Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-6197 (GCVE-0-2025-6197)
Vulnerability from cvelistv5
Published
2025-07-18 07:48
Modified
2025-07-18 13:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.
Prerequisites for exploitation:
- Multiple organizations must exist in the Grafana instance
- Victim must be on a different organization than the one specified in the URL
References
Impacted products
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-6197",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-18T13:45:54.505880Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-18T13:46:01.307Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Grafana",
"vendor": "Grafana",
"versions": [
{
"lessThan": "12.0.2+security-01",
"status": "affected",
"version": "12.0.x",
"versionType": "semver"
},
{
"lessThan": "11.6.3+security-01",
"status": "affected",
"version": "11.6.x",
"versionType": "semver"
},
{
"lessThan": "11.5.6+security-01",
"status": "affected",
"version": "11.5.x",
"versionType": "semver"
},
{
"lessThan": "11.4.6+security-01",
"status": "affected",
"version": "11.4.x",
"versionType": "semver"
},
{
"lessThan": "11.3.8+security-01",
"status": "affected",
"version": "11.3.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Dat Phung"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eAn open redirect vulnerability has been identified in Grafana OSS organization switching functionality.\u003cbr\u003e\u003c/p\u003e\u003cp\u003ePrerequisites for exploitation:\u003c/p\u003e\u003cp\u003e- Multiple organizations must exist in the Grafana instance\u003c/p\u003e\u003cp\u003e- Victim must be on a different organization than the one specified in the URL\u003c/p\u003e\u003cp\u003e\u003cbr\u003e\u003c/p\u003e"
}
],
"value": "An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.\n\n\nPrerequisites for exploitation:\n\n- Multiple organizations must exist in the Grafana instance\n\n- Victim must be on a different organization than the one specified in the URL"
}
],
"impacts": [
{
"capecId": "CAPEC-194",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-194"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-601",
"description": "CWE-601",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-18T07:49:16.382Z",
"orgId": "57da9224-a3e2-4646-9d0e-c4dc2e05e7da",
"shortName": "GRAFANA"
},
"references": [
{
"name": "Vulnerable code location",
"tags": [
"vendor-advisory"
],
"url": "https://grafana.com/security/security-advisories/cve-2025-6197/"
},
{
"tags": [
"mitigation",
"release-notes"
],
"url": "https://grafana.com/blog/2025/07/17/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-6197-and-cve-2025-6023/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "57da9224-a3e2-4646-9d0e-c4dc2e05e7da",
"assignerShortName": "GRAFANA",
"cveId": "CVE-2025-6197",
"datePublished": "2025-07-18T07:48:22.523Z",
"dateReserved": "2025-06-17T07:22:18.547Z",
"dateUpdated": "2025-07-18T13:46:01.307Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-6197\",\"sourceIdentifier\":\"security@grafana.com\",\"published\":\"2025-07-18T08:15:28.187\",\"lastModified\":\"2025-07-22T13:06:27.983\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.\\n\\n\\nPrerequisites for exploitation:\\n\\n- Multiple organizations must exist in the Grafana instance\\n\\n- Victim must be on a different organization than the one specified in the URL\"},{\"lang\":\"es\",\"value\":\"Se ha identificado una vulnerabilidad de redirecci\u00f3n abierta en la funcionalidad de cambio de organizaci\u00f3n de Grafana OSS. Requisitos para su explotaci\u00f3n: - Deben existir varias organizaciones en la instancia de Grafana. - La v\u00edctima debe pertenecer a una organizaci\u00f3n diferente a la especificada en la URL.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@grafana.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N\",\"baseScore\":4.2,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"security@grafana.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-601\"}]}],\"references\":[{\"url\":\"https://grafana.com/blog/2025/07/17/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-6197-and-cve-2025-6023/\",\"source\":\"security@grafana.com\"},{\"url\":\"https://grafana.com/security/security-advisories/cve-2025-6197/\",\"source\":\"security@grafana.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-6197\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-18T13:45:54.505880Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-18T13:45:58.520Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Dat Phung\"}], \"impacts\": [{\"capecId\": \"CAPEC-194\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-194\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.2, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Grafana\", \"product\": \"Grafana\", \"versions\": [{\"status\": \"affected\", \"version\": \"12.0.x\", \"lessThan\": \"12.0.2+security-01\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.6.x\", \"lessThan\": \"11.6.3+security-01\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.5.x\", \"lessThan\": \"11.5.6+security-01\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.4.x\", \"lessThan\": \"11.4.6+security-01\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.3.x\", \"lessThan\": \"11.3.8+security-01\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://grafana.com/security/security-advisories/cve-2025-6197/\", \"name\": \"Vulnerable code location\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://grafana.com/blog/2025/07/17/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-6197-and-cve-2025-6023/\", \"tags\": [\"mitigation\", \"release-notes\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.\\n\\n\\nPrerequisites for exploitation:\\n\\n- Multiple organizations must exist in the Grafana instance\\n\\n- Victim must be on a different organization than the one specified in the URL\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eAn open redirect vulnerability has been identified in Grafana OSS organization switching functionality.\u003cbr\u003e\u003c/p\u003e\u003cp\u003ePrerequisites for exploitation:\u003c/p\u003e\u003cp\u003e- Multiple organizations must exist in the Grafana instance\u003c/p\u003e\u003cp\u003e- Victim must be on a different organization than the one specified in the URL\u003c/p\u003e\u003cp\u003e\u003cbr\u003e\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-601\", \"description\": \"CWE-601\"}]}], \"providerMetadata\": {\"orgId\": \"57da9224-a3e2-4646-9d0e-c4dc2e05e7da\", \"shortName\": \"GRAFANA\", \"dateUpdated\": \"2025-07-18T07:49:16.382Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-6197\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-07-18T13:46:01.307Z\", \"dateReserved\": \"2025-06-17T07:22:18.547Z\", \"assignerOrgId\": \"57da9224-a3e2-4646-9d0e-c4dc2e05e7da\", \"datePublished\": \"2025-07-18T07:48:22.523Z\", \"assignerShortName\": \"GRAFANA\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
suse-su-2025:3819-1
Vulnerability from csaf_suse
Published
2025-10-28 07:20
Modified
2025-10-28 07:20
Summary
Security update 5.1.1 for Multi-Linux Manager Client Tools
Notes
Title of the patch
Security update 5.1.1 for Multi-Linux Manager Client Tools
Description of the patch
This update fixes the following issues:
dracut-saltboot was updated from version 0.1 to version 1.0.0:
- Version 1.0.0 bugs fixed:
* Reboot on salt key timeout (bsc#1237495)
* Fixed parsing files with space in the name (bsc#1252100)
golang-github-prometheus-alertmanager was updated from version 0.26.0 to 0.28.1 to :
- Security issues fixed:
* CVE-2025-47908: Fixed a Denial of Service vulnerability (bsc#1247748)
- Version 0.28.1 changes and bugs fixed (jsc#PED-13285):
* Improved performance of inhibition rules when using Equal
labels.
* Improve the documentation on escaping in UTF-8 matchers.
* Update alertmanager_config_hash metric help to document the
hash is not cryptographically strong.
* Fixed panic in amtool when using --verbose.
* Fixed templating of channel field for Rocket.Chat.
* Fixed rocketchat_configs written as rocket_configs in docs.
* Fixed usage for --enable-feature flag.
* Trim whitespace from OpsGenie API Key.
* Fixed Jira project template not rendered when searching for
existing issues.
* Fixed subtle bug in JSON/YAML encoding of inhibition rules that
would cause Equal labels to be omitted.
* Fixed header for slack_configs in docs.
* Fixed weight and wrap of Microsoft Teams notifications.
- Version 0.28.0 changes and bugs fixed:
* Templating errors in the SNS integration now return an error.
* Adopt log/slog, drop go-kit/log.
* Added a new Microsoft Teams integration based on Flows.
* Added a new Rocket.Chat integration.
* Added a new Jira integration.
* Added support for GOMEMLIMIT, enable it via the feature flag
--enable-feature=auto-gomemlimit.
* Added support for GOMAXPROCS, enable it via the feature flag
--enable-feature=auto-gomaxprocs.
* Added support for limits of silences including the maximum number
of active and pending silences, and the maximum size per
silence (in bytes). You can use the flags
--silences.max-silences and --silences.max-silence-size-bytes
to set them accordingly.
* Muted alerts now show whether they are suppressed or not in
both the /api/v2/alerts endpoint and the Alertmanager UI.
- Version 0.27.0 changes and bugs fixed:
* API: Removal of all api/v1/ endpoints. These endpoints
now log and return a deprecation message and respond with a
status code of 410.
* UTF-8 Support: Introduction of support for any UTF-8
character as part of label names and matchers.
* Discord Integration: Enforce max length in message.
* Metrics: Introduced the experimental feature flag
--enable-feature=receiver-name-in-metrics to include the
receiver name.
* Metrics: Introduced a new gauge named
alertmanager_inhibition_rules that counts the number of
configured inhibition rules.
* Metrics: Introduced a new counter named
alertmanager_alerts_supressed_total that tracks muted alerts,
it contains a reason label to indicate the source of the mute.
* Discord Integration: Introduced support for webhook_url_file.
