<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update 5.0.6 for Multi-Linux Manager Client Tools</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:4457-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-12-18T11:56:34Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-12-18T11:56:34Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-12-18T11:56:34Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update 5.0.6 for Multi-Linux Manager Client Tools</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update fixes the following issues:

golang-github-prometheus-alertmanager:

- Update to version 0.28.1 (jsc#PED-13285):
  * Improved performance of inhibition rules when using Equal
    labels.
  * Improve the documentation on escaping in UTF-8 matchers.
  * Update alertmanager_config_hash metric help to document the
    hash is not cryptographically strong.
  * Fix panic in amtool when using --verbose.
  * Fix templating of channel field for Rocket.Chat.
  * Fix rocketchat_configs written as rocket_configs in docs.
  * Fix usage for --enable-feature flag.
  * Trim whitespace from OpsGenie API Key.
  * Fix Jira project template not rendered when searching for
    existing issues.
  * Fix subtle bug in JSON/YAML encoding of inhibition rules that
    would cause Equal labels to be omitted.
  * Fix header for slack_configs in docs.
  * Fix weight and wrap of Microsoft Teams notifications.
- Upgrade to version 0.28.0:
  * CVE-2025-47908: Bump github.com/rs/cors (bsc#1247748).
  * Templating errors in the SNS integration now return an error.
  * Adopt log/slog, drop go-kit/log.
  * Add a new Microsoft Teams integration based on Flows.
  * Add a new Rocket.Chat integration.
  * Add a new Jira integration.
  * Add support for GOMEMLIMIT, enable it via the feature flag
    --enable-feature=auto-gomemlimit.
  * Add support for GOMAXPROCS, enable it via the feature flag
    --enable-feature=auto-gomaxprocs.
  * Add support for limits of silences including the maximum number
    of active and pending silences, and the maximum size per
    silence (in bytes). You can use the flags
    --silences.max-silences and --silences.max-silence-size-bytes
    to set them accordingly.
  * Muted alerts now show whether they are suppressed or not in
    both the /api/v2/alerts endpoint and the Alertmanager UI.
- Upgrade to version 0.27.0:
  * API: Removal of all api/v1/ endpoints. These endpoints
    now log and return a deprecation message and respond with a
    status code of 410.
  * UTF-8 Support: Introduction of support for any UTF-8
    character as part of label names and matchers.
  * Discord Integration: Enforce max length in message.
  * Metrics: Introduced the experimental feature flag
    --enable-feature=receiver-name-in-metrics to include the
    receiver name.
  * Metrics: Introduced a new gauge named
    alertmanager_inhibition_rules that counts the number of
    configured inhibition rules.
  * Metrics: Introduced a new counter named
    alertmanager_alerts_supressed_total that tracks muted alerts,
    it contains a reason label to indicate the source of the mute.
  * Discord Integration: Introduced support for webhook_url_file.
  * Microsoft Teams Integration: Introduced support for
    webhook_url_file.
  * Microsoft Teams Integration: Add support for summary.
  * Metrics: Notification metrics now support two new values for
    the label reason, contextCanceled and contextDeadlineExceeded.
  * Email Integration: Contents of auth_password_file are now
    trimmed of prefixed and suffixed whitespace.
  * amtool: Fixes the error scheme required for webhook url when
    using amtool with --alertmanager.url.
  * Mixin: Fix AlertmanagerFailedToSendAlerts,
    AlertmanagerClusterFailedToSendAlerts, and
    AlertmanagerClusterFailedToSendAlerts to make sure they ignore
    the reason label.

grafana was updated from version 11.5.5 to 11.5.10:

- Security issues fixed:
  
  * CVE-2025-47911: Fix parsing HTML documents (bsc#1251454)
  * CVE-2025-58190: Fix excessive memory consumption (bsc#1251657)
  * CVE-2025-64751: Drop experimental implementation of authorization Zanzana server/client
                    (bsc#1254113)
  * CVE-2025-11065: Fixed sensitive information leak in logs (version 11.5.9) (bsc#1250616)
  * CVE-2025-6023: Fixed cross-site-scripting via scripted dashboards (version 11.5.7) (bsc#1246735)
  * CVE-2025-6197: Fixed open redirect in organization switching (version 11.5.7) (bsc#1246736)
  * CVE-2025-3415: Fixed exposure of DingDing alerting integration URL to Viewer level users (version 11.5.6)
                   (bsc#1245302)

- Other changes, new features and bugs fixed:

  * Version 11.5.10:
    + Update to Go 1.25
    + Update to golang.org/x/net v0.45.0
    + Auth: Fix render user OAuth passthrough
    + LDAP Authentication: Fix URL to propagate username context as parameter
    
  * Version 11.5.9:
    + Auditing: Document new options for recording datasource query request/response body.
    + Login: Fixed redirection after login when Grafana is served from subpath.

