mgr-push-5.0.3-150000.1.30.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.aarch64",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.ppc64le",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.s390x",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.x86_64",
"SUSE Manager Client Tools 15:mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:python3-mgr-push-5.0.3-150000.1.30.1.noarch",
"SUSE Manager Client Tools 15:python3-rhnlib-5.0.6-150000.3.49.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-5.0.14-150000.3.139.1.noarch",
"SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"openSUSE Leap 15.6:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"openSUSE Leap 15.6:spacecmd-5.0.14-150000.3.139.1.noarch",
"openSUSE Leap 15.6:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.aarch64",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.ppc64le",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.s390x",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.x86_64",
"SUSE Manager Client Tools 15:mgr-push-5.0.3-150000.1.30.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.aarch64",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.ppc64le",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.s390x",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.x86_64",
"SUSE Manager Client Tools 15:mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:python3-mgr-push-5.0.3-150000.1.30.1.noarch",
"SUSE Manager Client Tools 15:python3-rhnlib-5.0.6-150000.3.49.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-5.0.14-150000.3.139.1.noarch",
"SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"openSUSE Leap 15.6:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"openSUSE Leap 15.6:spacecmd-5.0.14-150000.3.139.1.noarch",
"openSUSE Leap 15.6:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-18T11:57:30Z",
"details": "moderate"
}
],
"title": "CVE-2025-11065"
},
{
"cve": "CVE-2025-3415",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-3415"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. The Grafana Alerting DingDing integration was not properly protected and could be exposed to users with Viewer permission. \nFixed in versions 10.4.19+security-01, 11.2.10+security-01, 11.3.7+security-01, 11.4.5+security-01, 11.5.5+security-01, 11.6.2+security-01 and 12.0.1+security-01",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.aarch64",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.ppc64le",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.s390x",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.x86_64",
"SUSE Manager Client Tools 15:mgr-push-5.0.3-150000.1.30.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.aarch64",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.ppc64le",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.s390x",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.x86_64",
"SUSE Manager Client Tools 15:mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:python3-mgr-push-5.0.3-150000.1.30.1.noarch",
"SUSE Manager Client Tools 15:python3-rhnlib-5.0.6-150000.3.49.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-5.0.14-150000.3.139.1.noarch",
"SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"openSUSE Leap 15.6:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"openSUSE Leap 15.6:spacecmd-5.0.14-150000.3.139.1.noarch",
"openSUSE Leap 15.6:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-3415",
"url": "https://www.suse.com/security/cve/CVE-2025-3415"
},
{
"category": "external",
"summary": "SUSE Bug 1245302 for CVE-2025-3415",
"url": "https://bugzilla.suse.com/1245302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.aarch64",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.ppc64le",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.s390x",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.x86_64",
"SUSE Manager Client Tools 15:mgr-push-5.0.3-150000.1.30.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.aarch64",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.ppc64le",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.s390x",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.x86_64",
"SUSE Manager Client Tools 15:mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:python3-mgr-push-5.0.3-150000.1.30.1.noarch",
"SUSE Manager Client Tools 15:python3-rhnlib-5.0.6-150000.3.49.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-5.0.14-150000.3.139.1.noarch",
"SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"openSUSE Leap 15.6:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"openSUSE Leap 15.6:spacecmd-5.0.14-150000.3.139.1.noarch",
"openSUSE Leap 15.6:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.aarch64",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.ppc64le",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.s390x",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.x86_64",
"SUSE Manager Client Tools 15:mgr-push-5.0.3-150000.1.30.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.aarch64",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.ppc64le",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.s390x",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.x86_64",
"SUSE Manager Client Tools 15:mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:python3-mgr-push-5.0.3-150000.1.30.1.noarch",
"SUSE Manager Client Tools 15:python3-rhnlib-5.0.6-150000.3.49.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-5.0.14-150000.3.139.1.noarch",
"SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"openSUSE Leap 15.6:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"openSUSE Leap 15.6:spacecmd-5.0.14-150000.3.139.1.noarch",
"openSUSE Leap 15.6:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-18T11:57:30Z",
"details": "moderate"
}
],
"title": "CVE-2025-3415"
},
{
"cve": "CVE-2025-6023",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6023"
}
],
"notes": [
{
"category": "general",
"text": "An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.\n\nThe open redirect can be chained with path traversal vulnerabilities to achieve XSS.\n\nFixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.aarch64",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.ppc64le",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.s390x",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.x86_64",
"SUSE Manager Client Tools 15:mgr-push-5.0.3-150000.1.30.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.aarch64",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.ppc64le",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.s390x",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.x86_64",
"SUSE Manager Client Tools 15:mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:python3-mgr-push-5.0.3-150000.1.30.1.noarch",
"SUSE Manager Client Tools 15:python3-rhnlib-5.0.6-150000.3.49.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-5.0.14-150000.3.139.1.noarch",
"SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"openSUSE Leap 15.6:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"openSUSE Leap 15.6:spacecmd-5.0.14-150000.3.139.1.noarch",
"openSUSE Leap 15.6:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6023",
"url": "https://www.suse.com/security/cve/CVE-2025-6023"
},
{
"category": "external",
"summary": "SUSE Bug 1246735 for CVE-2025-6023",
"url": "https://bugzilla.suse.com/1246735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.aarch64",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.ppc64le",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.s390x",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.x86_64",
"SUSE Manager Client Tools 15:mgr-push-5.0.3-150000.1.30.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.aarch64",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.ppc64le",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.s390x",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.x86_64",
"SUSE Manager Client Tools 15:mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:python3-mgr-push-5.0.3-150000.1.30.1.noarch",
"SUSE Manager Client Tools 15:python3-rhnlib-5.0.6-150000.3.49.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-5.0.14-150000.3.139.1.noarch",
"SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"openSUSE Leap 15.6:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"openSUSE Leap 15.6:spacecmd-5.0.14-150000.3.139.1.noarch",
"openSUSE Leap 15.6:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.aarch64",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.ppc64le",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.s390x",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.x86_64",
"SUSE Manager Client Tools 15:mgr-push-5.0.3-150000.1.30.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.aarch64",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.ppc64le",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.s390x",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.x86_64",
"SUSE Manager Client Tools 15:mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:python3-mgr-push-5.0.3-150000.1.30.1.noarch",
"SUSE Manager Client Tools 15:python3-rhnlib-5.0.6-150000.3.49.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-5.0.14-150000.3.139.1.noarch",
"SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"openSUSE Leap 15.6:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"openSUSE Leap 15.6:spacecmd-5.0.14-150000.3.139.1.noarch",
"openSUSE Leap 15.6:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-18T11:57:30Z",
"details": "important"
}
],
"title": "CVE-2025-6023"
},
{
"cve": "CVE-2025-6197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6197"
}
],
"notes": [
{
"category": "general",
"text": "An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.\n\n\nPrerequisites for exploitation:\n\n- Multiple organizations must exist in the Grafana instance\n\n- Victim must be on a different organization than the one specified in the URL",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 15:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.aarch64",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.ppc64le",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.s390x",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.x86_64",
"SUSE Manager Client Tools 15:mgr-push-5.0.3-150000.1.30.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.aarch64",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.ppc64le",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.s390x",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.x86_64",
"SUSE Manager Client Tools 15:mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:python3-mgr-push-5.0.3-150000.1.30.1.noarch",
"SUSE Manager Client Tools 15:python3-rhnlib-5.0.6-150000.3.49.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-5.0.14-150000.3.139.1.noarch",
"SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"openSUSE Leap 15.6:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"openSUSE Leap 15.6:spacecmd-5.0.14-150000.3.139.1.noarch",
"openSUSE Leap 15.6:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6197",
"url": "https://www.suse.com/security/cve/CVE-2025-6197"
},
{
"category": "external",
"summary": "SUSE Bug 1246736 for CVE-2025-6197",
"url": "https://bugzilla.suse.com/1246736"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 15:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.aarch64",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.ppc64le",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.s390x",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.x86_64",
"SUSE Manager Client Tools 15:mgr-push-5.0.3-150000.1.30.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.aarch64",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.ppc64le",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.s390x",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.x86_64",
"SUSE Manager Client Tools 15:mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:python3-mgr-push-5.0.3-150000.1.30.1.noarch",
"SUSE Manager Client Tools 15:python3-rhnlib-5.0.6-150000.3.49.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-5.0.14-150000.3.139.1.noarch",
"SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"openSUSE Leap 15.6:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"openSUSE Leap 15.6:spacecmd-5.0.14-150000.3.139.1.noarch",
"openSUSE Leap 15.6:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 15:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.aarch64",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.ppc64le",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.s390x",
"SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1.x86_64",
"SUSE Manager Client Tools 15:mgr-push-5.0.3-150000.1.30.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.aarch64",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.ppc64le",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.s390x",
"SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1.x86_64",
"SUSE Manager Client Tools 15:mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools 15:python3-mgr-push-5.0.3-150000.1.30.1.noarch",
"SUSE Manager Client Tools 15:python3-rhnlib-5.0.6-150000.3.49.1.noarch",
"SUSE Manager Client Tools 15:spacecmd-5.0.14-150000.3.139.1.noarch",
"SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.aarch64",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.s390x",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1.x86_64",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-bash-completion-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-lang-0.1.37-150000.1.27.1.noarch",
"SUSE Manager Client Tools for SLE Micro 5:mgrctl-zsh-completion-0.1.37-150000.1.27.1.noarch",
"openSUSE Leap 15.6:dracut-saltboot-1.0.0-150000.1.62.1.noarch",
"openSUSE Leap 15.6:spacecmd-5.0.14-150000.3.139.1.noarch",
"openSUSE Leap 15.6:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-18T11:57:30Z",
"details": "moderate"
}
],
"title": "CVE-2025-6197"
}
]
}
suse-su-2025:4457-1
Vulnerability from csaf_suse
Published
2025-12-18 11:56
Modified
2025-12-18 11:56
Summary
Security update 5.0.6 for Multi-Linux Manager Client Tools
Notes
Title of the patch
Security update 5.0.6 for Multi-Linux Manager Client Tools
Description of the patch
This update fixes the following issues:
golang-github-prometheus-alertmanager:
- Update to version 0.28.1 (jsc#PED-13285):
* Improved performance of inhibition rules when using Equal
labels.