* Microsoft Teams Integration: Introduced support for
webhook_url_file.
* Microsoft Teams Integration: Added support for summary.
* Metrics: Notification metrics now support two new values for
the label reason, contextCanceled and contextDeadlineExceeded.
* Email Integration: Contents of auth_password_file are now
trimmed of prefixed and suffixed whitespace.
* amtool: Fixes the error scheme required for webhook url when
using amtool with --alertmanager.url.
* Mixin: Fixed AlertmanagerFailedToSendAlerts,
AlertmanagerClusterFailedToSendAlerts, and
AlertmanagerClusterFailedToSendAlerts to make sure they ignore
the reason label.
grafana was updated to from version 11.5.5 to 11.5.7:
- Security issues fixed:
* CVE-2025-6023: Fixed cross-site-scripting via scripted dashboards (bsc#1246735)
* CVE-2025-6197: Fixed open redirect in organization switching (bsc#1246736)
* CVE-2025-3415: Fixed exposure of DingDing alerting integration URL to Viewer level users (bsc#1245302)
- Other bugs fixed:
* Azure: Fixed legend formatting.
* Azure: Fixed resource name determination in template variable queries.
mgr-push was updated from version 5.1.3 to 5.1.4:
- Use absolute paths when invoking external commands
python-defusedxml:
- New package implemented at version 0.7.1
rhnlib was updated from version 5.1.2 to 5.1.3:
- Use more secure defusedxml parser (bsc#1227577)
spacecmd was updated from version 5.1.8 to 5.1.11:
- Version 5.1.11 changes and bugs fixed:
* Make spacecmd work with Python 3.12 and higher
* Call print statements properly in Python 3
- Version 5.1.10 changes and bugs fixed:
* Fixed use of renamed config parser class where the backward
compatible alias was dropped in latest python version
(bsc#1246586)
- Version 5.1.9 changes and bugs fixed:
* Fixed installation of python lib files on Ubuntu 24.04
spacewalk-client-tools was updated from version 5.1.6 to 5.1.7:
- Fixed syntax error in changelog
supportutils-plugin-susemanager-client was updated from version 5.1.3 to 5.1.4:
- Fixed syntax error in changelog
uyuni-tools was updated from version 5.1.15 to 5.1.20:
- Version 5.1.20 changes and bugs fixed:
* Added migration for server monitoring configuration (bsc#1247688)
- Version 5.1.19 changes and bugs fixed:
* Added a lowercase version of --logLevel (bsc#1243611)
* Stop executing scripts in temporary folder (bsc#1243704)
* support config: collect podman inspect for hub container (bsc#1245099)
* Use new dedicated path for Cobbler settings (bsc#1244027)
* Migrate custom auto installation snippets (bsc#1246320)
* Added SUSE Linux Enterprise 15 SP7 to buildin productmap
* Fixed loading product map from mgradm configuration file (bsc#1246068)
* Fixed channel override for distro copy
* Do not use sudo when running as a root user (bsc#1246882)
* Do not require backups to be at the same location for restoring (bsc#1246906)
* Fixed recomputing proxy images when installing a PTF or TEST (bsc#1246553)
* Added mgradm server rename to change the server FQDN (bsc#1229825)
* If no DB SSL CA parameter is given, use the other one (bsc#1245120)
* More fault tolerant mgradm stop (bsc#1243331)
* Backup systemd dropin directory too and create if missing
* Added 3rd party SSL options for upgrade and migration scenarios
* Do not consider stderr output of podman as an error (bsc#1247836)
* Restore SELinux contexts for restored backup volumes (bsc#1244127)
* Automatically get up-to-date systemid file on salt based proxy hosts (bsc#1246789)
* Bump the default image tag to 5.1.1
- Version 5.1.18 changes and bugs fixed:
* Updated translation strings
- Version 5.1.17 changes and bugs fixed:
* Upgrade of saline should use scale function (bsc#1246864)
- Version 5.1.16 changes and bugs fixed:
* Use database backup volume as temporary backup location (bsc#1246628)
Patchnames
SUSE-2025-3819,SUSE-MultiLinuxManagerTools-SLE-15-2025-3819,SUSE-MultiLinuxManagerTools-SLE-Micro-5-2025-3819
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update 5.1.1 for Multi-Linux Manager Client Tools",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update fixes the following issues:\n\ndracut-saltboot was updated from version 0.1 to version 1.0.0:\n\n- Version 1.0.0 bugs fixed:\n \n * Reboot on salt key timeout (bsc#1237495)\n * Fixed parsing files with space in the name (bsc#1252100)\n\ngolang-github-prometheus-alertmanager was updated from version 0.26.0 to 0.28.1 to :\n\n- Security issues fixed:\n\n * CVE-2025-47908: Fixed a Denial of Service vulnerability (bsc#1247748)\n\n- Version 0.28.1 changes and bugs fixed (jsc#PED-13285):\n\n * Improved performance of inhibition rules when using Equal\n labels.\n * Improve the documentation on escaping in UTF-8 matchers.\n * Update alertmanager_config_hash metric help to document the\n hash is not cryptographically strong.\n * Fixed panic in amtool when using --verbose.\n * Fixed templating of channel field for Rocket.Chat.\n * Fixed rocketchat_configs written as rocket_configs in docs.\n * Fixed usage for --enable-feature flag.\n * Trim whitespace from OpsGenie API Key.\n * Fixed Jira project template not rendered when searching for\n existing issues.\n * Fixed subtle bug in JSON/YAML encoding of inhibition rules that\n would cause Equal labels to be omitted.\n * Fixed header for slack_configs in docs.\n * Fixed weight and wrap of Microsoft Teams notifications.\n \n- Version 0.28.0 changes and bugs fixed:\n\n * Templating errors in the SNS integration now return an error.\n * Adopt log/slog, drop go-kit/log.\n * Added a new Microsoft Teams integration based on Flows.\n * Added a new Rocket.Chat integration.\n * Added a new Jira integration.\n * Added support for GOMEMLIMIT, enable it via the feature flag\n --enable-feature=auto-gomemlimit.\n * Added support for GOMAXPROCS, enable it via the feature flag\n --enable-feature=auto-gomaxprocs.\n * Added support for limits of silences including the maximum number\n of active and pending silences, and the maximum size per\n silence (in bytes). You can use the flags\n --silences.max-silences and --silences.max-silence-size-bytes\n to set them accordingly.\n * Muted alerts now show whether they are suppressed or not in\n both the /api/v2/alerts endpoint and the Alertmanager UI.\n\n- Version 0.27.0 changes and bugs fixed:\n\n * API: Removal of all api/v1/ endpoints. These endpoints\n now log and return a deprecation message and respond with a\n status code of 410.\n * UTF-8 Support: Introduction of support for any UTF-8\n character as part of label names and matchers.\n * Discord Integration: Enforce max length in message.\n * Metrics: Introduced the experimental feature flag\n --enable-feature=receiver-name-in-metrics to include the\n receiver name.\n * Metrics: Introduced a new gauge named\n alertmanager_inhibition_rules that counts the number of\n configured inhibition rules.\n * Metrics: Introduced a new counter named\n alertmanager_alerts_supressed_total that tracks muted alerts,\n it contains a reason label to indicate the source of the mute.\n * Discord Integration: Introduced support for webhook_url_file.\n * Microsoft Teams Integration: Introduced support for\n webhook_url_file.\n * Microsoft Teams Integration: Added support for summary.\n * Metrics: Notification metrics now support two new values for\n the label reason, contextCanceled and contextDeadlineExceeded.\n * Email Integration: Contents of auth_password_file are now\n trimmed of prefixed and suffixed whitespace.\n * amtool: Fixes the error scheme required for webhook url when\n using amtool with --alertmanager.url.\n * Mixin: Fixed AlertmanagerFailedToSendAlerts,\n AlertmanagerClusterFailedToSendAlerts, and\n AlertmanagerClusterFailedToSendAlerts to make sure they ignore\n the reason label.\n\ngrafana was updated to from version 11.5.5 to 11.5.7:\n \n- Security issues fixed:\n\n * CVE-2025-6023: Fixed cross-site-scripting via scripted dashboards (bsc#1246735)\n * CVE-2025-6197: Fixed open redirect in organization switching (bsc#1246736)\n * CVE-2025-3415: Fixed exposure of DingDing alerting integration URL to Viewer level users (bsc#1245302)\n\n- Other bugs fixed:\n\n * Azure: Fixed legend formatting.\n * Azure: Fixed resource name determination in template variable queries.\n\nmgr-push was updated from version 5.1.3 to 5.1.4:\n\n- Use absolute paths when invoking external commands\n\npython-defusedxml:\n\n- New package implemented at version 0.7.1\n\nrhnlib was updated from version 5.1.2 to 5.1.3:\n\n- Use more secure defusedxml parser (bsc#1227577)\n\nspacecmd was updated from version 5.1.8 to 5.1.11:\n\n- Version 5.1.11 changes and bugs fixed:\n\n * Make spacecmd work with Python 3.12 and higher\n * Call print statements properly in Python 3\n\n- Version 5.1.10 changes and bugs fixed:\n\n * Fixed use of renamed config parser class where the backward\n compatible alias was dropped in latest python version\n (bsc#1246586)\n\n- Version 5.1.9 changes and bugs fixed:\n\n * Fixed installation of python lib files on Ubuntu 24.04\n\nspacewalk-client-tools was updated from version 5.1.6 to 5.1.7:\n\n- Fixed syntax error in changelog\n\nsupportutils-plugin-susemanager-client was updated from version 5.1.3 to 5.1.4:\n\n- Fixed syntax error in changelog\n\nuyuni-tools was updated from version 5.1.15 to 5.1.20:\n\n- Version 5.1.20 changes and bugs fixed:\n\n * Added migration for server monitoring configuration (bsc#1247688)\n\n- Version 5.1.19 changes and bugs fixed:\n\n * Added a lowercase version of --logLevel (bsc#1243611)\n * Stop executing scripts in temporary folder (bsc#1243704)\n * support config: collect podman inspect for hub container (bsc#1245099)\n * Use new dedicated path for Cobbler settings (bsc#1244027)\n * Migrate custom auto installation snippets (bsc#1246320)\n * Added SUSE Linux Enterprise 15 SP7 to buildin productmap\n * Fixed loading product map from mgradm configuration file (bsc#1246068)\n * Fixed channel override for distro copy\n * Do not use sudo when running as a root user (bsc#1246882)\n * Do not require backups to be at the same location for restoring (bsc#1246906)\n * Fixed recomputing proxy images when installing a PTF or TEST (bsc#1246553)\n * Added mgradm server rename to change the server FQDN (bsc#1229825)\n * If no DB SSL CA parameter is given, use the other one (bsc#1245120)\n * More fault tolerant mgradm stop (bsc#1243331)\n * Backup systemd dropin directory too and create if missing\n * Added 3rd party SSL options for upgrade and migration scenarios\n * Do not consider stderr output of podman as an error (bsc#1247836)\n * Restore SELinux contexts for restored backup volumes (bsc#1244127)\n * Automatically get up-to-date systemid file on salt based proxy hosts (bsc#1246789)\n * Bump the default image tag to 5.1.1\n\n- Version 5.1.18 changes and bugs fixed:\n\n * Updated translation strings\n \n- Version 5.1.17 changes and bugs fixed:\n\n * Upgrade of saline should use scale function (bsc#1246864)\n\n- Version 5.1.16 changes and bugs fixed:\n\n * Use database backup volume as temporary backup location (bsc#1246628)\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-3819,SUSE-MultiLinuxManagerTools-SLE-15-2025-3819,SUSE-MultiLinuxManagerTools-SLE-Micro-5-2025-3819",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_3819-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:3819-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253819-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:3819-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023070.html"