  * Version 11.5.7:
    + Azure: Fixed legend formatting and resource name determination in template variable queries.

mgr-push:

- Version 5.0.3-0
  * Fixed syntax error in changelog

rhnlib:

- Version 5.0.6-0
  * Use more secure defusedxml parser (bsc#1227577)

spacecmd:

- Version 5.0.14-0:

  * Fixed installation of python lib files on Ubuntu 24.04 (bsc#1246586)
  * Use JSON instead of pickle for spacecmd cache (bsc#1227579)
  * Make spacecmd to work with Python 3.12 and higher
  * Call print statements properly in Python 3

supportutils-plugin-susemanager-client:

- Version 5.0.5-0
  * Fix syntax error in changelog

uyuni-tools:

- Version 0.1.37-0
  * Handle CA files with symlinks during migration (bsc#1251044)
  * Add a lowercase version of --logLevel (bsc#1243611)
  * Adjust traefik exposed configuration for chart v27+ (bsc#1247721)
  * Stop executing scripts in temporary folder (bsc#1243704)
  * Convert the traefik install time to local time (bsc#1251138)
  * Run smdba and reindex only during migration (bsc#1244534)
  * Support config: collect podman inspect for hub container (bsc#1245099)
  * Add --registry-host, --registry-user and --registry-password to pull images from an authenticate registry
  * Deprecate --registry
  * Use new dedicated path for Cobbler settings (bsc#1244027)
  * Migrate custom auto installation snippets (bsc#1246320)
  * Add SLE15SP7 to buildin productmap
  * Fix loading product map from mgradm configuration file (bsc#1246068)
  * Fix channel override for distro copy
  * Do not use sudo when running as a root user (bsc#1246882)
  * Do not require backups to be at the same location for restoring (bsc#1246906)
  * Check for restorecon presence before calling (bsc#1246925)
  * Automatically get up-to-date systemid file on salt based proxy hosts (bsc#1246789)
  * Fix recomputing proxy images when installing a ptf or test (bsc#1246553)
  * Add migration for server monitoring configuration (bsc#1247688)
- Version 0.1.36-0
  * Bump the default image tag
- Version 0.1.35-0
  * Restore SELinux contexts for restored backup volumes (bsc#1244127)
- Version 0.1.34-0
  * Fix mgradm backup create handling of images and systemd files (bsc#1246738)
- Version 0.1.33-0
  * Restore volumes using tar instead of podman import (bsc#1244127)