* Improve the documentation on escaping in UTF-8 matchers.
* Update alertmanager_config_hash metric help to document the
hash is not cryptographically strong.
* Fix panic in amtool when using --verbose.
* Fix templating of channel field for Rocket.Chat.
* Fix rocketchat_configs written as rocket_configs in docs.
* Fix usage for --enable-feature flag.
* Trim whitespace from OpsGenie API Key.
* Fix Jira project template not rendered when searching for
existing issues.
* Fix subtle bug in JSON/YAML encoding of inhibition rules that
would cause Equal labels to be omitted.
* Fix header for slack_configs in docs.
* Fix weight and wrap of Microsoft Teams notifications.
- Upgrade to version 0.28.0:
* CVE-2025-47908: Bump github.com/rs/cors (bsc#1247748).
* Templating errors in the SNS integration now return an error.
* Adopt log/slog, drop go-kit/log.
* Add a new Microsoft Teams integration based on Flows.
* Add a new Rocket.Chat integration.
* Add a new Jira integration.
* Add support for GOMEMLIMIT, enable it via the feature flag
--enable-feature=auto-gomemlimit.
* Add support for GOMAXPROCS, enable it via the feature flag
--enable-feature=auto-gomaxprocs.
* Add support for limits of silences including the maximum number
of active and pending silences, and the maximum size per
silence (in bytes). You can use the flags
--silences.max-silences and --silences.max-silence-size-bytes
to set them accordingly.
* Muted alerts now show whether they are suppressed or not in
both the /api/v2/alerts endpoint and the Alertmanager UI.
- Upgrade to version 0.27.0:
* API: Removal of all api/v1/ endpoints. These endpoints
now log and return a deprecation message and respond with a
status code of 410.
* UTF-8 Support: Introduction of support for any UTF-8
character as part of label names and matchers.
* Discord Integration: Enforce max length in message.
* Metrics: Introduced the experimental feature flag
--enable-feature=receiver-name-in-metrics to include the
receiver name.
* Metrics: Introduced a new gauge named
alertmanager_inhibition_rules that counts the number of
configured inhibition rules.
* Metrics: Introduced a new counter named
alertmanager_alerts_supressed_total that tracks muted alerts,
it contains a reason label to indicate the source of the mute.
* Discord Integration: Introduced support for webhook_url_file.
* Microsoft Teams Integration: Introduced support for
webhook_url_file.
* Microsoft Teams Integration: Add support for summary.
* Metrics: Notification metrics now support two new values for
the label reason, contextCanceled and contextDeadlineExceeded.
* Email Integration: Contents of auth_password_file are now
trimmed of prefixed and suffixed whitespace.
* amtool: Fixes the error scheme required for webhook url when
using amtool with --alertmanager.url.
* Mixin: Fix AlertmanagerFailedToSendAlerts,
AlertmanagerClusterFailedToSendAlerts, and
AlertmanagerClusterFailedToSendAlerts to make sure they ignore
the reason label.
grafana was updated from version 11.5.5 to 11.5.10:
- Security issues fixed:
* CVE-2025-47911: Fix parsing HTML documents (bsc#1251454)
* CVE-2025-58190: Fix excessive memory consumption (bsc#1251657)
* CVE-2025-64751: Drop experimental implementation of authorization Zanzana server/client
(bsc#1254113)
* CVE-2025-11065: Fixed sensitive information leak in logs (version 11.5.9) (bsc#1250616)
* CVE-2025-6023: Fixed cross-site-scripting via scripted dashboards (version 11.5.7) (bsc#1246735)
* CVE-2025-6197: Fixed open redirect in organization switching (version 11.5.7) (bsc#1246736)
* CVE-2025-3415: Fixed exposure of DingDing alerting integration URL to Viewer level users (version 11.5.6)
(bsc#1245302)
- Other changes, new features and bugs fixed:
* Version 11.5.10:
+ Update to Go 1.25
+ Update to golang.org/x/net v0.45.0
+ Auth: Fix render user OAuth passthrough
+ LDAP Authentication: Fix URL to propagate username context as parameter
* Version 11.5.9:
+ Auditing: Document new options for recording datasource query request/response body.
+ Login: Fixed redirection after login when Grafana is served from subpath.
* Version 11.5.7:
+ Azure: Fixed legend formatting and resource name determination in template variable queries.
mgr-push:
- Version 5.0.3-0
* Fixed syntax error in changelog
rhnlib:
- Version 5.0.6-0
* Use more secure defusedxml parser (bsc#1227577)
spacecmd:
- Version 5.0.14-0:
* Fixed installation of python lib files on Ubuntu 24.04 (bsc#1246586)
* Use JSON instead of pickle for spacecmd cache (bsc#1227579)
* Make spacecmd to work with Python 3.12 and higher
* Call print statements properly in Python 3
supportutils-plugin-susemanager-client:
- Version 5.0.5-0
* Fix syntax error in changelog
uyuni-tools:
- Version 0.1.37-0
* Handle CA files with symlinks during migration (bsc#1251044)
* Add a lowercase version of --logLevel (bsc#1243611)
* Adjust traefik exposed configuration for chart v27+ (bsc#1247721)
* Stop executing scripts in temporary folder (bsc#1243704)
* Convert the traefik install time to local time (bsc#1251138)
* Run smdba and reindex only during migration (bsc#1244534)
* Support config: collect podman inspect for hub container (bsc#1245099)
* Add --registry-host, --registry-user and --registry-password to pull images from an authenticate registry
* Deprecate --registry
* Use new dedicated path for Cobbler settings (bsc#1244027)
* Migrate custom auto installation snippets (bsc#1246320)
* Add SLE15SP7 to buildin productmap
* Fix loading product map from mgradm configuration file (bsc#1246068)
* Fix channel override for distro copy
* Do not use sudo when running as a root user (bsc#1246882)
* Do not require backups to be at the same location for restoring (bsc#1246906)
* Check for restorecon presence before calling (bsc#1246925)
* Automatically get up-to-date systemid file on salt based proxy hosts (bsc#1246789)
* Fix recomputing proxy images when installing a ptf or test (bsc#1246553)
* Add migration for server monitoring configuration (bsc#1247688)
- Version 0.1.36-0
* Bump the default image tag
- Version 0.1.35-0
* Restore SELinux contexts for restored backup volumes (bsc#1244127)
- Version 0.1.34-0
* Fix mgradm backup create handling of images and systemd files (bsc#1246738)
- Version 0.1.33-0
* Restore volumes using tar instead of podman import (bsc#1244127)
Patchnames
SUSE-2025-4457,SUSE-SLE-Manager-Tools-12-2025-4457
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update 5.0.6 for Multi-Linux Manager Client Tools",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update fixes the following issues:\n\ngolang-github-prometheus-alertmanager:\n\n- Update to version 0.28.1 (jsc#PED-13285):\n * Improved performance of inhibition rules when using Equal\n labels.\n * Improve the documentation on escaping in UTF-8 matchers.\n * Update alertmanager_config_hash metric help to document the\n hash is not cryptographically strong.\n * Fix panic in amtool when using --verbose.\n * Fix templating of channel field for Rocket.Chat.\n * Fix rocketchat_configs written as rocket_configs in docs.\n * Fix usage for --enable-feature flag.\n * Trim whitespace from OpsGenie API Key.\n * Fix Jira project template not rendered when searching for\n existing issues.\n * Fix subtle bug in JSON/YAML encoding of inhibition rules that\n would cause Equal labels to be omitted.\n * Fix header for slack_configs in docs.\n * Fix weight and wrap of Microsoft Teams notifications.\n- Upgrade to version 0.28.0:\n * CVE-2025-47908: Bump github.com/rs/cors (bsc#1247748).\n * Templating errors in the SNS integration now return an error.\n * Adopt log/slog, drop go-kit/log.\n * Add a new Microsoft Teams integration based on Flows.\n * Add a new Rocket.Chat integration.\n * Add a new Jira integration.\n * Add support for GOMEMLIMIT, enable it via the feature flag\n --enable-feature=auto-gomemlimit.\n * Add support for GOMAXPROCS, enable it via the feature flag\n --enable-feature=auto-gomaxprocs.\n * Add support for limits of silences including the maximum number\n of active and pending silences, and the maximum size per\n silence (in bytes). You can use the flags\n --silences.max-silences and --silences.max-silence-size-bytes\n to set them accordingly.\n * Muted alerts now show whether they are suppressed or not in\n both the /api/v2/alerts endpoint and the Alertmanager UI.\n- Upgrade to version 0.27.0:\n * API: Removal of all api/v1/ endpoints. These endpoints\n now log and return a deprecation message and respond with a\n status code of 410.\n * UTF-8 Support: Introduction of support for any UTF-8\n character as part of label names and matchers.\n * Discord Integration: Enforce max length in message.\n * Metrics: Introduced the experimental feature flag\n --enable-feature=receiver-name-in-metrics to include the\n receiver name.\n * Metrics: Introduced a new gauge named\n alertmanager_inhibition_rules that counts the number of\n configured inhibition rules.\n * Metrics: Introduced a new counter named\n alertmanager_alerts_supressed_total that tracks muted alerts,\n it contains a reason label to indicate the source of the mute.\n * Discord Integration: Introduced support for webhook_url_file.\n * Microsoft Teams Integration: Introduced support for\n webhook_url_file.\n * Microsoft Teams Integration: Add support for summary.\n * Metrics: Notification metrics now support two new values for\n the label reason, contextCanceled and contextDeadlineExceeded.\n * Email Integration: Contents of auth_password_file are now\n trimmed of prefixed and suffixed whitespace.\n * amtool: Fixes the error scheme required for webhook url when\n using amtool with --alertmanager.url.\n * Mixin: Fix AlertmanagerFailedToSendAlerts,\n AlertmanagerClusterFailedToSendAlerts, and\n AlertmanagerClusterFailedToSendAlerts to make sure they ignore\n the reason label.\n\ngrafana was updated from version 11.5.5 to 11.5.10:\n\n- Security issues fixed:\n \n * CVE-2025-47911: Fix parsing HTML documents (bsc#1251454)\n * CVE-2025-58190: Fix excessive memory consumption (bsc#1251657)\n * CVE-2025-64751: Drop experimental implementation of authorization Zanzana server/client\n (bsc#1254113)\n * CVE-2025-11065: Fixed sensitive information leak in logs (version 11.5.9) (bsc#1250616)\n * CVE-2025-6023: Fixed cross-site-scripting via scripted dashboards (version 11.5.7) (bsc#1246735)\n * CVE-2025-6197: Fixed open redirect in organization switching (version 11.5.7) (bsc#1246736)\n * CVE-2025-3415: Fixed exposure of DingDing alerting integration URL to Viewer level users (version 11.5.6)\n (bsc#1245302)\n\n- Other changes, new features and bugs fixed:\n\n * Version 11.5.10:\n + Update to Go 1.25\n + Update to golang.org/x/net v0.45.0\n + Auth: Fix render user OAuth passthrough\n + LDAP Authentication: Fix URL to propagate username context as parameter\n \n * Version 11.5.9:\n + Auditing: Document new options for recording datasource query request/response body.\n + Login: Fixed redirection after login when Grafana is served from subpath.\n\n * Version 11.5.7:\n + Azure: Fixed legend formatting and resource name determination in template variable queries.