},
{
"category": "self",
"summary": "SUSE Bug 1019074",
"url": "https://bugzilla.suse.com/1019074"
},
{
"category": "self",
"summary": "SUSE Bug 1227577",
"url": "https://bugzilla.suse.com/1227577"
},
{
"category": "self",
"summary": "SUSE Bug 1229825",
"url": "https://bugzilla.suse.com/1229825"
},
{
"category": "self",
"summary": "SUSE Bug 1237495",
"url": "https://bugzilla.suse.com/1237495"
},
{
"category": "self",
"summary": "SUSE Bug 1243331",
"url": "https://bugzilla.suse.com/1243331"
},
{
"category": "self",
"summary": "SUSE Bug 1243611",
"url": "https://bugzilla.suse.com/1243611"
},
{
"category": "self",
"summary": "SUSE Bug 1243704",
"url": "https://bugzilla.suse.com/1243704"
},
{
"category": "self",
"summary": "SUSE Bug 1244027",
"url": "https://bugzilla.suse.com/1244027"
},
{
"category": "self",
"summary": "SUSE Bug 1244127",
"url": "https://bugzilla.suse.com/1244127"
},
{
"category": "self",
"summary": "SUSE Bug 1245099",
"url": "https://bugzilla.suse.com/1245099"
},
{
"category": "self",
"summary": "SUSE Bug 1245120",
"url": "https://bugzilla.suse.com/1245120"
},
{
"category": "self",
"summary": "SUSE Bug 1245302",
"url": "https://bugzilla.suse.com/1245302"
},
{
"category": "self",
"summary": "SUSE Bug 1246068",
"url": "https://bugzilla.suse.com/1246068"
},
{
"category": "self",
"summary": "SUSE Bug 1246320",
"url": "https://bugzilla.suse.com/1246320"
},
{
"category": "self",
"summary": "SUSE Bug 1246553",
"url": "https://bugzilla.suse.com/1246553"
},
{
"category": "self",
"summary": "SUSE Bug 1246586",
"url": "https://bugzilla.suse.com/1246586"
},
{
"category": "self",
"summary": "SUSE Bug 1246628",
"url": "https://bugzilla.suse.com/1246628"
},
{
"category": "self",
"summary": "SUSE Bug 1246735",
"url": "https://bugzilla.suse.com/1246735"
},
{
"category": "self",
"summary": "SUSE Bug 1246736",
"url": "https://bugzilla.suse.com/1246736"
},
{
"category": "self",
"summary": "SUSE Bug 1246789",
"url": "https://bugzilla.suse.com/1246789"
},
{
"category": "self",
"summary": "SUSE Bug 1246864",
"url": "https://bugzilla.suse.com/1246864"
},
{
"category": "self",
"summary": "SUSE Bug 1246882",
"url": "https://bugzilla.suse.com/1246882"
},
{
"category": "self",
"summary": "SUSE Bug 1246906",
"url": "https://bugzilla.suse.com/1246906"
},
{
"category": "self",
"summary": "SUSE Bug 1247688",
"url": "https://bugzilla.suse.com/1247688"
},
{
"category": "self",
"summary": "SUSE Bug 1247748",
"url": "https://bugzilla.suse.com/1247748"
},
{
"category": "self",
"summary": "SUSE Bug 1247836",
"url": "https://bugzilla.suse.com/1247836"
},
{
"category": "self",
"summary": "SUSE Bug 1252100",
"url": "https://bugzilla.suse.com/1252100"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-3415 page",
"url": "https://www.suse.com/security/cve/CVE-2025-3415/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47908 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47908/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6023 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6023/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6197/"
}
],
"title": "Security update 5.1.1 for Multi-Linux Manager Client Tools",
"tracking": {
"current_release_date": "2025-10-28T07:20:07Z",
"generator": {
"date": "2025-10-28T07:20:07Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:3819-1",
"initial_release_date": "2025-10-28T07:20:07Z",
"revision_history": [
{
"date": "2025-10-28T07:20:07Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64"
}
},
{
"category": "product_version",
"name": "grafana-11.5.7-150002.4.3.3.aarch64",
"product": {
"name": "grafana-11.5.7-150002.4.3.3.aarch64",
"product_id": "grafana-11.5.7-150002.4.3.3.aarch64"
}
},
{
"category": "product_version",
"name": "mgrctl-5.1.20-150002.3.3.3.aarch64",
"product": {
"name": "mgrctl-5.1.20-150002.3.3.3.aarch64",
"product_id": "mgrctl-5.1.20-150002.3.3.3.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"product": {
"name": "dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"product_id": "dracut-saltboot-1.0.0-150002.3.3.1.noarch"
}
},
{
"category": "product_version",
"name": "mgr-push-5.1.4-150002.3.3.3.noarch",
"product": {
"name": "mgr-push-5.1.4-150002.3.3.3.noarch",
"product_id": "mgr-push-5.1.4-150002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"product": {
"name": "mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"product_id": "mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"product": {
"name": "mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"product_id": "mgrctl-lang-5.1.20-150002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"product": {
"name": "mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"product_id": "mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "python2-defusedxml-0.7.1-150002.1.3.2.noarch",
"product": {
"name": "python2-defusedxml-0.7.1-150002.1.3.2.noarch",
"product_id": "python2-defusedxml-0.7.1-150002.1.3.2.noarch"
}
},
{
"category": "product_version",
"name": "python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"product": {
"name": "python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"product_id": "python3-defusedxml-0.7.1-150002.1.3.2.noarch"
}
},
{
"category": "product_version",
"name": "python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"product": {
"name": "python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"product_id": "python3-mgr-push-5.1.4-150002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"product": {
"name": "python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"product_id": "python3-rhnlib-5.1.3-150002.3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"product": {
"name": "python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"product_id": "python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "spacecmd-5.1.11-150002.3.3.2.noarch",
"product": {
"name": "spacecmd-5.1.11-150002.3.3.2.noarch",
"product_id": "spacecmd-5.1.11-150002.3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"product": {
"name": "spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"product_id": "spacewalk-client-tools-5.1.7-150002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"product": {
"name": "supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"product_id": "supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le"
}
},
{
"category": "product_version",
"name": "grafana-11.5.7-150002.4.3.3.ppc64le",
"product": {
"name": "grafana-11.5.7-150002.4.3.3.ppc64le",
"product_id": "grafana-11.5.7-150002.4.3.3.ppc64le"
}
},
{
"category": "product_version",
"name": "mgrctl-5.1.20-150002.3.3.3.ppc64le",
"product": {
"name": "mgrctl-5.1.20-150002.3.3.3.ppc64le",
"product_id": "mgrctl-5.1.20-150002.3.3.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x"
}
},
{
"category": "product_version",
"name": "grafana-11.5.7-150002.4.3.3.s390x",
"product": {
"name": "grafana-11.5.7-150002.4.3.3.s390x",
"product_id": "grafana-11.5.7-150002.4.3.3.s390x"
}
},
{
"category": "product_version",
"name": "mgrctl-5.1.20-150002.3.3.3.s390x",
"product": {
"name": "mgrctl-5.1.20-150002.3.3.3.s390x",
"product_id": "mgrctl-5.1.20-150002.3.3.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "grafana-11.5.7-150002.4.3.3.x86_64",
"product": {
"name": "grafana-11.5.7-150002.4.3.3.x86_64",
"product_id": "grafana-11.5.7-150002.4.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "mgrctl-5.1.20-150002.3.3.3.x86_64",
"product": {
"name": "mgrctl-5.1.20-150002.3.3.3.x86_64",
"product_id": "mgrctl-5.1.20-150002.3.3.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Multi Linux Manager Tools SLE-15",
"product": {
"name": "SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15"
}
},
{
"category": "product_name",
"name": "SUSE Multi Linux Manager Tools SLE-Micro-5",
"product": {
"name": "SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-saltboot-1.0.0-150002.3.3.1.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch"
},
"product_reference": "dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64 as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64 as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.7-150002.4.3.3.aarch64 as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64"
},
"product_reference": "grafana-11.5.7-150002.4.3.3.aarch64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.7-150002.4.3.3.ppc64le as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le"
},
"product_reference": "grafana-11.5.7-150002.4.3.3.ppc64le",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.7-150002.4.3.3.s390x as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x"