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-4457,SUSE-SLE-Manager-Tools-12-2025-4457</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254457-1/</URL>
      <Description>Link for SUSE-SU-2025:4457-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-December/023598.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:4457-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227577</URL>
      <Description>SUSE Bug 1227577</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227579</URL>
      <Description>SUSE Bug 1227579</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1243611</URL>
      <Description>SUSE Bug 1243611</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1243704</URL>
      <Description>SUSE Bug 1243704</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244027</URL>
      <Description>SUSE Bug 1244027</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244127</URL>
      <Description>SUSE Bug 1244127</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244534</URL>
      <Description>SUSE Bug 1244534</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245099</URL>
      <Description>SUSE Bug 1245099</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245302</URL>
      <Description>SUSE Bug 1245302</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246068</URL>
      <Description>SUSE Bug 1246068</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246320</URL>
      <Description>SUSE Bug 1246320</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246553</URL>
      <Description>SUSE Bug 1246553</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246586</URL>
      <Description>SUSE Bug 1246586</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246662</URL>
      <Description>SUSE Bug 1246662</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246735</URL>
      <Description>SUSE Bug 1246735</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246736</URL>
      <Description>SUSE Bug 1246736</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246738</URL>
      <Description>SUSE Bug 1246738</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246789</URL>
      <Description>SUSE Bug 1246789</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246882</URL>
      <Description>SUSE Bug 1246882</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246906</URL>
      <Description>SUSE Bug 1246906</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246925</URL>
      <Description>SUSE Bug 1246925</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247688</URL>
      <Description>SUSE Bug 1247688</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247721</URL>
      <Description>SUSE Bug 1247721</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247748</URL>
      <Description>SUSE Bug 1247748</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1250616</URL>
      <Description>SUSE Bug 1250616</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251044</URL>
      <Description>SUSE Bug 1251044</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251138</URL>
      <Description>SUSE Bug 1251138</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-11065/</URL>
      <Description>SUSE CVE CVE-2025-11065 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-3415/</URL>
      <Description>SUSE CVE CVE-2025-3415 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-47908/</URL>
      <Description>SUSE CVE CVE-2025-47908 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-6023/</URL>
      <Description>SUSE CVE CVE-2025-6023 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-6197/</URL>
      <Description>SUSE CVE CVE-2025-6197 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Manager Client Tools 12">
      <Branch Type="Product Name" Name="SUSE Manager Client Tools 12">
        <FullProductName ProductID="SUSE Manager Client Tools 12">SUSE Manager Client Tools 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="golang-github-prometheus-alertmanager-0.28.1-1.34.1">
      <FullProductName ProductID="golang-github-prometheus-alertmanager-0.28.1-1.34.1">golang-github-prometheus-alertmanager-0.28.1-1.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="grafana-11.5.10-1.87.1">
      <FullProductName ProductID="grafana-11.5.10-1.87.1">grafana-11.5.10-1.87.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mgr-push-5.0.3-1.30.3">
      <FullProductName ProductID="mgr-push-5.0.3-1.30.3">mgr-push-5.0.3-1.30.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mgrctl-0.1.37-1.27.1">
      <FullProductName ProductID="mgrctl-0.1.37-1.27.1">mgrctl-0.1.37-1.27.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mgrctl-bash-completion-0.1.37-1.27.1">
      <FullProductName ProductID="mgrctl-bash-completion-0.1.37-1.27.1">mgrctl-bash-completion-0.1.37-1.27.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mgrctl-lang-0.1.37-1.27.1">
      <FullProductName ProductID="mgrctl-lang-0.1.37-1.27.1">mgrctl-lang-0.1.37-1.27.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mgrctl-zsh-completion-0.1.37-1.27.1">
      <FullProductName ProductID="mgrctl-zsh-completion-0.1.37-1.27.1">mgrctl-zsh-completion-0.1.37-1.27.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python2-mgr-push-5.0.3-1.30.3">
      <FullProductName ProductID="python2-mgr-push-5.0.3-1.30.3">python2-mgr-push-5.0.3-1.30.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python2-rhnlib-5.0.6-21.55.1">
      <FullProductName ProductID="python2-rhnlib-5.0.6-21.55.1">python2-rhnlib-5.0.6-21.55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="spacecmd-5.0.14-38.162.1">
      <FullProductName ProductID="spacecmd-5.0.14-38.162.1">spacecmd-5.0.14-38.162.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="supportutils-plugin-susemanager-client-5.0.5-6.36.1">
      <FullProductName ProductID="supportutils-plugin-susemanager-client-5.0.5-6.36.1">supportutils-plugin-susemanager-client-5.0.5-6.36.1</FullProductName>
    </Branch>
    <Relationship ProductReference="golang-github-prometheus-alertmanager-0.28.1-1.34.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 12">
      <FullProductName ProductID="SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1">golang-github-prometheus-alertmanager-0.28.1-1.34.1 as a component of SUSE Manager Client Tools 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="grafana-11.5.10-1.87.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 12">
      <FullProductName ProductID="SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1">grafana-11.5.10-1.87.1 as a component of SUSE Manager Client Tools 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgr-push-5.0.3-1.30.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 12">
      <FullProductName ProductID="SUSE Manager Client Tools 12:mgr-push-5.0.3-1.30.3">mgr-push-5.0.3-1.30.3 as a component of SUSE Manager Client Tools 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgrctl-0.1.37-1.27.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 12">
      <FullProductName ProductID="SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1">mgrctl-0.1.37-1.27.1 as a component of SUSE Manager Client Tools 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgrctl-bash-completion-0.1.37-1.27.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 12">
      <FullProductName ProductID="SUSE Manager Client Tools 12:mgrctl-bash-completion-0.1.37-1.27.1">mgrctl-bash-completion-0.1.37-1.27.1 as a component of SUSE Manager Client Tools 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgrctl-zsh-completion-0.1.37-1.27.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 12">
      <FullProductName ProductID="SUSE Manager Client Tools 12:mgrctl-zsh-completion-0.1.37-1.27.1">mgrctl-zsh-completion-0.1.37-1.27.1 as a component of SUSE Manager Client Tools 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="python2-mgr-push-5.0.3-1.30.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 12">
      <FullProductName ProductID="SUSE Manager Client Tools 12:python2-mgr-push-5.0.3-1.30.3">python2-mgr-push-5.0.3-1.30.3 as a component of SUSE Manager Client Tools 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="python2-rhnlib-5.0.6-21.55.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 12">
      <FullProductName ProductID="SUSE Manager Client Tools 12:python2-rhnlib-5.0.6-21.55.1">python2-rhnlib-5.0.6-21.55.1 as a component of SUSE Manager Client Tools 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="spacecmd-5.0.14-38.162.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 12">
      <FullProductName ProductID="SUSE Manager Client Tools 12:spacecmd-5.0.14-38.162.1">spacecmd-5.0.14-38.162.1 as a component of SUSE Manager Client Tools 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="supportutils-plugin-susemanager-client-5.0.5-6.36.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 12">
      <FullProductName ProductID="SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-5.0.5-6.36.1">supportutils-plugin-susemanager-client-5.0.5-6.36.1 as a component of SUSE Manager Client Tools 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">unknown</Note>
    </Notes>
    <CVE>CVE-2025-11065</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:mgr-push-5.0.3-1.30.3</ProductID>
        <ProductID>SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:mgrctl-bash-completion-0.1.37-1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:mgrctl-zsh-completion-0.1.37-1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:python2-mgr-push-5.0.3-1.30.3</ProductID>
        <ProductID>SUSE Manager Client Tools 12:python2-rhnlib-5.0.6-21.55.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:spacecmd-5.0.14-38.162.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-5.0.5-6.36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254457-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-11065.html</URL>
        <Description>CVE-2025-11065</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1250608</URL>
        <Description>SUSE Bug 1250608</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Grafana is an open-source platform for monitoring and observability. The Grafana Alerting DingDing integration was not properly protected and could be exposed to users with Viewer permission. 
Fixed in versions 10.4.19+security-01, 11.2.10+security-01, 11.3.7+security-01, 11.4.5+security-01, 11.5.5+security-01, 11.6.2+security-01 and 12.0.1+security-01</Note>
    </Notes>
    <CVE>CVE-2025-3415</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:mgr-push-5.0.3-1.30.3</ProductID>
        <ProductID>SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:mgrctl-bash-completion-0.1.37-1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:mgrctl-zsh-completion-0.1.37-1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:python2-mgr-push-5.0.3-1.30.3</ProductID>
        <ProductID>SUSE Manager Client Tools 12:python2-rhnlib-5.0.6-21.55.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:spacecmd-5.0.14-38.162.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-5.0.5-6.36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254457-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-3415.html</URL>
        <Description>CVE-2025-3415</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245302</URL>
        <Description>SUSE Bug 1245302</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Middleware causes a prohibitive amount of heap allocations when processing malicious preflight requests that include a Access-Control-Request-Headers (ACRH) header whose value contains many commas. This behavior can be abused by attackers to produce undue load on the middleware/server as an attempt to cause a denial of service.</Note>
    </Notes>
    <CVE>CVE-2025-47908</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:mgr-push-5.0.3-1.30.3</ProductID>
        <ProductID>SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:mgrctl-bash-completion-0.1.37-1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:mgrctl-zsh-completion-0.1.37-1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:python2-mgr-push-5.0.3-1.30.3</ProductID>
        <ProductID>SUSE Manager Client Tools 12:python2-rhnlib-5.0.6-21.55.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:spacecmd-5.0.14-38.162.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-5.0.5-6.36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254457-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-47908.html</URL>
        <Description>CVE-2025-47908</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247746</URL>
        <Description>SUSE Bug 1247746</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.