\n\nmgr-push:\n\n- Version 5.0.3-0\n * Fixed syntax error in changelog\n\nrhnlib:\n\n- Version 5.0.6-0\n * Use more secure defusedxml parser (bsc#1227577)\n\nspacecmd:\n\n- Version 5.0.14-0:\n\n * Fixed installation of python lib files on Ubuntu 24.04 (bsc#1246586)\n * Use JSON instead of pickle for spacecmd cache (bsc#1227579)\n * Make spacecmd to work with Python 3.12 and higher\n * Call print statements properly in Python 3\n\nsupportutils-plugin-susemanager-client:\n\n- Version 5.0.5-0\n * Fix syntax error in changelog\n\nuyuni-tools:\n\n- Version 0.1.37-0\n * Handle CA files with symlinks during migration (bsc#1251044)\n * Add a lowercase version of --logLevel (bsc#1243611)\n * Adjust traefik exposed configuration for chart v27+ (bsc#1247721)\n * Stop executing scripts in temporary folder (bsc#1243704)\n * Convert the traefik install time to local time (bsc#1251138)\n * Run smdba and reindex only during migration (bsc#1244534)\n * Support config: collect podman inspect for hub container (bsc#1245099)\n * Add --registry-host, --registry-user and --registry-password to pull images from an authenticate registry\n * Deprecate --registry\n * Use new dedicated path for Cobbler settings (bsc#1244027)\n * Migrate custom auto installation snippets (bsc#1246320)\n * Add SLE15SP7 to buildin productmap\n * Fix loading product map from mgradm configuration file (bsc#1246068)\n * Fix channel override for distro copy\n * Do not use sudo when running as a root user (bsc#1246882)\n * Do not require backups to be at the same location for restoring (bsc#1246906)\n * Check for restorecon presence before calling (bsc#1246925)\n * Automatically get up-to-date systemid file on salt based proxy hosts (bsc#1246789)\n * Fix recomputing proxy images when installing a ptf or test (bsc#1246553)\n * Add migration for server monitoring configuration (bsc#1247688)\n- Version 0.1.36-0\n * Bump the default image tag\n- Version 0.1.35-0\n * Restore SELinux contexts for restored backup volumes (bsc#1244127)\n- Version 0.1.34-0\n * Fix mgradm backup create handling of images and systemd files (bsc#1246738)\n- Version 0.1.33-0\n * Restore volumes using tar instead of podman import (bsc#1244127)\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4457,SUSE-SLE-Manager-Tools-12-2025-4457",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4457-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4457-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254457-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4457-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023598.html"
},
{
"category": "self",
"summary": "SUSE Bug 1227577",
"url": "https://bugzilla.suse.com/1227577"
},
{
"category": "self",
"summary": "SUSE Bug 1227579",
"url": "https://bugzilla.suse.com/1227579"
},
{
"category": "self",
"summary": "SUSE Bug 1243611",
"url": "https://bugzilla.suse.com/1243611"
},
{
"category": "self",
"summary": "SUSE Bug 1243704",
"url": "https://bugzilla.suse.com/1243704"
},
{
"category": "self",
"summary": "SUSE Bug 1244027",
"url": "https://bugzilla.suse.com/1244027"
},
{
"category": "self",
"summary": "SUSE Bug 1244127",
"url": "https://bugzilla.suse.com/1244127"
},
{
"category": "self",
"summary": "SUSE Bug 1244534",
"url": "https://bugzilla.suse.com/1244534"
},
{
"category": "self",
"summary": "SUSE Bug 1245099",
"url": "https://bugzilla.suse.com/1245099"
},
{
"category": "self",
"summary": "SUSE Bug 1245302",
"url": "https://bugzilla.suse.com/1245302"
},
{
"category": "self",
"summary": "SUSE Bug 1246068",
"url": "https://bugzilla.suse.com/1246068"
},
{
"category": "self",
"summary": "SUSE Bug 1246320",
"url": "https://bugzilla.suse.com/1246320"
},
{
"category": "self",
"summary": "SUSE Bug 1246553",
"url": "https://bugzilla.suse.com/1246553"
},
{
"category": "self",
"summary": "SUSE Bug 1246586",
"url": "https://bugzilla.suse.com/1246586"
},
{
"category": "self",
"summary": "SUSE Bug 1246662",
"url": "https://bugzilla.suse.com/1246662"
},
{
"category": "self",
"summary": "SUSE Bug 1246735",
"url": "https://bugzilla.suse.com/1246735"
},
{
"category": "self",
"summary": "SUSE Bug 1246736",
"url": "https://bugzilla.suse.com/1246736"
},
{
"category": "self",
"summary": "SUSE Bug 1246738",
"url": "https://bugzilla.suse.com/1246738"
},
{
"category": "self",
"summary": "SUSE Bug 1246789",
"url": "https://bugzilla.suse.com/1246789"
},
{
"category": "self",
"summary": "SUSE Bug 1246882",
"url": "https://bugzilla.suse.com/1246882"
},
{
"category": "self",
"summary": "SUSE Bug 1246906",
"url": "https://bugzilla.suse.com/1246906"
},
{
"category": "self",
"summary": "SUSE Bug 1246925",
"url": "https://bugzilla.suse.com/1246925"
},
{
"category": "self",
"summary": "SUSE Bug 1247688",
"url": "https://bugzilla.suse.com/1247688"
},
{
"category": "self",
"summary": "SUSE Bug 1247721",
"url": "https://bugzilla.suse.com/1247721"
},
{
"category": "self",
"summary": "SUSE Bug 1247748",
"url": "https://bugzilla.suse.com/1247748"
},
{
"category": "self",
"summary": "SUSE Bug 1250616",
"url": "https://bugzilla.suse.com/1250616"
},
{
"category": "self",
"summary": "SUSE Bug 1251044",
"url": "https://bugzilla.suse.com/1251044"
},
{
"category": "self",
"summary": "SUSE Bug 1251138",
"url": "https://bugzilla.suse.com/1251138"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-11065 page",
"url": "https://www.suse.com/security/cve/CVE-2025-11065/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-3415 page",
"url": "https://www.suse.com/security/cve/CVE-2025-3415/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47908 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47908/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6023 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6023/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6197/"
}
],
"title": "Security update 5.0.6 for Multi-Linux Manager Client Tools",
"tracking": {
"current_release_date": "2025-12-18T11:56:34Z",
"generator": {
"date": "2025-12-18T11:56:34Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4457-1",
"initial_release_date": "2025-12-18T11:56:34Z",
"revision_history": [
{
"date": "2025-12-18T11:56:34Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-1.34.1.aarch64",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-1.34.1.aarch64",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-1.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "grafana-11.5.10-1.87.1.aarch64",
"product": {
"name": "grafana-11.5.10-1.87.1.aarch64",
"product_id": "grafana-11.5.10-1.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "mgrctl-0.1.37-1.27.1.aarch64",
"product": {
"name": "mgrctl-0.1.37-1.27.1.aarch64",
"product_id": "mgrctl-0.1.37-1.27.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-1.34.1.i586",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-1.34.1.i586",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-1.34.1.i586"
}
},
{
"category": "product_version",
"name": "mgrctl-0.1.37-1.27.1.i586",
"product": {
"name": "mgrctl-0.1.37-1.27.1.i586",
"product_id": "mgrctl-0.1.37-1.27.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "mgr-push-5.0.3-1.30.3.noarch",
"product": {
"name": "mgr-push-5.0.3-1.30.3.noarch",
"product_id": "mgr-push-5.0.3-1.30.3.noarch"
}
},
{
"category": "product_version",
"name": "mgrctl-bash-completion-0.1.37-1.27.1.noarch",
"product": {
"name": "mgrctl-bash-completion-0.1.37-1.27.1.noarch",
"product_id": "mgrctl-bash-completion-0.1.37-1.27.1.noarch"
}
},
{
"category": "product_version",
"name": "mgrctl-lang-0.1.37-1.27.1.noarch",
"product": {
"name": "mgrctl-lang-0.1.37-1.27.1.noarch",
"product_id": "mgrctl-lang-0.1.37-1.27.1.noarch"
}
},
{
"category": "product_version",
"name": "mgrctl-zsh-completion-0.1.37-1.27.1.noarch",
"product": {
"name": "mgrctl-zsh-completion-0.1.37-1.27.1.noarch",
"product_id": "mgrctl-zsh-completion-0.1.37-1.27.1.noarch"
}
},
{
"category": "product_version",
"name": "python2-mgr-push-5.0.3-1.30.3.noarch",
"product": {
"name": "python2-mgr-push-5.0.3-1.30.3.noarch",
"product_id": "python2-mgr-push-5.0.3-1.30.3.noarch"
}
},
{
"category": "product_version",
"name": "python2-rhnlib-5.0.6-21.55.1.noarch",
"product": {
"name": "python2-rhnlib-5.0.6-21.55.1.noarch",
"product_id": "python2-rhnlib-5.0.6-21.55.1.noarch"
}
},
{
"category": "product_version",
"name": "spacecmd-5.0.14-38.162.1.noarch",
"product": {
"name": "spacecmd-5.0.14-38.162.1.noarch",
"product_id": "spacecmd-5.0.14-38.162.1.noarch"
}
},
{
"category": "product_version",
"name": "supportutils-plugin-susemanager-client-5.0.5-6.36.1.noarch",
"product": {
"name": "supportutils-plugin-susemanager-client-5.0.5-6.36.1.noarch",
"product_id": "supportutils-plugin-susemanager-client-5.0.5-6.36.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-1.34.1.ppc64le",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-1.34.1.ppc64le",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-1.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "grafana-11.5.10-1.87.1.ppc64le",
"product": {
"name": "grafana-11.5.10-1.87.1.ppc64le",
"product_id": "grafana-11.5.10-1.87.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mgrctl-0.1.37-1.27.1.ppc64le",
"product": {
"name": "mgrctl-0.1.37-1.27.1.ppc64le",
"product_id": "mgrctl-0.1.37-1.27.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-1.34.1.s390x",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-1.34.1.s390x",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-1.34.1.s390x"
}
},
{
"category": "product_version",
"name": "grafana-11.5.10-1.87.1.s390x",
"product": {
"name": "grafana-11.5.10-1.87.1.s390x",
"product_id": "grafana-11.5.10-1.87.1.s390x"
}
},
{
"category": "product_version",
"name": "mgrctl-0.1.37-1.27.1.s390x",
"product": {
"name": "mgrctl-0.1.37-1.27.1.s390x",
"product_id": "mgrctl-0.1.37-1.27.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-1.34.1.x86_64",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-1.34.1.x86_64",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-1.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "grafana-11.5.10-1.87.1.x86_64",
"product": {
"name": "grafana-11.5.10-1.87.1.x86_64",
"product_id": "grafana-11.5.10-1.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "mgrctl-0.1.37-1.27.1.x86_64",
"product": {
"name": "mgrctl-0.1.37-1.27.1.x86_64",
"product_id": "mgrctl-0.1.37-1.27.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Manager Client Tools 12",
"product": {
"name": "SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-1.34.1.aarch64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.aarch64"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-1.34.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-1.34.1.ppc64le as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.ppc64le"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-1.34.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-1.34.1.s390x as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.s390x"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-1.34.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-1.34.1.x86_64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.x86_64"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-1.34.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.10-1.87.1.aarch64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.aarch64"