},
"product_reference": "grafana-11.5.7-150002.4.3.3.s390x",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.7-150002.4.3.3.x86_64 as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64"
},
"product_reference": "grafana-11.5.7-150002.4.3.3.x86_64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgr-push-5.1.4-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch"
},
"product_reference": "mgr-push-5.1.4-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-5.1.20-150002.3.3.3.aarch64 as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64"
},
"product_reference": "mgrctl-5.1.20-150002.3.3.3.aarch64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-5.1.20-150002.3.3.3.ppc64le as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le"
},
"product_reference": "mgrctl-5.1.20-150002.3.3.3.ppc64le",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-5.1.20-150002.3.3.3.s390x as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x"
},
"product_reference": "mgrctl-5.1.20-150002.3.3.3.s390x",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-5.1.20-150002.3.3.3.x86_64 as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64"
},
"product_reference": "mgrctl-5.1.20-150002.3.3.3.x86_64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch"
},
"product_reference": "mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-lang-5.1.20-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch"
},
"product_reference": "mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
},
"product_reference": "mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-defusedxml-0.7.1-150002.1.3.2.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch"
},
"product_reference": "python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-mgr-push-5.1.4-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch"
},
"product_reference": "python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rhnlib-5.1.3-150002.3.3.2.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch"
},
"product_reference": "python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch"
},
"product_reference": "python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacecmd-5.1.11-150002.3.3.2.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch"
},
"product_reference": "spacecmd-5.1.11-150002.3.3.2.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-client-tools-5.1.7-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch"
},
"product_reference": "spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch"
},
"product_reference": "supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-saltboot-1.0.0-150002.3.3.1.noarch as component of SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch"
},
"product_reference": "dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-Micro-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-5.1.20-150002.3.3.3.aarch64 as component of SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64"
},
"product_reference": "mgrctl-5.1.20-150002.3.3.3.aarch64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-Micro-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-5.1.20-150002.3.3.3.ppc64le as component of SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le"
},
"product_reference": "mgrctl-5.1.20-150002.3.3.3.ppc64le",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-Micro-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-5.1.20-150002.3.3.3.s390x as component of SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x"
},
"product_reference": "mgrctl-5.1.20-150002.3.3.3.s390x",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-Micro-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-5.1.20-150002.3.3.3.x86_64 as component of SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64"
},
"product_reference": "mgrctl-5.1.20-150002.3.3.3.x86_64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-Micro-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch"
},
"product_reference": "mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-Micro-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-lang-5.1.20-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch"
},
"product_reference": "mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-Micro-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
},
"product_reference": "mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-Micro-5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-3415",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-3415"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. The Grafana Alerting DingDing integration was not properly protected and could be exposed to users with Viewer permission. \nFixed in versions 10.4.19+security-01, 11.2.10+security-01, 11.3.7+security-01, 11.4.5+security-01, 11.5.5+security-01, 11.6.2+security-01 and 12.0.1+security-01",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-3415",
"url": "https://www.suse.com/security/cve/CVE-2025-3415"
},
{
"category": "external",
"summary": "SUSE Bug 1245302 for CVE-2025-3415",
"url": "https://bugzilla.suse.com/1245302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-28T07:20:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-3415"
},
{
"cve": "CVE-2025-47908",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47908"
}
],
"notes": [
{
"category": "general",
"text": "Middleware causes a prohibitive amount of heap allocations when processing malicious preflight requests that include a Access-Control-Request-Headers (ACRH) header whose value contains many commas. This behavior can be abused by attackers to produce undue load on the middleware/server as an attempt to cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47908",
"url": "https://www.suse.com/security/cve/CVE-2025-47908"
},
{
"category": "external",
"summary": "SUSE Bug 1247746 for CVE-2025-47908",
"url": "https://bugzilla.suse.com/1247746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-28T07:20:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-47908"
},
{
"cve": "CVE-2025-6023",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6023"
}
],
"notes": [
{
"category": "general",
"text": "An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.\n\nThe open redirect can be chained with path traversal vulnerabilities to achieve XSS.\n\nFixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6023",
"url": "https://www.suse.com/security/cve/CVE-2025-6023"
},
{
"category": "external",
"summary": "SUSE Bug 1246735 for CVE-2025-6023",
"url": "https://bugzilla.suse.com/1246735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-28T07:20:07Z",
"details": "important"
}
],
"title": "CVE-2025-6023"
},
{
"cve": "CVE-2025-6197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6197"
}
],
"notes": [
{
"category": "general",
"text": "An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.\n\n\nPrerequisites for exploitation:\n\n- Multiple organizations must exist in the Grafana instance\n\n- Victim must be on a different organization than the one specified in the URL",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6197",
"url": "https://www.suse.com/security/cve/CVE-2025-6197"
},
{
"category": "external",
"summary": "SUSE Bug 1246736 for CVE-2025-6197",
"url": "https://bugzilla.suse.com/1246736"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-28T07:20:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-6197"
}
]
}
suse-su-2025:3817-1
Vulnerability from csaf_suse
Published
2025-10-28 07:19
Modified
2025-10-28 07:19
Summary
Security update 5.1.1 for Multi-Linux Manager Client Tools
Notes
Title of the patch
Security update 5.1.1 for Multi-Linux Manager Client Tools
Description of the patch
This update fixes the following issues:
golang-github-prometheus-alertmanager:
- Update to version 0.28.1 (jsc#PED-13285):
* Improved performance of inhibition rules when using Equal
labels.
* Improve the documentation on escaping in UTF-8 matchers.
* Update alertmanager_config_hash metric help to document the
hash is not cryptographically strong.
* Fix panic in amtool when using --verbose.
* Fix templating of channel field for Rocket.Chat.
* Fix rocketchat_configs written as rocket_configs in docs.
* Fix usage for --enable-feature flag.
* Trim whitespace from OpsGenie API Key.
* Fix Jira project template not rendered when searching for
existing issues.
* Fix subtle bug in JSON/YAML encoding of inhibition rules that
would cause Equal labels to be omitted.
* Fix header for slack_configs in docs.
* Fix weight and wrap of Microsoft Teams notifications.
- Upgrade to version 0.28.0:
* CVE-2025-47908: Bump github.com/rs/cors (bsc#1247748).
* Templating errors in the SNS integration now return an error.
* Adopt log/slog, drop go-kit/log.
* Add a new Microsoft Teams integration based on Flows.
* Add a new Rocket.Chat integration.
* Add a new Jira integration.
* Add support for GOMEMLIMIT, enable it via the feature flag
--enable-feature=auto-gomemlimit.
* Add support for GOMAXPROCS, enable it via the feature flag
--enable-feature=auto-gomaxprocs.
* Add support for limits of silences including the maximum number
of active and pending silences, and the maximum size per
silence (in bytes). You can use the flags
--silences.max-silences and --silences.max-silence-size-bytes
to set them accordingly.
* Muted alerts now show whether they are suppressed or not in
both the /api/v2/alerts endpoint and the Alertmanager UI.
- Upgrade to version 0.27.0:
* API: Removal of all api/v1/ endpoints. These endpoints
now log and return a deprecation message and respond with a
status code of 410.
* UTF-8 Support: Introduction of support for any UTF-8
character as part of label names and matchers.
* Discord Integration: Enforce max length in message.
* Metrics: Introduced the experimental feature flag
--enable-feature=receiver-name-in-metrics to include the
receiver name.
* Metrics: Introduced a new gauge named
alertmanager_inhibition_rules that counts the number of
configured inhibition rules.