The open redirect can be chained with path traversal vulnerabilities to achieve XSS.

Fixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01</Note>
    </Notes>
    <CVE>CVE-2025-6023</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:mgr-push-5.0.3-1.30.3</ProductID>
        <ProductID>SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:mgrctl-bash-completion-0.1.37-1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:mgrctl-zsh-completion-0.1.37-1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:python2-mgr-push-5.0.3-1.30.3</ProductID>
        <ProductID>SUSE Manager Client Tools 12:python2-rhnlib-5.0.6-21.55.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:spacecmd-5.0.14-38.162.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-5.0.5-6.36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254457-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-6023.html</URL>
        <Description>CVE-2025-6023</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246735</URL>
        <Description>SUSE Bug 1246735</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.


Prerequisites for exploitation:

- Multiple organizations must exist in the Grafana instance

- Victim must be on a different organization than the one specified in the URL</Note>
    </Notes>
    <CVE>CVE-2025-6197</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.28.1-1.34.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:grafana-11.5.10-1.87.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:mgr-push-5.0.3-1.30.3</ProductID>
        <ProductID>SUSE Manager Client Tools 12:mgrctl-0.1.37-1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:mgrctl-bash-completion-0.1.37-1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:mgrctl-zsh-completion-0.1.37-1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:python2-mgr-push-5.0.3-1.30.3</ProductID>
        <ProductID>SUSE Manager Client Tools 12:python2-rhnlib-5.0.6-21.55.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:spacecmd-5.0.14-38.162.1</ProductID>
        <ProductID>SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-5.0.5-6.36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254457-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-6197.html</URL>
        <Description>CVE-2025-6197</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246736</URL>
        <Description>SUSE Bug 1246736</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
