Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-6023 (GCVE-0-2025-6023)
Vulnerability from cvelistv5 – Published: 2025-07-18 07:48 – Updated: 2025-07-18 13:46| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-6023",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-18T13:46:38.999015Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-18T13:46:45.354Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Grafana",
"vendor": "Grafana",
"versions": [
{
"lessThan": "12.0.2+security-01",
"status": "affected",
"version": "12.0.x",
"versionType": "semver"
},
{
"lessThan": "11.6.3+security-01",
"status": "affected",
"version": "11.6.x",
"versionType": "semver"
},
{
"lessThan": "11.5.6+security-01",
"status": "affected",
"version": "11.5.x",
"versionType": "semver"
},
{
"lessThan": "11.4.6+security-01",
"status": "affected",
"version": "11.4.x",
"versionType": "semver"
},
{
"lessThan": "11.3.8+security-01",
"status": "affected",
"version": "11.3.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Hoa X. Nguyen"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eAn open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.\u003c/p\u003e\u003cp\u003eThe open redirect can be chained with path traversal vulnerabilities to achieve XSS.\u003cbr\u003e\u003cbr\u003eFixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01\u003c/p\u003e"
}
],
"value": "An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.\n\nThe open redirect can be chained with path traversal vulnerabilities to achieve XSS.\n\nFixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01"
}
],
"impacts": [
{
"capecId": "CAPEC-194",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-194"
}
]
},
{
"capecId": "CAPEC-209",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-209"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-601",
"description": "CWE-601",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-18T07:49:54.804Z",
"orgId": "57da9224-a3e2-4646-9d0e-c4dc2e05e7da",
"shortName": "GRAFANA"
},
"references": [
{
"name": "Security vulnerability management issue",
"tags": [
"vendor-advisory"
],
"url": "https://grafana.com/security/security-advisories/cve-2025-6023/"
},
{
"tags": [
"release-notes",
"mitigation"
],
"url": "https://grafana.com/blog/2025/07/17/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-6197-and-cve-2025-6023/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "57da9224-a3e2-4646-9d0e-c4dc2e05e7da",
"assignerShortName": "GRAFANA",
"cveId": "CVE-2025-6023",
"datePublished": "2025-07-18T07:48:15.972Z",
"dateReserved": "2025-06-12T07:05:20.773Z",
"dateUpdated": "2025-07-18T13:46:45.354Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-6023\",\"sourceIdentifier\":\"security@grafana.com\",\"published\":\"2025-07-18T08:15:28.040\",\"lastModified\":\"2025-07-22T13:06:27.983\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.\\n\\nThe open redirect can be chained with path traversal vulnerabilities to achieve XSS.\\n\\nFixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01\"},{\"lang\":\"es\",\"value\":\"Se ha identificado una vulnerabilidad de redirecci\u00f3n abierta en Grafana OSS que puede explotarse para realizar ataques XSS. Esta vulnerabilidad se introdujo en Grafana v11.5.0. La redirecci\u00f3n abierta puede combinarse con vulnerabilidades de path traversal para lograr XSS. Corregida en las versiones 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 y 11.3.8+security-01.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@grafana.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L\",\"baseScore\":7.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.8,\"impactScore\":4.7}]},\"weaknesses\":[{\"source\":\"security@grafana.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"},{\"lang\":\"en\",\"value\":\"CWE-601\"}]}],\"references\":[{\"url\":\"https://grafana.com/blog/2025/07/17/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-6197-and-cve-2025-6023/\",\"source\":\"security@grafana.com\"},{\"url\":\"https://grafana.com/security/security-advisories/cve-2025-6023/\",\"source\":\"security@grafana.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-6023\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-18T13:46:38.999015Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-18T13:46:41.824Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Hoa X. Nguyen\"}], \"impacts\": [{\"capecId\": \"CAPEC-194\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-194\"}]}, {\"capecId\": \"CAPEC-209\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-209\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.6, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Grafana\", \"product\": \"Grafana\", \"versions\": [{\"status\": \"affected\", \"version\": \"12.0.x\", \"lessThan\": \"12.0.2+security-01\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.6.x\", \"lessThan\": \"11.6.3+security-01\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.5.x\", \"lessThan\": \"11.5.6+security-01\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.4.x\", \"lessThan\": \"11.4.6+security-01\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.3.x\", \"lessThan\": \"11.3.8+security-01\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://grafana.com/security/security-advisories/cve-2025-6023/\", \"name\": \"Security vulnerability management issue\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://grafana.com/blog/2025/07/17/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-6197-and-cve-2025-6023/\", \"tags\": [\"release-notes\", \"mitigation\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.