* Metrics: Introduced a new counter named
alertmanager_alerts_supressed_total that tracks muted alerts,
it contains a reason label to indicate the source of the mute.
* Discord Integration: Introduced support for webhook_url_file.
* Microsoft Teams Integration: Introduced support for
webhook_url_file.
* Microsoft Teams Integration: Add support for summary.
* Metrics: Notification metrics now support two new values for
the label reason, contextCanceled and contextDeadlineExceeded.
* Email Integration: Contents of auth_password_file are now
trimmed of prefixed and suffixed whitespace.
* amtool: Fixes the error scheme required for webhook url when
using amtool with --alertmanager.url.
* Mixin: Fix AlertmanagerFailedToSendAlerts,
AlertmanagerClusterFailedToSendAlerts, and
AlertmanagerClusterFailedToSendAlerts to make sure they ignore
the reason label.
grafana:
- Update to version 11.5.7:
* Security:
CVE-2025-6023: Fix cross-site-scripting via scripted dashboards
(bsc#1246735)
CVE-2025-6197: Fix open redirect in organization switching
(bsc#1246736)
* Bug fixes:
Azure: Fix legend formatting.
Azure: Fix resource name determination in template variable
queries.
- Update to version 11.5.6:
CVE-2025-3415: Fix exposure of DingDing alerting integration
URL to Viewer level users (bsc#1245302)
mgr-push:
- Version 5.1.4-0
* Use absolute paths when invoking external commands
* Fix syntax error in changelog
python-defusedxml:
- Update to 0.6.0
* Increase test coverage.
* Add badges to README.
* Test on Python 3.7 stable and 3.8-dev
* Drop support for Python 3.4
* No longer pass *html* argument to XMLParse. It has been deprecated and
ignored for a long time. The DefusedXMLParser still takes a html argument.
A deprecation warning is issued when the argument is False and a TypeError
when it's True.
* defusedxml now fails early when pyexpat stdlib module is not available or
broken.
* defusedxml.ElementTree.__all__ now lists ParseError as public attribute.
* The defusedxml.ElementTree and defusedxml.cElementTree modules had a typo
and used XMLParse instead of XMLParser as an alias for DefusedXMLParser.
Both the old and fixed name are now available.
- Remove superfluous devel dependency for noarch package
- Fix source url.
- Update to 5.0
* Add compatibility with Python 3.6
* Drop support for Python 2.6, 3.1, 3.2, 3.3
* Fix lxml tests (XMLSyntaxError: Detected an entity reference loop)
- Implement single-spec version.
- Dummy changelog for bsc#1019074, FATE#322329
- Initial packaging.
rhnlib:
- Version 5.1.3-0
* Fix syntax error in changelog
* Use more secure defusedxml parser (bsc#1227577)
spacecmd:
- Version 5.1.11-0
* Make spacecmd work with Python 3.12 and higher
* Call print statements properly in Python 3
- Version 5.1.10-0
* Fix use of renamed config parser class where the backward
compatible alias was dropped in latest python version
(bsc#1246586)
- Version 5.1.9-0
* Fix installation of python lib files on Ubuntu 24.04
spacewalk-client-tools:
- Version 5.1.7-0
* Fix syntax error in changelog
supportutils-plugin-susemanager-client:
- Version 5.1.4-0
* Fix syntax error in changelog
uyuni-tools:
- version 5.1.20-0
* Add migration for server monitoring configuration (bsc#1247688)
- version 5.1.19-0
* Add a lowercase version of --logLevel (bsc#1243611)
* Stop executing scripts in temporary folder (bsc#1243704)
* support config: collect podman inspect for hub container
(bsc#1245099)
* Use new dedicated path for Cobbler settings (bsc#1244027)
* Migrate custom auto installation snippets (bsc#1246320)
* Add SUSE Linux Enterprise 15 SP7 to buildin productmap
* Fix loading product map from mgradm configuration file
(bsc#1246068)
* Fix channel override for distro copy
* Do not use sudo when running as a root user (bsc#1246882)
* Do not require backups to be at the same location for restoring
(bsc#1246906)
* Fix recomputing proxy images when installing a PTF or TEST
(bsc#1246553)
* Add mgradm server rename to change the server FQDN (bsc#1229825)
* If no DB SSL CA parameter is given, use the other one
(bsc#1245120)
* More fault tolerant mgradm stop (bsc#1243331)
* Backup systemd dropin directory too and create if missing
* Add 3rd party SSL options for upgrade and migration scenarios
* Do not consider stderr output of podman as an error
(bsc#1247836)
* Restore SELinux contexts for restored backup volumes
(bsc#1244127)
* Automatically get up-to-date systemid file on salt based proxy
hosts (bsc#1246789)
* Bump the default image tag to 5.1.1
- version 5.1.18-0
* Update translation strings
- version 5.1.17-0
* upgrade saline should use scale function (bsc#1246864)
- version 5.1.16-0
* Use database backup volume as temporary backup location
(bsc#1246628)
Patchnames
SUSE-2025-3817,SUSE-MultiLinuxManagerTools-SLE-12-2025-3817
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update 5.1.1 for Multi-Linux Manager Client Tools",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update fixes the following issues:\n\ngolang-github-prometheus-alertmanager:\n\n- Update to version 0.28.1 (jsc#PED-13285):\n * Improved performance of inhibition rules when using Equal\n labels.\n * Improve the documentation on escaping in UTF-8 matchers.\n * Update alertmanager_config_hash metric help to document the\n hash is not cryptographically strong.\n * Fix panic in amtool when using --verbose.\n * Fix templating of channel field for Rocket.Chat.\n * Fix rocketchat_configs written as rocket_configs in docs.\n * Fix usage for --enable-feature flag.\n * Trim whitespace from OpsGenie API Key.\n * Fix Jira project template not rendered when searching for\n existing issues.\n * Fix subtle bug in JSON/YAML encoding of inhibition rules that\n would cause Equal labels to be omitted.\n * Fix header for slack_configs in docs.\n * Fix weight and wrap of Microsoft Teams notifications.\n- Upgrade to version 0.28.0:\n * CVE-2025-47908: Bump github.com/rs/cors (bsc#1247748).\n * Templating errors in the SNS integration now return an error.\n * Adopt log/slog, drop go-kit/log.\n * Add a new Microsoft Teams integration based on Flows.\n * Add a new Rocket.Chat integration.\n * Add a new Jira integration.\n * Add support for GOMEMLIMIT, enable it via the feature flag\n --enable-feature=auto-gomemlimit.\n * Add support for GOMAXPROCS, enable it via the feature flag\n --enable-feature=auto-gomaxprocs.\n * Add support for limits of silences including the maximum number\n of active and pending silences, and the maximum size per\n silence (in bytes). You can use the flags\n --silences.max-silences and --silences.max-silence-size-bytes\n to set them accordingly.\n * Muted alerts now show whether they are suppressed or not in\n both the /api/v2/alerts endpoint and the Alertmanager UI.\n- Upgrade to version 0.27.0:\n * API: Removal of all api/v1/ endpoints. These endpoints\n now log and return a deprecation message and respond with a\n status code of 410.\n * UTF-8 Support: Introduction of support for any UTF-8\n character as part of label names and matchers.\n * Discord Integration: Enforce max length in message.\n * Metrics: Introduced the experimental feature flag\n --enable-feature=receiver-name-in-metrics to include the\n receiver name.\n * Metrics: Introduced a new gauge named\n alertmanager_inhibition_rules that counts the number of\n configured inhibition rules.\n * Metrics: Introduced a new counter named\n alertmanager_alerts_supressed_total that tracks muted alerts,\n it contains a reason label to indicate the source of the mute.\n * Discord Integration: Introduced support for webhook_url_file.\n * Microsoft Teams Integration: Introduced support for\n webhook_url_file.\n * Microsoft Teams Integration: Add support for summary.\n * Metrics: Notification metrics now support two new values for\n the label reason, contextCanceled and contextDeadlineExceeded.\n * Email Integration: Contents of auth_password_file are now\n trimmed of prefixed and suffixed whitespace.\n * amtool: Fixes the error scheme required for webhook url when\n using amtool with --alertmanager.url.\n * Mixin: Fix AlertmanagerFailedToSendAlerts,\n AlertmanagerClusterFailedToSendAlerts, and\n AlertmanagerClusterFailedToSendAlerts to make sure they ignore\n the reason label.\n\ngrafana:\n\n- Update to version 11.5.7:\n * Security:\n CVE-2025-6023: Fix cross-site-scripting via scripted dashboards\n (bsc#1246735)\n CVE-2025-6197: Fix open redirect in organization switching\n (bsc#1246736)\n * Bug fixes:\n Azure: Fix legend formatting.\n Azure: Fix resource name determination in template variable\n queries.\n- Update to version 11.5.6:\n CVE-2025-3415: Fix exposure of DingDing alerting integration\n URL to Viewer level users (bsc#1245302)\n\nmgr-push:\n\n- Version 5.1.4-0\n * Use absolute paths when invoking external commands\n * Fix syntax error in changelog\n\npython-defusedxml:\n\n- Update to 0.6.0\n * Increase test coverage.\n * Add badges to README.\n * Test on Python 3.7 stable and 3.8-dev\n * Drop support for Python 3.4\n * No longer pass *html* argument to XMLParse. It has been deprecated and\n ignored for a long time. The DefusedXMLParser still takes a html argument.\n A deprecation warning is issued when the argument is False and a TypeError\n when it\u0027s True.\n * defusedxml now fails early when pyexpat stdlib module is not available or\n broken.\n * defusedxml.ElementTree.__all__ now lists ParseError as public attribute.\n * The defusedxml.ElementTree and defusedxml.cElementTree modules had a typo\n and used XMLParse instead of XMLParser as an alias for DefusedXMLParser.\n Both the old and fixed name are now available.\n- Remove superfluous devel dependency for noarch package\n- Fix source url.\n- Update to 5.0\n * Add compatibility with Python 3.6\n * Drop support for Python 2.6, 3.1, 3.2, 3.3\n * Fix lxml tests (XMLSyntaxError: Detected an entity reference loop)\n- Implement single-spec version.\n- Dummy changelog for bsc#1019074, FATE#322329\n- Initial packaging.