},
"product_reference": "grafana-11.5.10-1.87.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.10-1.87.1.ppc64le as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.ppc64le"
},
"product_reference": "grafana-11.5.10-1.87.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.10-1.87.1.s390x as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.s390x"
},
"product_reference": "grafana-11.5.10-1.87.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.10-1.87.1.x86_64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.x86_64"
},
"product_reference": "grafana-11.5.10-1.87.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgr-push-5.0.3-1.30.3.noarch as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:mgr-push-5.0.3-1.30.3.noarch"
},
"product_reference": "mgr-push-5.0.3-1.30.3.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-0.1.37-1.27.1.aarch64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.aarch64"
},
"product_reference": "mgrctl-0.1.37-1.27.1.aarch64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-0.1.37-1.27.1.ppc64le as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.ppc64le"
},
"product_reference": "mgrctl-0.1.37-1.27.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-0.1.37-1.27.1.s390x as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.s390x"
},
"product_reference": "mgrctl-0.1.37-1.27.1.s390x",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-0.1.37-1.27.1.x86_64 as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.x86_64"
},
"product_reference": "mgrctl-0.1.37-1.27.1.x86_64",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-bash-completion-0.1.37-1.27.1.noarch as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:mgrctl-bash-completion-0.1.37-1.27.1.noarch"
},
"product_reference": "mgrctl-bash-completion-0.1.37-1.27.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-zsh-completion-0.1.37-1.27.1.noarch as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:mgrctl-zsh-completion-0.1.37-1.27.1.noarch"
},
"product_reference": "mgrctl-zsh-completion-0.1.37-1.27.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-mgr-push-5.0.3-1.30.3.noarch as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:python2-mgr-push-5.0.3-1.30.3.noarch"
},
"product_reference": "python2-mgr-push-5.0.3-1.30.3.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-rhnlib-5.0.6-21.55.1.noarch as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:python2-rhnlib-5.0.6-21.55.1.noarch"
},
"product_reference": "python2-rhnlib-5.0.6-21.55.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacecmd-5.0.14-38.162.1.noarch as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:spacecmd-5.0.14-38.162.1.noarch"
},
"product_reference": "spacecmd-5.0.14-38.162.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "supportutils-plugin-susemanager-client-5.0.5-6.36.1.noarch as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-5.0.5-6.36.1.noarch"
},
"product_reference": "supportutils-plugin-susemanager-client-5.0.5-6.36.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-11065",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-11065"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.x86_64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.aarch64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.s390x",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.x86_64",
"SUSE Manager Client Tools 12:mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.aarch64",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.ppc64le",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.s390x",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.x86_64",
"SUSE Manager Client Tools 12:mgrctl-bash-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:mgrctl-zsh-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:python2-mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:python2-rhnlib-5.0.6-21.55.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-5.0.14-38.162.1.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-5.0.5-6.36.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-11065",
"url": "https://www.suse.com/security/cve/CVE-2025-11065"
},
{
"category": "external",
"summary": "SUSE Bug 1250608 for CVE-2025-11065",
"url": "https://bugzilla.suse.com/1250608"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.x86_64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.aarch64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.s390x",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.x86_64",
"SUSE Manager Client Tools 12:mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.aarch64",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.ppc64le",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.s390x",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.x86_64",
"SUSE Manager Client Tools 12:mgrctl-bash-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:mgrctl-zsh-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:python2-mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:python2-rhnlib-5.0.6-21.55.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-5.0.14-38.162.1.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-5.0.5-6.36.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.x86_64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.aarch64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.s390x",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.x86_64",
"SUSE Manager Client Tools 12:mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.aarch64",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.ppc64le",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.s390x",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.x86_64",
"SUSE Manager Client Tools 12:mgrctl-bash-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:mgrctl-zsh-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:python2-mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:python2-rhnlib-5.0.6-21.55.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-5.0.14-38.162.1.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-5.0.5-6.36.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-18T11:56:34Z",
"details": "moderate"
}
],
"title": "CVE-2025-11065"
},
{
"cve": "CVE-2025-3415",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-3415"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. The Grafana Alerting DingDing integration was not properly protected and could be exposed to users with Viewer permission. \nFixed in versions 10.4.19+security-01, 11.2.10+security-01, 11.3.7+security-01, 11.4.5+security-01, 11.5.5+security-01, 11.6.2+security-01 and 12.0.1+security-01",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.x86_64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.aarch64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.s390x",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.x86_64",
"SUSE Manager Client Tools 12:mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.aarch64",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.ppc64le",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.s390x",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.x86_64",
"SUSE Manager Client Tools 12:mgrctl-bash-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:mgrctl-zsh-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:python2-mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:python2-rhnlib-5.0.6-21.55.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-5.0.14-38.162.1.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-5.0.5-6.36.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-3415",
"url": "https://www.suse.com/security/cve/CVE-2025-3415"
},
{
"category": "external",
"summary": "SUSE Bug 1245302 for CVE-2025-3415",
"url": "https://bugzilla.suse.com/1245302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.x86_64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.aarch64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.s390x",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.x86_64",
"SUSE Manager Client Tools 12:mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.aarch64",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.ppc64le",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.s390x",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.x86_64",
"SUSE Manager Client Tools 12:mgrctl-bash-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:mgrctl-zsh-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:python2-mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:python2-rhnlib-5.0.6-21.55.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-5.0.14-38.162.1.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-5.0.5-6.36.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.x86_64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.aarch64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.s390x",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.x86_64",
"SUSE Manager Client Tools 12:mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.aarch64",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.ppc64le",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.s390x",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.x86_64",
"SUSE Manager Client Tools 12:mgrctl-bash-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:mgrctl-zsh-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:python2-mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:python2-rhnlib-5.0.6-21.55.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-5.0.14-38.162.1.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-5.0.5-6.36.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-18T11:56:34Z",
"details": "moderate"
}
],
"title": "CVE-2025-3415"
},
{
"cve": "CVE-2025-47908",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47908"
}
],
"notes": [
{
"category": "general",
"text": "Middleware causes a prohibitive amount of heap allocations when processing malicious preflight requests that include a Access-Control-Request-Headers (ACRH) header whose value contains many commas. This behavior can be abused by attackers to produce undue load on the middleware/server as an attempt to cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.x86_64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.aarch64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.s390x",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.x86_64",
"SUSE Manager Client Tools 12:mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.aarch64",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.ppc64le",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.s390x",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.x86_64",