\\n\\nThe open redirect can be chained with path traversal vulnerabilities to achieve XSS.\\n\\nFixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eAn open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.\u003c/p\u003e\u003cp\u003eThe open redirect can be chained with path traversal vulnerabilities to achieve XSS.\u003cbr\u003e\u003cbr\u003eFixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-601\", \"description\": \"CWE-601\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-79\", \"description\": \"CWE-79\"}]}], \"providerMetadata\": {\"orgId\": \"57da9224-a3e2-4646-9d0e-c4dc2e05e7da\", \"shortName\": \"GRAFANA\", \"dateUpdated\": \"2025-07-18T07:49:54.804Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-6023\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-07-18T13:46:45.354Z\", \"dateReserved\": \"2025-06-12T07:05:20.773Z\", \"assignerOrgId\": \"57da9224-a3e2-4646-9d0e-c4dc2e05e7da\", \"datePublished\": \"2025-07-18T07:48:15.972Z\", \"assignerShortName\": \"GRAFANA\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
SUSE-SU-2025:3819-1
Vulnerability from csaf_suse - Published: 2025-10-28 07:20 - Updated: 2025-10-28 07:20Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update 5.1.1 for Multi-Linux Manager Client Tools",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update fixes the following issues:\n\ndracut-saltboot was updated from version 0.1 to version 1.0.0:\n\n- Version 1.0.0 bugs fixed:\n \n * Reboot on salt key timeout (bsc#1237495)\n * Fixed parsing files with space in the name (bsc#1252100)\n\ngolang-github-prometheus-alertmanager was updated from version 0.26.0 to 0.28.1 to :\n\n- Security issues fixed:\n\n * CVE-2025-47908: Fixed a Denial of Service vulnerability (bsc#1247748)\n\n- Version 0.28.1 changes and bugs fixed (jsc#PED-13285):\n\n * Improved performance of inhibition rules when using Equal\n labels.\n * Improve the documentation on escaping in UTF-8 matchers.\n * Update alertmanager_config_hash metric help to document the\n hash is not cryptographically strong.\n * Fixed panic in amtool when using --verbose.\n * Fixed templating of channel field for Rocket.Chat.\n * Fixed rocketchat_configs written as rocket_configs in docs.\n * Fixed usage for --enable-feature flag.\n * Trim whitespace from OpsGenie API Key.\n * Fixed Jira project template not rendered when searching for\n existing issues.\n * Fixed subtle bug in JSON/YAML encoding of inhibition rules that\n would cause Equal labels to be omitted.\n * Fixed header for slack_configs in docs.\n * Fixed weight and wrap of Microsoft Teams notifications.\n \n- Version 0.28.0 changes and bugs fixed:\n\n * Templating errors in the SNS integration now return an error.\n * Adopt log/slog, drop go-kit/log.\n * Added a new Microsoft Teams integration based on Flows.\n * Added a new Rocket.Chat integration.\n * Added a new Jira integration.\n * Added support for GOMEMLIMIT, enable it via the feature flag\n --enable-feature=auto-gomemlimit.\n * Added support for GOMAXPROCS, enable it via the feature flag\n --enable-feature=auto-gomaxprocs.\n * Added support for limits of silences including the maximum number\n of active and pending silences, and the maximum size per\n silence (in bytes). You can use the flags\n --silences.max-silences and --silences.max-silence-size-bytes\n to set them accordingly.\n * Muted alerts now show whether they are suppressed or not in\n both the /api/v2/alerts endpoint and the Alertmanager UI.\n\n- Version 0.27.0 changes and bugs fixed:\n\n * API: Removal of all api/v1/ endpoints. These endpoints\n now log and return a deprecation message and respond with a\n status code of 410.\n * UTF-8 Support: Introduction of support for any UTF-8\n character as part of label names and matchers.\n * Discord Integration: Enforce max length in message.\n * Metrics: Introduced the experimental feature flag\n --enable-feature=receiver-name-in-metrics to include the\n receiver name.\n * Metrics: Introduced a new gauge named\n alertmanager_inhibition_rules that counts the number of\n configured inhibition rules.\n * Metrics: Introduced a new counter named\n alertmanager_alerts_supressed_total that tracks muted alerts,\n it contains a reason label to indicate the source of the mute.\n * Discord Integration: Introduced support for webhook_url_file.