\n\nrhnlib:\n\n- Version 5.1.3-0\n * Fix syntax error in changelog\n * Use more secure defusedxml parser (bsc#1227577)\n\nspacecmd:\n\n- Version 5.1.11-0\n * Make spacecmd work with Python 3.12 and higher\n * Call print statements properly in Python 3\n- Version 5.1.10-0\n * Fix use of renamed config parser class where the backward\n compatible alias was dropped in latest python version\n (bsc#1246586)\n- Version 5.1.9-0\n * Fix installation of python lib files on Ubuntu 24.04\n\nspacewalk-client-tools:\n\n- Version 5.1.7-0\n * Fix syntax error in changelog\n\nsupportutils-plugin-susemanager-client:\n\n- Version 5.1.4-0\n * Fix syntax error in changelog\n\nuyuni-tools:\n\n- version 5.1.20-0\n * Add migration for server monitoring configuration (bsc#1247688)\n\n- version 5.1.19-0\n * Add a lowercase version of --logLevel (bsc#1243611)\n * Stop executing scripts in temporary folder (bsc#1243704)\n * support config: collect podman inspect for hub container\n (bsc#1245099)\n * Use new dedicated path for Cobbler settings (bsc#1244027)\n * Migrate custom auto installation snippets (bsc#1246320)\n * Add SUSE Linux Enterprise 15 SP7 to buildin productmap\n * Fix loading product map from mgradm configuration file\n (bsc#1246068)\n * Fix channel override for distro copy\n * Do not use sudo when running as a root user (bsc#1246882)\n * Do not require backups to be at the same location for restoring\n (bsc#1246906)\n * Fix recomputing proxy images when installing a PTF or TEST\n (bsc#1246553)\n * Add mgradm server rename to change the server FQDN (bsc#1229825)\n * If no DB SSL CA parameter is given, use the other one\n (bsc#1245120)\n * More fault tolerant mgradm stop (bsc#1243331)\n * Backup systemd dropin directory too and create if missing\n * Add 3rd party SSL options for upgrade and migration scenarios\n * Do not consider stderr output of podman as an error\n (bsc#1247836)\n * Restore SELinux contexts for restored backup volumes\n (bsc#1244127)\n * Automatically get up-to-date systemid file on salt based proxy\n hosts (bsc#1246789)\n * Bump the default image tag to 5.1.1\n\n- version 5.1.18-0\n * Update translation strings\n\n- version 5.1.17-0\n * upgrade saline should use scale function (bsc#1246864)\n\n- version 5.1.16-0\n * Use database backup volume as temporary backup location\n (bsc#1246628)\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-3817,SUSE-MultiLinuxManagerTools-SLE-12-2025-3817",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_3817-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:3817-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253817-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:3817-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023071.html"
},
{
"category": "self",
"summary": "SUSE Bug 1019074",
"url": "https://bugzilla.suse.com/1019074"
},
{
"category": "self",
"summary": "SUSE Bug 1227577",
"url": "https://bugzilla.suse.com/1227577"
},
{
"category": "self",
"summary": "SUSE Bug 1229825",
"url": "https://bugzilla.suse.com/1229825"
},
{
"category": "self",
"summary": "SUSE Bug 1243331",
"url": "https://bugzilla.suse.com/1243331"
},
{
"category": "self",
"summary": "SUSE Bug 1243611",
"url": "https://bugzilla.suse.com/1243611"
},
{
"category": "self",
"summary": "SUSE Bug 1243704",
"url": "https://bugzilla.suse.com/1243704"
},
{
"category": "self",
"summary": "SUSE Bug 1244027",
"url": "https://bugzilla.suse.com/1244027"
},
{
"category": "self",
"summary": "SUSE Bug 1244127",
"url": "https://bugzilla.suse.com/1244127"
},
{
"category": "self",
"summary": "SUSE Bug 1245099",
"url": "https://bugzilla.suse.com/1245099"
},
{
"category": "self",
"summary": "SUSE Bug 1245120",
"url": "https://bugzilla.suse.com/1245120"
},
{
"category": "self",
"summary": "SUSE Bug 1245302",
"url": "https://bugzilla.suse.com/1245302"
},
{
"category": "self",
"summary": "SUSE Bug 1246068",
"url": "https://bugzilla.suse.com/1246068"
},
{
"category": "self",
"summary": "SUSE Bug 1246320",
"url": "https://bugzilla.suse.com/1246320"
},
{
"category": "self",
"summary": "SUSE Bug 1246553",
"url": "https://bugzilla.suse.com/1246553"
},
{
"category": "self",
"summary": "SUSE Bug 1246586",
"url": "https://bugzilla.suse.com/1246586"
},
{
"category": "self",
"summary": "SUSE Bug 1246628",
"url": "https://bugzilla.suse.com/1246628"
},
{
"category": "self",
"summary": "SUSE Bug 1246735",
"url": "https://bugzilla.suse.com/1246735"
},
{
"category": "self",
"summary": "SUSE Bug 1246736",
"url": "https://bugzilla.suse.com/1246736"
},
{
"category": "self",
"summary": "SUSE Bug 1246789",
"url": "https://bugzilla.suse.com/1246789"
},
{
"category": "self",
"summary": "SUSE Bug 1246864",
"url": "https://bugzilla.suse.com/1246864"
},
{
"category": "self",
"summary": "SUSE Bug 1246882",
"url": "https://bugzilla.suse.com/1246882"
},
{
"category": "self",
"summary": "SUSE Bug 1246906",
"url": "https://bugzilla.suse.com/1246906"
},
{
"category": "self",
"summary": "SUSE Bug 1247688",
"url": "https://bugzilla.suse.com/1247688"
},
{
"category": "self",
"summary": "SUSE Bug 1247748",
"url": "https://bugzilla.suse.com/1247748"
},
{
"category": "self",
"summary": "SUSE Bug 1247836",
"url": "https://bugzilla.suse.com/1247836"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-3415 page",
"url": "https://www.suse.com/security/cve/CVE-2025-3415/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47908 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47908/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6023 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6023/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6197/"
}
],
"title": "Security update 5.1.1 for Multi-Linux Manager Client Tools",
"tracking": {
"current_release_date": "2025-10-28T07:19:09Z",
"generator": {
"date": "2025-10-28T07:19:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:3817-1",
"initial_release_date": "2025-10-28T07:19:09Z",
"revision_history": [
{
"date": "2025-10-28T07:19:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"product": {
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"product_id": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"product": {
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"product_id": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "grafana-11.5.7-120002.4.3.2.aarch64",
"product": {
"name": "grafana-11.5.7-120002.4.3.2.aarch64",
"product_id": "grafana-11.5.7-120002.4.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "mgrctl-5.1.20-120002.3.3.2.aarch64",
"product": {
"name": "mgrctl-5.1.20-120002.3.3.2.aarch64",
"product_id": "mgrctl-5.1.20-120002.3.3.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "mgr-push-5.1.4-120002.3.3.3.noarch",
"product": {
"name": "mgr-push-5.1.4-120002.3.3.3.noarch",
"product_id": "mgr-push-5.1.4-120002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "mgrctl-bash-completion-5.1.20-120002.3.3.2.noarch",
"product": {
"name": "mgrctl-bash-completion-5.1.20-120002.3.3.2.noarch",
"product_id": "mgrctl-bash-completion-5.1.20-120002.3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "mgrctl-lang-5.1.20-120002.3.3.2.noarch",
"product": {
"name": "mgrctl-lang-5.1.20-120002.3.3.2.noarch",
"product_id": "mgrctl-lang-5.1.20-120002.3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "mgrctl-zsh-completion-5.1.20-120002.3.3.2.noarch",
"product": {
"name": "mgrctl-zsh-completion-5.1.20-120002.3.3.2.noarch",
"product_id": "mgrctl-zsh-completion-5.1.20-120002.3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "python-defusedxml-0.6.0-120002.1.3.1.noarch",
"product": {
"name": "python-defusedxml-0.6.0-120002.1.3.1.noarch",
"product_id": "python-defusedxml-0.6.0-120002.1.3.1.noarch"
}
},
{
"category": "product_version",
"name": "python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"product": {
"name": "python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"product_id": "python2-mgr-push-5.1.4-120002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"product": {
"name": "python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"product_id": "python2-rhnlib-5.1.3-120002.3.3.1.noarch"
}
},
{
"category": "product_version",
"name": "python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"product": {
"name": "python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"product_id": "python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "python3-defusedxml-0.6.0-120002.1.3.1.noarch",
"product": {
"name": "python3-defusedxml-0.6.0-120002.1.3.1.noarch",
"product_id": "python3-defusedxml-0.6.0-120002.1.3.1.noarch"
}
},
{
"category": "product_version",
"name": "spacecmd-5.1.11-120002.3.3.2.noarch",
"product": {
"name": "spacecmd-5.1.11-120002.3.3.2.noarch",
"product_id": "spacecmd-5.1.11-120002.3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"product": {
"name": "spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"product_id": "spacewalk-client-tools-5.1.7-120002.3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch",
"product": {
"name": "supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch",
"product_id": "supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"product": {
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"product_id": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"product": {
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"product_id": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "grafana-11.5.7-120002.4.3.2.ppc64le",
"product": {
"name": "grafana-11.5.7-120002.4.3.2.ppc64le",
"product_id": "grafana-11.5.7-120002.4.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "mgrctl-5.1.20-120002.3.3.2.ppc64le",
"product": {
"name": "mgrctl-5.1.20-120002.3.3.2.ppc64le",
"product_id": "mgrctl-5.1.20-120002.3.3.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"product": {
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"product_id": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x"
}
},
{
"category": "product_version",
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"product": {
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"product_id": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x"
}
},
{
"category": "product_version",
"name": "grafana-11.5.7-120002.4.3.2.s390x",
"product": {
"name": "grafana-11.5.7-120002.4.3.2.s390x",
"product_id": "grafana-11.5.7-120002.4.3.2.s390x"
}
},
{
"category": "product_version",
"name": "mgrctl-5.1.20-120002.3.3.2.s390x",
"product": {
"name": "mgrctl-5.1.20-120002.3.3.2.s390x",
"product_id": "mgrctl-5.1.20-120002.3.3.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"product": {
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"product_id": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"product": {
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"product_id": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "grafana-11.5.7-120002.4.3.2.x86_64",
"product": {
"name": "grafana-11.5.7-120002.4.3.2.x86_64",
"product_id": "grafana-11.5.7-120002.4.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "mgrctl-5.1.20-120002.3.3.2.x86_64",
"product": {
"name": "mgrctl-5.1.20-120002.3.3.2.x86_64",
"product_id": "mgrctl-5.1.20-120002.3.3.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Multi Linux Manager Tools SLE-12",
"product": {
"name": "SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64 as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64"
},
"product_reference": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le"
},
"product_reference": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x"
},
"product_reference": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64 as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64"
},
"product_reference": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64 as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64"
},