"SUSE Manager Client Tools 12:mgrctl-bash-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:mgrctl-zsh-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:python2-mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:python2-rhnlib-5.0.6-21.55.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-5.0.14-38.162.1.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-5.0.5-6.36.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47908",
"url": "https://www.suse.com/security/cve/CVE-2025-47908"
},
{
"category": "external",
"summary": "SUSE Bug 1247746 for CVE-2025-47908",
"url": "https://bugzilla.suse.com/1247746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.x86_64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.aarch64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.s390x",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.x86_64",
"SUSE Manager Client Tools 12:mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.aarch64",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.ppc64le",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.s390x",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.x86_64",
"SUSE Manager Client Tools 12:mgrctl-bash-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:mgrctl-zsh-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:python2-mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:python2-rhnlib-5.0.6-21.55.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-5.0.14-38.162.1.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-5.0.5-6.36.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.x86_64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.aarch64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.s390x",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.x86_64",
"SUSE Manager Client Tools 12:mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.aarch64",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.ppc64le",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.s390x",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.x86_64",
"SUSE Manager Client Tools 12:mgrctl-bash-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:mgrctl-zsh-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:python2-mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:python2-rhnlib-5.0.6-21.55.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-5.0.14-38.162.1.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-5.0.5-6.36.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-18T11:56:34Z",
"details": "moderate"
}
],
"title": "CVE-2025-47908"
},
{
"cve": "CVE-2025-6023",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6023"
}
],
"notes": [
{
"category": "general",
"text": "An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.\n\nThe open redirect can be chained with path traversal vulnerabilities to achieve XSS.\n\nFixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.x86_64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.aarch64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.s390x",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.x86_64",
"SUSE Manager Client Tools 12:mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.aarch64",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.ppc64le",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.s390x",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.x86_64",
"SUSE Manager Client Tools 12:mgrctl-bash-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:mgrctl-zsh-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:python2-mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:python2-rhnlib-5.0.6-21.55.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-5.0.14-38.162.1.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-5.0.5-6.36.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6023",
"url": "https://www.suse.com/security/cve/CVE-2025-6023"
},
{
"category": "external",
"summary": "SUSE Bug 1246735 for CVE-2025-6023",
"url": "https://bugzilla.suse.com/1246735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.x86_64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.aarch64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.s390x",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.x86_64",
"SUSE Manager Client Tools 12:mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.aarch64",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.ppc64le",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.s390x",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.x86_64",
"SUSE Manager Client Tools 12:mgrctl-bash-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:mgrctl-zsh-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:python2-mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:python2-rhnlib-5.0.6-21.55.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-5.0.14-38.162.1.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-5.0.5-6.36.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.x86_64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.aarch64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.s390x",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.x86_64",
"SUSE Manager Client Tools 12:mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.aarch64",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.ppc64le",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.s390x",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.x86_64",
"SUSE Manager Client Tools 12:mgrctl-bash-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:mgrctl-zsh-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:python2-mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:python2-rhnlib-5.0.6-21.55.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-5.0.14-38.162.1.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-5.0.5-6.36.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-18T11:56:34Z",
"details": "important"
}
],
"title": "CVE-2025-6023"
},
{
"cve": "CVE-2025-6197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6197"
}
],
"notes": [
{
"category": "general",
"text": "An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.\n\n\nPrerequisites for exploitation:\n\n- Multiple organizations must exist in the Grafana instance\n\n- Victim must be on a different organization than the one specified in the URL",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.x86_64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.aarch64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.s390x",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.x86_64",
"SUSE Manager Client Tools 12:mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.aarch64",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.ppc64le",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.s390x",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.x86_64",
"SUSE Manager Client Tools 12:mgrctl-bash-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:mgrctl-zsh-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:python2-mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:python2-rhnlib-5.0.6-21.55.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-5.0.14-38.162.1.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-5.0.5-6.36.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6197",
"url": "https://www.suse.com/security/cve/CVE-2025-6197"
},
{
"category": "external",
"summary": "SUSE Bug 1246736 for CVE-2025-6197",
"url": "https://bugzilla.suse.com/1246736"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.x86_64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.aarch64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.s390x",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.x86_64",
"SUSE Manager Client Tools 12:mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.aarch64",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.ppc64le",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.s390x",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.x86_64",
"SUSE Manager Client Tools 12:mgrctl-bash-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:mgrctl-zsh-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:python2-mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:python2-rhnlib-5.0.6-21.55.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-5.0.14-38.162.1.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-5.0.5-6.36.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.aarch64",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.ppc64le",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.s390x",
"SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1.x86_64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.aarch64",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.ppc64le",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.s390x",
"SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1.x86_64",
"SUSE Manager Client Tools 12:mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.aarch64",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.ppc64le",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.s390x",
"SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1.x86_64",
"SUSE Manager Client Tools 12:mgrctl-bash-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:mgrctl-zsh-completion-0.1.37-1.27.1.noarch",
"SUSE Manager Client Tools 12:python2-mgr-push-5.0.3-1.30.3.noarch",
"SUSE Manager Client Tools 12:python2-rhnlib-5.0.6-21.55.1.noarch",
"SUSE Manager Client Tools 12:spacecmd-5.0.14-38.162.1.noarch",
"SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-5.0.5-6.36.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-18T11:56:34Z",
"details": "moderate"
}
],
"title": "CVE-2025-6197"
}
]
}
suse-su-2025:4482-1
Vulnerability from csaf_suse
Published
2025-12-18 12:22
Modified
2025-12-18 12:22
Summary
Security update for grafana
Notes
Title of the patch
Security update for grafana
Description of the patch
This update for grafana fixes the following issues:
grafana was updated from version 11.5.5 to 11.5.10:
- Security issues fixed:
* CVE-2025-64751: Dropped experimental implementation of authorization Zanzana server/client (version 11.5.10)
(bsc#1254113)
* CVE-2025-47911: Fixed parsing HTML documents (version 11.5.10) (bsc#1251454)
* CVE-2025-58190: Fixed excessive memory consumption (version 11.5.10) (bsc#1251657)
* CVE-2025-11065: Fixed sensitive information leak in logs (version 11.5.9) (bsc#1250616)
* CVE-2025-6023: Fixed cross-site-scripting via scripted dashboards (version 11.5.7) (bsc#1246735)
* CVE-2025-6197: Fixed open redirect in organization switching (version 11.5.7) (bsc#1246736)
* CVE-2025-3415: Fixed exposure of DingDing alerting integration URL to Viewer level users (version 11.5.6)
(bsc#1245302)
- Other changes, new features and bugs fixed:
* Version 11.5.10:
+ Use forked wire from Grafana repository instead of external package (jsc#PED-14178)
+ Auth: Fix render user OAuth passthrough.
+ LDAP Authentication: Fix URL to propagate username context as parameter.
+ Plugins: Dependencies do not inherit parent URL for preinstall.
* Version 11.5.9:
+ Auditing: Document new options for recording datasource query request/response body.
+ Login: Fixed redirection after login when Grafana is served from subpath.
* Version 11.5.7:
+ Azure: Fixed legend formatting and resource name determination in template variable queries.
Patchnames
SUSE-2025-4482,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-4482,SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-4482,openSUSE-SLE-15.6-2025-4482
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for grafana",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for grafana fixes the following issues:\n\ngrafana was updated from version 11.5.5 to 11.5.10:\n\n- Security issues fixed:\n\n * CVE-2025-64751: Dropped experimental implementation of authorization Zanzana server/client (version 11.5.10)\n (bsc#1254113)\n * CVE-2025-47911: Fixed parsing HTML documents (version 11.5.10) (bsc#1251454)\n * CVE-2025-58190: Fixed excessive memory consumption (version 11.5.10) (bsc#1251657)\n * CVE-2025-11065: Fixed sensitive information leak in logs (version 11.5.9) (bsc#1250616)\n * CVE-2025-6023: Fixed cross-site-scripting via scripted dashboards (version 11.5.7) (bsc#1246735)\n * CVE-2025-6197: Fixed open redirect in organization switching (version 11.5.7) (bsc#1246736)\n * CVE-2025-3415: Fixed exposure of DingDing alerting integration URL to Viewer level users (version 11.5.6)\n (bsc#1245302)\n\n- Other changes, new features and bugs fixed:\n\n * Version 11.5.10:\n + Use forked wire from Grafana repository instead of external package (jsc#PED-14178)\n + Auth: Fix render user OAuth passthrough.\n + LDAP Authentication: Fix URL to propagate username context as parameter.\n + Plugins: Dependencies do not inherit parent URL for preinstall.\n\n * Version 11.5.9:\n + Auditing: Document new options for recording datasource query request/response body.\n + Login: Fixed redirection after login when Grafana is served from subpath.\n\n * Version 11.5.7:\n + Azure: Fixed legend formatting and resource name determination in template variable queries.\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4482,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-4482,SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-4482,openSUSE-SLE-15.6-2025-4482",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4482-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4482-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254482-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4482-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023614.html"
},
{
"category": "self",
"summary": "SUSE Bug 1245302",
"url": "https://bugzilla.suse.com/1245302"
},
{
"category": "self",
"summary": "SUSE Bug 1246735",
"url": "https://bugzilla.suse.com/1246735"
},
{
"category": "self",
"summary": "SUSE Bug 1246736",
"url": "https://bugzilla.suse.com/1246736"
},
{
"category": "self",
"summary": "SUSE Bug 1250616",
"url": "https://bugzilla.suse.com/1250616"
},
{
"category": "self",
"summary": "SUSE Bug 1251454",
"url": "https://bugzilla.suse.com/1251454"
},
{
"category": "self",
"summary": "SUSE Bug 1251657",
"url": "https://bugzilla.suse.com/1251657"
},
{
"category": "self",
"summary": "SUSE Bug 1254113",
"url": "https://bugzilla.suse.com/1254113"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-11065 page",
"url": "https://www.suse.com/security/cve/CVE-2025-11065/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-3415 page",
"url": "https://www.suse.com/security/cve/CVE-2025-3415/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47911 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47911/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58190 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58190/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6023 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6023/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64751 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64751/"
}
],
"title": "Security update for grafana",
"tracking": {
"current_release_date": "2025-12-18T12:22:20Z",
"generator": {
"date": "2025-12-18T12:22:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4482-1",
"initial_release_date": "2025-12-18T12:22:20Z",
"revision_history": [
{
"date": "2025-12-18T12:22:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "grafana-11.5.10-150200.3.80.1.aarch64",
"product": {
"name": "grafana-11.5.10-150200.3.80.1.aarch64",
"product_id": "grafana-11.5.10-150200.3.80.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-11.5.10-150200.3.80.1.ppc64le",
"product": {
"name": "grafana-11.5.10-150200.3.80.1.ppc64le",
"product_id": "grafana-11.5.10-150200.3.80.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-11.5.10-150200.3.80.1.s390x",
"product": {
"name": "grafana-11.5.10-150200.3.80.1.s390x",
"product_id": "grafana-11.5.10-150200.3.80.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-11.5.10-150200.3.80.1.x86_64",
"product": {
"name": "grafana-11.5.10-150200.3.80.1.x86_64",
"product_id": "grafana-11.5.10-150200.3.80.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp7"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.10-150200.3.80.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.aarch64"
},
"product_reference": "grafana-11.5.10-150200.3.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.10-150200.3.80.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.ppc64le"
},
"product_reference": "grafana-11.5.10-150200.3.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.10-150200.3.80.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.s390x"
},
"product_reference": "grafana-11.5.10-150200.3.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.10-150200.3.80.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.x86_64"
},
"product_reference": "grafana-11.5.10-150200.3.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.10-150200.3.80.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.aarch64"
},
"product_reference": "grafana-11.5.10-150200.3.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.10-150200.3.80.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.ppc64le"
},
"product_reference": "grafana-11.5.10-150200.3.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.10-150200.3.80.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.s390x"
},
"product_reference": "grafana-11.5.10-150200.3.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.10-150200.3.80.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.x86_64"
},
"product_reference": "grafana-11.5.10-150200.3.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.10-150200.3.80.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.aarch64"
},
"product_reference": "grafana-11.5.10-150200.3.80.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.10-150200.3.80.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.ppc64le"
},
"product_reference": "grafana-11.5.10-150200.3.80.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.10-150200.3.80.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.s390x"
},
"product_reference": "grafana-11.5.10-150200.3.80.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.10-150200.3.80.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.x86_64"
},
"product_reference": "grafana-11.5.10-150200.3.80.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-11065",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-11065"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.x86_64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.aarch64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.ppc64le",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.s390x",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-11065",
"url": "https://www.suse.com/security/cve/CVE-2025-11065"
},
{
"category": "external",
"summary": "SUSE Bug 1250608 for CVE-2025-11065",
"url": "https://bugzilla.suse.com/1250608"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.x86_64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.aarch64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.ppc64le",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.s390x",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.x86_64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.aarch64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.ppc64le",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.s390x",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-18T12:22:20Z",
"details": "moderate"
}
],
"title": "CVE-2025-11065"
},
{
"cve": "CVE-2025-3415",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-3415"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. The Grafana Alerting DingDing integration was not properly protected and could be exposed to users with Viewer permission. \nFixed in versions 10.4.19+security-01, 11.2.10+security-01, 11.3.7+security-01, 11.4.5+security-01, 11.5.5+security-01, 11.6.2+security-01 and 12.0.1+security-01",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.x86_64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.aarch64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.ppc64le",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.s390x",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-3415",
"url": "https://www.suse.com/security/cve/CVE-2025-3415"
},
{
"category": "external",
"summary": "SUSE Bug 1245302 for CVE-2025-3415",
"url": "https://bugzilla.suse.com/1245302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.x86_64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.aarch64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.ppc64le",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.s390x",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.x86_64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.aarch64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.ppc64le",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.s390x",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-18T12:22:20Z",
"details": "moderate"
}
],
"title": "CVE-2025-3415"
},
{
"cve": "CVE-2025-47911",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47911"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.x86_64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.aarch64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.ppc64le",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.s390x",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47911",
"url": "https://www.suse.com/security/cve/CVE-2025-47911"
},
{
"category": "external",
"summary": "SUSE Bug 1251308 for CVE-2025-47911",
"url": "https://bugzilla.suse.com/1251308"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.x86_64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.aarch64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.ppc64le",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.s390x",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.x86_64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.aarch64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.ppc64le",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.s390x",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-18T12:22:20Z",
"details": "moderate"
}
],
"title": "CVE-2025-47911"
},
{