"product_reference": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le"
},
"product_reference": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x"
},
"product_reference": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64 as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64"
},
"product_reference": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64 as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64 as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.7-120002.4.3.2.aarch64 as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64"
},
"product_reference": "grafana-11.5.7-120002.4.3.2.aarch64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.7-120002.4.3.2.ppc64le as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le"
},
"product_reference": "grafana-11.5.7-120002.4.3.2.ppc64le",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.7-120002.4.3.2.s390x as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x"
},
"product_reference": "grafana-11.5.7-120002.4.3.2.s390x",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.7-120002.4.3.2.x86_64 as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64"
},
"product_reference": "grafana-11.5.7-120002.4.3.2.x86_64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgr-push-5.1.4-120002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch"
},
"product_reference": "mgr-push-5.1.4-120002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-defusedxml-0.6.0-120002.1.3.1.noarch as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch"
},
"product_reference": "python-defusedxml-0.6.0-120002.1.3.1.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-mgr-push-5.1.4-120002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch"
},
"product_reference": "python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-rhnlib-5.1.3-120002.3.3.1.noarch as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch"
},
"product_reference": "python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch"
},
"product_reference": "python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacecmd-5.1.11-120002.3.3.2.noarch as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch"
},
"product_reference": "spacecmd-5.1.11-120002.3.3.2.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-client-tools-5.1.7-120002.3.3.2.noarch as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch"
},
"product_reference": "spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
},
"product_reference": "supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-3415",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-3415"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. The Grafana Alerting DingDing integration was not properly protected and could be exposed to users with Viewer permission. \nFixed in versions 10.4.19+security-01, 11.2.10+security-01, 11.3.7+security-01, 11.4.5+security-01, 11.5.5+security-01, 11.6.2+security-01 and 12.0.1+security-01",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-3415",
"url": "https://www.suse.com/security/cve/CVE-2025-3415"
},
{
"category": "external",
"summary": "SUSE Bug 1245302 for CVE-2025-3415",
"url": "https://bugzilla.suse.com/1245302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-28T07:19:09Z",
"details": "moderate"
}
],
"title": "CVE-2025-3415"
},
{
"cve": "CVE-2025-47908",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47908"
}
],
"notes": [
{
"category": "general",
"text": "Middleware causes a prohibitive amount of heap allocations when processing malicious preflight requests that include a Access-Control-Request-Headers (ACRH) header whose value contains many commas. This behavior can be abused by attackers to produce undue load on the middleware/server as an attempt to cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47908",
"url": "https://www.suse.com/security/cve/CVE-2025-47908"
},
{
"category": "external",
"summary": "SUSE Bug 1247746 for CVE-2025-47908",
"url": "https://bugzilla.suse.com/1247746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-28T07:19:09Z",
"details": "moderate"
}
],
"title": "CVE-2025-47908"
},
{
"cve": "CVE-2025-6023",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6023"
}
],
"notes": [
{
"category": "general",
"text": "An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.\n\nThe open redirect can be chained with path traversal vulnerabilities to achieve XSS.\n\nFixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6023",
"url": "https://www.suse.com/security/cve/CVE-2025-6023"
},
{
"category": "external",
"summary": "SUSE Bug 1246735 for CVE-2025-6023",
"url": "https://bugzilla.suse.com/1246735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-28T07:19:09Z",
"details": "important"
}
],
"title": "CVE-2025-6023"
},
{
"cve": "CVE-2025-6197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6197"
}
],
"notes": [
{
"category": "general",
"text": "An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.\n\n\nPrerequisites for exploitation:\n\n- Multiple organizations must exist in the Grafana instance\n\n- Victim must be on a different organization than the one specified in the URL",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6197",
"url": "https://www.suse.com/security/cve/CVE-2025-6197"
},
{
"category": "external",
"summary": "SUSE Bug 1246736 for CVE-2025-6197",
"url": "https://bugzilla.suse.com/1246736"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-28T07:19:09Z",
"details": "moderate"
}
],
"title": "CVE-2025-6197"
}
]
}
ghsa-jvcj-qc86-j594
Vulnerability from github
Published
2025-07-18 09:30
Modified
2025-07-18 09:30
Severity ?
VLAI Severity ?
Details
An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.
Prerequisites for exploitation:
-
Multiple organizations must exist in the Grafana instance
-
Victim must be on a different organization than the one specified in the URL
{
"affected": [],
"aliases": [
"CVE-2025-6197"
],
"database_specific": {
"cwe_ids": [
"CWE-601"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-07-18T08:15:28Z",
"severity": "MODERATE"
},
"details": "An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.\n\n\nPrerequisites for exploitation:\n\n- Multiple organizations must exist in the Grafana instance\n\n- Victim must be on a different organization than the one specified in the URL",
"id": "GHSA-jvcj-qc86-j594",
"modified": "2025-07-18T09:30:31Z",
"published": "2025-07-18T09:30:31Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6197"
},
{
"type": "WEB",
"url": "https://grafana.com/blog/2025/07/17/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-6197-and-cve-2025-6023"
},
{
"type": "WEB",
"url": "https://grafana.com/security/security-advisories/cve-2025-6197"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
}
]
}
opensuse-su-2025:15372-1
Vulnerability from csaf_opensuse
Published
2025-07-23 00:00
Modified
2025-07-23 00:00
Summary
grafana-11.6.3+security01-1.1 on GA media
Notes
Title of the patch
grafana-11.6.3+security01-1.1 on GA media
Description of the patch
These are all security issues fixed in the grafana-11.6.3+security01-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15372
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "grafana-11.6.3+security01-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the grafana-11.6.3+security01-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15372",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15372-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6023 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6023/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6197/"
}
],
"title": "grafana-11.6.3+security01-1.1 on GA media",
"tracking": {
"current_release_date": "2025-07-23T00:00:00Z",
"generator": {
"date": "2025-07-23T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15372-1",
"initial_release_date": "2025-07-23T00:00:00Z",
"revision_history": [
{
"date": "2025-07-23T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "grafana-11.6.3+security01-1.1.aarch64",
"product": {
"name": "grafana-11.6.3+security01-1.1.aarch64",
"product_id": "grafana-11.6.3+security01-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-11.6.3+security01-1.1.ppc64le",
"product": {
"name": "grafana-11.6.3+security01-1.1.ppc64le",
"product_id": "grafana-11.6.3+security01-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-11.6.3+security01-1.1.s390x",
"product": {
"name": "grafana-11.6.3+security01-1.1.s390x",
"product_id": "grafana-11.6.3+security01-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-11.6.3+security01-1.1.x86_64",
"product": {
"name": "grafana-11.6.3+security01-1.1.x86_64",
"product_id": "grafana-11.6.3+security01-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.6.3+security01-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.aarch64"
},
"product_reference": "grafana-11.6.3+security01-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.6.3+security01-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.ppc64le"
},
"product_reference": "grafana-11.6.3+security01-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.6.3+security01-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.s390x"
},
"product_reference": "grafana-11.6.3+security01-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.6.3+security01-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.x86_64"
},
"product_reference": "grafana-11.6.3+security01-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6023",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6023"
}
],
"notes": [
{
"category": "general",
"text": "An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.\n\nThe open redirect can be chained with path traversal vulnerabilities to achieve XSS.\n\nFixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6023",
"url": "https://www.suse.com/security/cve/CVE-2025-6023"
},
{
"category": "external",
"summary": "SUSE Bug 1246735 for CVE-2025-6023",
"url": "https://bugzilla.suse.com/1246735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-23T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-6023"
},
{
"cve": "CVE-2025-6197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6197"
}
],
"notes": [
{
"category": "general",
"text": "An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.\n\n\nPrerequisites for exploitation:\n\n- Multiple organizations must exist in the Grafana instance\n\n- Victim must be on a different organization than the one specified in the URL",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6197",
"url": "https://www.suse.com/security/cve/CVE-2025-6197"
},
{
"category": "external",
"summary": "SUSE Bug 1246736 for CVE-2025-6197",
"url": "https://bugzilla.suse.com/1246736"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-23T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-6197"
}
]
}
fkie_cve-2025-6197
Vulnerability from fkie_nvd
Published
2025-07-18 08:15
Modified
2025-07-22 13:06
Severity ?
Summary
An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.
Prerequisites for exploitation:
- Multiple organizations must exist in the Grafana instance
- Victim must be on a different organization than the one specified in the URL
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.\n\n\nPrerequisites for exploitation:\n\n- Multiple organizations must exist in the Grafana instance\n\n- Victim must be on a different organization than the one specified in the URL"
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de redirecci\u00f3n abierta en la funcionalidad de cambio de organizaci\u00f3n de Grafana OSS. Requisitos para su explotaci\u00f3n: - Deben existir varias organizaciones en la instancia de Grafana. - La v\u00edctima debe pertenecer a una organizaci\u00f3n diferente a la especificada en la URL."
}
],
"id": "CVE-2025-6197",
"lastModified": "2025-07-22T13:06:27.983",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 2.5,
"source": "security@grafana.com",
"type": "Secondary"
}
]
},
"published": "2025-07-18T08:15:28.187",
"references": [
{
"source": "security@grafana.com",
"url": "https://grafana.com/blog/2025/07/17/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-6197-and-cve-2025-6023/"
},
{
"source": "security@grafana.com",
"url": "https://grafana.com/security/security-advisories/cve-2025-6197/"
}
],
"sourceIdentifier": "security@grafana.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-601"
}
],
"source": "security@grafana.com",
"type": "Secondary"
}
]
}
CERTFR-2025-AVI-0597
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Grafana. Elles permettent à un attaquant de provoquer une injection de code indirecte à distance (XSS) et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Grafana Labs | N/A | Grafana versions 11.6.x antérieures à 11.6.3+security-01 | ||
| Grafana Labs | N/A | Grafana versions 11.4.x antérieures à 11.4.6+security-01 | ||
| Grafana Labs | N/A | Grafana versions antérieures à 11.3.8+security-01 | ||
| Grafana Labs | N/A | Grafana versions 12.0.x antérieures à 12.0.2+security-01 | ||
| Grafana Labs | N/A | Grafana versions 11.5.x antérieures à 11.5.6+security-01 |
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Grafana versions 11.6.x ant\u00e9rieures \u00e0 11.6.3+security-01",
"product": {
"name": "N/A",
"vendor": {
"name": "Grafana Labs",
"scada": false
}
}
},
{
"description": "Grafana versions 11.4.x ant\u00e9rieures \u00e0 11.4.6+security-01",
"product": {
"name": "N/A",
"vendor": {
"name": "Grafana Labs",
"scada": false
}
}
},
{
"description": "Grafana versions ant\u00e9rieures \u00e0 11.3.8+security-01",
"product": {
"name": "N/A",
"vendor": {
"name": "Grafana Labs",
"scada": false
}
}
},
{
"description": "Grafana versions 12.0.x ant\u00e9rieures \u00e0 12.0.2+security-01",
"product": {
"name": "N/A",
"vendor": {
"name": "Grafana Labs",
"scada": false
}
}
},
{
"description": "Grafana versions 11.5.x ant\u00e9rieures \u00e0 11.5.6+security-01",
"product": {
"name": "N/A",
"vendor": {
"name": "Grafana Labs",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-6023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6023"
},
{
"name": "CVE-2025-6197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6197"
}
],
"initial_release_date": "2025-07-18T00:00:00",
"last_revision_date": "2025-07-18T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0597",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Grafana. Elles permettent \u00e0 un attaquant de provoquer une injection de code indirecte \u00e0 distance (XSS) et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Grafana",
"vendor_advisories": [
{
"published_at": "2025-07-17",
"title": "Bulletin de s\u00e9curit\u00e9 Grafana cve-2025-6197",
"url": "https://grafana.com/blog/2025/07/17/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-6197-and-cve-2025-6023/"
}
]
}
wid-sec-w-2025-1593
Vulnerability from csaf_certbund
Published
2025-07-17 22:00
Modified
2025-07-27 22:00
Summary
Grafana: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Grafana ist eine Open-Source Analyse- und Visualisierungssoftware.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Grafana ausnutzen, um einen Cross-Site Scripting Angriff durchzuführen und um Daten zu manipulieren.
Betroffene Betriebssysteme
- Sonstiges
- UNIX
- Windows
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Grafana ist eine Open-Source Analyse- und Visualisierungssoftware.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Grafana ausnutzen, um einen Cross-Site Scripting Angriff durchzuf\u00fchren und um Daten zu manipulieren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1593 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1593.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1593 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1593"
},
{
"category": "external",
"summary": "Grafana security release vom 2025-07-17",
"url": "https://grafana.com/blog/2025/07/17/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-6197-and-cve-2025-6023/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15372-1 vom 2025-07-25",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MNRNDD7KU4ETCJFFYOE7LEYOFJQCGAG/"
}
],
"source_lang": "en-US",
"title": "Grafana: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-07-27T22:00:00.000+00:00",
"generator": {
"date": "2025-07-28T07:54:39.913+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1593",
"initial_release_date": "2025-07-17T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-07-17T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-07-27T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von openSUSE aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c12.0.2+security-01",
"product": {
"name": "Open Source Grafana \u003c12.0.2+security-01",
"product_id": "T045503"
}
},
{
"category": "product_version",
"name": "12.0.2+security-01",
"product": {
"name": "Open Source Grafana 12.0.2+security-01",
"product_id": "T045503-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:grafana:grafana:12.0.2security-01"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.6.3+security-01",
"product": {
"name": "Open Source Grafana \u003c11.6.3+security-01",
"product_id": "T045504"
}
},
{
"category": "product_version",
"name": "11.6.3+security-01",
"product": {
"name": "Open Source Grafana 11.6.3+security-01",
"product_id": "T045504-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:grafana:grafana:11.6.3security-01"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.5.6+security-01",
"product": {
"name": "Open Source Grafana \u003c11.5.6+security-01",
"product_id": "T045505"
}
},
{
"category": "product_version",
"name": "11.5.6+security-01",
"product": {
"name": "Open Source Grafana 11.5.6+security-01",
"product_id": "T045505-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:grafana:grafana:11.5.6security-01"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.4.6+security-01",
"product": {
"name": "Open Source Grafana \u003c11.4.6+security-01",
"product_id": "T045506"
}
},
{
"category": "product_version",
"name": "11.4.6+security-01",
"product": {
"name": "Open Source Grafana 11.4.6+security-01",
"product_id": "T045506-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:grafana:grafana:11.4.6security-01"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.3.8+security-01",
"product": {
"name": "Open Source Grafana \u003c11.3.8+security-01",
"product_id": "T045507"
}
},
{
"category": "product_version",
"name": "11.3.8+security-01",
"product": {
"name": "Open Source Grafana 11.3.8+security-01",
"product_id": "T045507-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:grafana:grafana:11.3.8security-01"
}
}
}
],
"category": "product_name",
"name": "Grafana"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6023",
"product_status": {
"known_affected": [
"T045503",
"T045505",
"T045504",
"T045507",
"T045506",
"T027843"
]
},
"release_date": "2025-07-17T22:00:00.000+00:00",
"title": "CVE-2025-6023"
},
{
"cve": "CVE-2025-6197",
"product_status": {
"known_affected": [
"T045503",
"T045505",
"T045504",
"T045507",
"T045506",
"T027843"
]
},
"release_date": "2025-07-17T22:00:00.000+00:00",
"title": "CVE-2025-6197"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…