"cve": "CVE-2025-58190",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58190"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.x86_64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.aarch64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.ppc64le",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.s390x",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58190",
"url": "https://www.suse.com/security/cve/CVE-2025-58190"
},
{
"category": "external",
"summary": "SUSE Bug 1251309 for CVE-2025-58190",
"url": "https://bugzilla.suse.com/1251309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.x86_64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.aarch64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.ppc64le",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.s390x",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.x86_64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.aarch64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.ppc64le",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.s390x",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-18T12:22:20Z",
"details": "moderate"
}
],
"title": "CVE-2025-58190"
},
{
"cve": "CVE-2025-6023",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6023"
}
],
"notes": [
{
"category": "general",
"text": "An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.\n\nThe open redirect can be chained with path traversal vulnerabilities to achieve XSS.\n\nFixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.x86_64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.aarch64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.ppc64le",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.s390x",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6023",
"url": "https://www.suse.com/security/cve/CVE-2025-6023"
},
{
"category": "external",
"summary": "SUSE Bug 1246735 for CVE-2025-6023",
"url": "https://bugzilla.suse.com/1246735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.x86_64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.aarch64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.ppc64le",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.s390x",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.x86_64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.aarch64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.ppc64le",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.s390x",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-18T12:22:20Z",
"details": "important"
}
],
"title": "CVE-2025-6023"
},
{
"cve": "CVE-2025-6197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6197"
}
],
"notes": [
{
"category": "general",
"text": "An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.\n\n\nPrerequisites for exploitation:\n\n- Multiple organizations must exist in the Grafana instance\n\n- Victim must be on a different organization than the one specified in the URL",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.x86_64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.aarch64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.ppc64le",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.s390x",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6197",
"url": "https://www.suse.com/security/cve/CVE-2025-6197"
},
{
"category": "external",
"summary": "SUSE Bug 1246736 for CVE-2025-6197",
"url": "https://bugzilla.suse.com/1246736"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.x86_64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.aarch64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.ppc64le",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.s390x",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.x86_64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.aarch64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.ppc64le",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.s390x",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-18T12:22:20Z",
"details": "moderate"
}
],
"title": "CVE-2025-6197"
},
{
"cve": "CVE-2025-64751",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64751"
}
],
"notes": [
{
"category": "general",
"text": "OpenFGA is a high-performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar. OpenFGA v1.4.0 to v1.11.0 ( openfga-0.1.34 \u003c= Helm chart \u003c= openfga-0.2.48, v.1.4.0 \u003c= docker \u003c= v.1.11.0) are vulnerable to improper policy enforcement when certain Check and ListObject calls are executed. This issue has been patched in version 1.11.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.x86_64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.aarch64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.ppc64le",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.s390x",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64751",
"url": "https://www.suse.com/security/cve/CVE-2025-64751"
},
{
"category": "external",
"summary": "SUSE Bug 1254112 for CVE-2025-64751",
"url": "https://bugzilla.suse.com/1254112"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.x86_64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.aarch64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.ppc64le",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.s390x",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana-11.5.10-150200.3.80.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana-11.5.10-150200.3.80.1.x86_64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.aarch64",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.ppc64le",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.s390x",
"openSUSE Leap 15.6:grafana-11.5.10-150200.3.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-18T12:22:20Z",
"details": "important"
}
],
"title": "CVE-2025-64751"
}
]
}
ghsa-jvcj-qc86-j594
Vulnerability from github
Published
2025-07-18 09:30
Modified
2025-07-18 09:30
Severity ?
VLAI Severity ?
Details
An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.
Prerequisites for exploitation:
-
Multiple organizations must exist in the Grafana instance
-
Victim must be on a different organization than the one specified in the URL
{
"affected": [],
"aliases": [
"CVE-2025-6197"
],
"database_specific": {
"cwe_ids": [
"CWE-601"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-07-18T08:15:28Z",
"severity": "MODERATE"
},
"details": "An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.\n\n\nPrerequisites for exploitation:\n\n- Multiple organizations must exist in the Grafana instance\n\n- Victim must be on a different organization than the one specified in the URL",
"id": "GHSA-jvcj-qc86-j594",
"modified": "2025-07-18T09:30:31Z",
"published": "2025-07-18T09:30:31Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6197"
},
{
"type": "WEB",
"url": "https://grafana.com/blog/2025/07/17/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-6197-and-cve-2025-6023"
},
{
"type": "WEB",
"url": "https://grafana.com/security/security-advisories/cve-2025-6197"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
}
]
}
opensuse-su-2025:15372-1
Vulnerability from csaf_opensuse
Published
2025-07-23 00:00
Modified
2025-07-23 00:00
Summary
grafana-11.6.3+security01-1.1 on GA media
Notes
Title of the patch
grafana-11.6.3+security01-1.1 on GA media
Description of the patch
These are all security issues fixed in the grafana-11.6.3+security01-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15372
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "grafana-11.6.3+security01-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the grafana-11.6.3+security01-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15372",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15372-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6023 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6023/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6197/"
}
],
"title": "grafana-11.6.3+security01-1.1 on GA media",
"tracking": {
"current_release_date": "2025-07-23T00:00:00Z",
"generator": {
"date": "2025-07-23T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15372-1",
"initial_release_date": "2025-07-23T00:00:00Z",
"revision_history": [
{
"date": "2025-07-23T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "grafana-11.6.3+security01-1.1.aarch64",
"product": {
"name": "grafana-11.6.3+security01-1.1.aarch64",
"product_id": "grafana-11.6.3+security01-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-11.6.3+security01-1.1.ppc64le",
"product": {
"name": "grafana-11.6.3+security01-1.1.ppc64le",
"product_id": "grafana-11.6.3+security01-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-11.6.3+security01-1.1.s390x",
"product": {
"name": "grafana-11.6.3+security01-1.1.s390x",
"product_id": "grafana-11.6.3+security01-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-11.6.3+security01-1.1.x86_64",
"product": {
"name": "grafana-11.6.3+security01-1.1.x86_64",
"product_id": "grafana-11.6.3+security01-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.6.3+security01-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.aarch64"
},
"product_reference": "grafana-11.6.3+security01-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.6.3+security01-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.ppc64le"
},
"product_reference": "grafana-11.6.3+security01-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.6.3+security01-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.s390x"
},
"product_reference": "grafana-11.6.3+security01-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.6.3+security01-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.x86_64"
},
"product_reference": "grafana-11.6.3+security01-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6023",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6023"
}
],
"notes": [
{
"category": "general",
"text": "An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.\n\nThe open redirect can be chained with path traversal vulnerabilities to achieve XSS.\n\nFixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6023",
"url": "https://www.suse.com/security/cve/CVE-2025-6023"
},
{
"category": "external",
"summary": "SUSE Bug 1246735 for CVE-2025-6023",
"url": "https://bugzilla.suse.com/1246735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-23T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-6023"
},
{
"cve": "CVE-2025-6197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6197"
}
],
"notes": [
{
"category": "general",
"text": "An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.\n\n\nPrerequisites for exploitation:\n\n- Multiple organizations must exist in the Grafana instance\n\n- Victim must be on a different organization than the one specified in the URL",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6197",
"url": "https://www.suse.com/security/cve/CVE-2025-6197"
},
{
"category": "external",
"summary": "SUSE Bug 1246736 for CVE-2025-6197",
"url": "https://bugzilla.suse.com/1246736"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-23T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-6197"
}
]
}
fkie_cve-2025-6197
Vulnerability from fkie_nvd
Published
2025-07-18 08:15
Modified
2025-07-22 13:06
Severity ?
Summary
An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.
Prerequisites for exploitation:
- Multiple organizations must exist in the Grafana instance
- Victim must be on a different organization than the one specified in the URL
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.\n\n\nPrerequisites for exploitation:\n\n- Multiple organizations must exist in the Grafana instance\n\n- Victim must be on a different organization than the one specified in the URL"
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de redirecci\u00f3n abierta en la funcionalidad de cambio de organizaci\u00f3n de Grafana OSS. Requisitos para su explotaci\u00f3n: - Deben existir varias organizaciones en la instancia de Grafana. - La v\u00edctima debe pertenecer a una organizaci\u00f3n diferente a la especificada en la URL."
}
],
"id": "CVE-2025-6197",
"lastModified": "2025-07-22T13:06:27.983",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 2.5,
"source": "security@grafana.com",
"type": "Secondary"
}
]
},
"published": "2025-07-18T08:15:28.187",
"references": [
{
"source": "security@grafana.com",
"url": "https://grafana.com/blog/2025/07/17/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-6197-and-cve-2025-6023/"
},
{
"source": "security@grafana.com",
"url": "https://grafana.com/security/security-advisories/cve-2025-6197/"
}
],
"sourceIdentifier": "security@grafana.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-601"
}
],
"source": "security@grafana.com",
"type": "Secondary"
}
]
}
CERTFR-2025-AVI-0597
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Grafana. Elles permettent à un attaquant de provoquer une injection de code indirecte à distance (XSS) et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Grafana Labs | N/A | Grafana versions 11.6.x antérieures à 11.6.3+security-01 | ||
| Grafana Labs | N/A | Grafana versions 11.4.x antérieures à 11.4.6+security-01 | ||
| Grafana Labs | N/A | Grafana versions antérieures à 11.3.8+security-01 | ||
| Grafana Labs | N/A | Grafana versions 12.0.x antérieures à 12.0.2+security-01 | ||
| Grafana Labs | N/A | Grafana versions 11.5.x antérieures à 11.5.6+security-01 |
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Grafana versions 11.6.x ant\u00e9rieures \u00e0 11.6.3+security-01",
"product": {
"name": "N/A",
"vendor": {
"name": "Grafana Labs",
"scada": false
}
}
},
{
"description": "Grafana versions 11.4.x ant\u00e9rieures \u00e0 11.4.6+security-01",
"product": {
"name": "N/A",
"vendor": {
"name": "Grafana Labs",
"scada": false
}
}
},
{
"description": "Grafana versions ant\u00e9rieures \u00e0 11.3.8+security-01",
"product": {
"name": "N/A",
"vendor": {
"name": "Grafana Labs",
"scada": false
}
}
},
{
"description": "Grafana versions 12.0.x ant\u00e9rieures \u00e0 12.0.2+security-01",
"product": {
"name": "N/A",
"vendor": {
"name": "Grafana Labs",
"scada": false
}
}
},
{
"description": "Grafana versions 11.5.x ant\u00e9rieures \u00e0 11.5.6+security-01",
"product": {
"name": "N/A",
"vendor": {
"name": "Grafana Labs",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-6023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6023"
},
{
"name": "CVE-2025-6197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6197"
}
],
"initial_release_date": "2025-07-18T00:00:00",
"last_revision_date": "2025-07-18T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0597",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Grafana. Elles permettent \u00e0 un attaquant de provoquer une injection de code indirecte \u00e0 distance (XSS) et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Grafana",
"vendor_advisories": [
{
"published_at": "2025-07-17",
"title": "Bulletin de s\u00e9curit\u00e9 Grafana cve-2025-6197",
"url": "https://grafana.com/blog/2025/07/17/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-6197-and-cve-2025-6023/"
}
]
}
wid-sec-w-2025-1593
Vulnerability from csaf_certbund
Published
2025-07-17 22:00
Modified
2025-07-27 22:00
Summary
Grafana: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Grafana ist eine Open-Source Analyse- und Visualisierungssoftware.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Grafana ausnutzen, um einen Cross-Site Scripting Angriff durchzuführen und um Daten zu manipulieren.
Betroffene Betriebssysteme
- Sonstiges
- UNIX
- Windows
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Grafana ist eine Open-Source Analyse- und Visualisierungssoftware.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Grafana ausnutzen, um einen Cross-Site Scripting Angriff durchzuf\u00fchren und um Daten zu manipulieren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1593 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1593.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1593 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1593"
},
{
"category": "external",
"summary": "Grafana security release vom 2025-07-17",
"url": "https://grafana.com/blog/2025/07/17/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-6197-and-cve-2025-6023/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15372-1 vom 2025-07-25",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MNRNDD7KU4ETCJFFYOE7LEYOFJQCGAG/"
}
],
"source_lang": "en-US",
"title": "Grafana: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-07-27T22:00:00.000+00:00",
"generator": {
"date": "2025-07-28T07:54:39.913+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1593",
"initial_release_date": "2025-07-17T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-07-17T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-07-27T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von openSUSE aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c12.0.2+security-01",
"product": {
"name": "Open Source Grafana \u003c12.0.2+security-01",
"product_id": "T045503"
}
},
{
"category": "product_version",
"name": "12.0.2+security-01",
"product": {
"name": "Open Source Grafana 12.0.2+security-01",
"product_id": "T045503-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:grafana:grafana:12.0.2security-01"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.6.3+security-01",
"product": {
"name": "Open Source Grafana \u003c11.6.3+security-01",
"product_id": "T045504"
}
},
{
"category": "product_version",
"name": "11.6.3+security-01",
"product": {
"name": "Open Source Grafana 11.6.3+security-01",
"product_id": "T045504-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:grafana:grafana:11.6.3security-01"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.5.6+security-01",
"product": {
"name": "Open Source Grafana \u003c11.5.6+security-01",
"product_id": "T045505"
}
},
{
"category": "product_version",
"name": "11.5.6+security-01",
"product": {
"name": "Open Source Grafana 11.5.6+security-01",
"product_id": "T045505-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:grafana:grafana:11.5.6security-01"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.4.6+security-01",
"product": {
"name": "Open Source Grafana \u003c11.4.6+security-01",
"product_id": "T045506"
}
},
{
"category": "product_version",
"name": "11.4.6+security-01",
"product": {
"name": "Open Source Grafana 11.4.6+security-01",
"product_id": "T045506-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:grafana:grafana:11.4.6security-01"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.3.8+security-01",
"product": {
"name": "Open Source Grafana \u003c11.3.8+security-01",
"product_id": "T045507"
}
},
{
"category": "product_version",
"name": "11.3.8+security-01",
"product": {
"name": "Open Source Grafana 11.3.8+security-01",
"product_id": "T045507-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:grafana:grafana:11.3.8security-01"
}
}
}
],
"category": "product_name",
"name": "Grafana"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6023",
"product_status": {
"known_affected": [
"T045503",
"T045505",
"T045504",
"T045507",
"T045506",
"T027843"
]
},
"release_date": "2025-07-17T22:00:00.000+00:00",
"title": "CVE-2025-6023"
},
{
"cve": "CVE-2025-6197",
"product_status": {
"known_affected": [
"T045503",
"T045505",
"T045504",
"T045507",
"T045506",
"T027843"
]
},
"release_date": "2025-07-17T22:00:00.000+00:00",
"title": "CVE-2025-6197"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…