\n * Microsoft Teams Integration: Introduced support for\n webhook_url_file.\n * Microsoft Teams Integration: Added support for summary.\n * Metrics: Notification metrics now support two new values for\n the label reason, contextCanceled and contextDeadlineExceeded.\n * Email Integration: Contents of auth_password_file are now\n trimmed of prefixed and suffixed whitespace.\n * amtool: Fixes the error scheme required for webhook url when\n using amtool with --alertmanager.url.\n * Mixin: Fixed AlertmanagerFailedToSendAlerts,\n AlertmanagerClusterFailedToSendAlerts, and\n AlertmanagerClusterFailedToSendAlerts to make sure they ignore\n the reason label.\n\ngrafana was updated to from version 11.5.5 to 11.5.7:\n \n- Security issues fixed:\n\n * CVE-2025-6023: Fixed cross-site-scripting via scripted dashboards (bsc#1246735)\n * CVE-2025-6197: Fixed open redirect in organization switching (bsc#1246736)\n * CVE-2025-3415: Fixed exposure of DingDing alerting integration URL to Viewer level users (bsc#1245302)\n\n- Other bugs fixed:\n\n * Azure: Fixed legend formatting.\n * Azure: Fixed resource name determination in template variable queries.\n\nmgr-push was updated from version 5.1.3 to 5.1.4:\n\n- Use absolute paths when invoking external commands\n\npython-defusedxml:\n\n- New package implemented at version 0.7.1\n\nrhnlib was updated from version 5.1.2 to 5.1.3:\n\n- Use more secure defusedxml parser (bsc#1227577)\n\nspacecmd was updated from version 5.1.8 to 5.1.11:\n\n- Version 5.1.11 changes and bugs fixed:\n\n * Make spacecmd work with Python 3.12 and higher\n * Call print statements properly in Python 3\n\n- Version 5.1.10 changes and bugs fixed:\n\n * Fixed use of renamed config parser class where the backward\n compatible alias was dropped in latest python version\n (bsc#1246586)\n\n- Version 5.1.9 changes and bugs fixed:\n\n * Fixed installation of python lib files on Ubuntu 24.04\n\nspacewalk-client-tools was updated from version 5.1.6 to 5.1.7:\n\n- Fixed syntax error in changelog\n\nsupportutils-plugin-susemanager-client was updated from version 5.1.3 to 5.1.4:\n\n- Fixed syntax error in changelog\n\nuyuni-tools was updated from version 5.1.15 to 5.1.20:\n\n- Version 5.1.20 changes and bugs fixed:\n\n * Added migration for server monitoring configuration (bsc#1247688)\n\n- Version 5.1.19 changes and bugs fixed:\n\n * Added a lowercase version of --logLevel (bsc#1243611)\n * Stop executing scripts in temporary folder (bsc#1243704)\n * support config: collect podman inspect for hub container (bsc#1245099)\n * Use new dedicated path for Cobbler settings (bsc#1244027)\n * Migrate custom auto installation snippets (bsc#1246320)\n * Added SUSE Linux Enterprise 15 SP7 to buildin productmap\n * Fixed loading product map from mgradm configuration file (bsc#1246068)\n * Fixed channel override for distro copy\n * Do not use sudo when running as a root user (bsc#1246882)\n * Do not require backups to be at the same location for restoring (bsc#1246906)\n * Fixed recomputing proxy images when installing a PTF or TEST (bsc#1246553)\n * Added mgradm server rename to change the server FQDN (bsc#1229825)\n * If no DB SSL CA parameter is given, use the other one (bsc#1245120)\n * More fault tolerant mgradm stop (bsc#1243331)\n * Backup systemd dropin directory too and create if missing\n * Added 3rd party SSL options for upgrade and migration scenarios\n * Do not consider stderr output of podman as an error (bsc#1247836)\n * Restore SELinux contexts for restored backup volumes (bsc#1244127)\n * Automatically get up-to-date systemid file on salt based proxy hosts (bsc#1246789)\n * Bump the default image tag to 5.1.1\n\n- Version 5.1.18 changes and bugs fixed:\n\n * Updated translation strings\n \n- Version 5.1.17 changes and bugs fixed:\n\n * Upgrade of saline should use scale function (bsc#1246864)\n\n- Version 5.1.16 changes and bugs fixed:\n\n * Use database backup volume as temporary backup location (bsc#1246628)\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-3819,SUSE-MultiLinuxManagerTools-SLE-15-2025-3819,SUSE-MultiLinuxManagerTools-SLE-Micro-5-2025-3819",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_3819-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:3819-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253819-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:3819-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023070.html"
},
{
"category": "self",
"summary": "SUSE Bug 1019074",
"url": "https://bugzilla.suse.com/1019074"
},
{
"category": "self",
"summary": "SUSE Bug 1227577",
"url": "https://bugzilla.suse.com/1227577"
},
{
"category": "self",
"summary": "SUSE Bug 1229825",
"url": "https://bugzilla.suse.com/1229825"
},
{
"category": "self",
"summary": "SUSE Bug 1237495",
"url": "https://bugzilla.suse.com/1237495"
},
{
"category": "self",
"summary": "SUSE Bug 1243331",
"url": "https://bugzilla.suse.com/1243331"
},
{
"category": "self",
"summary": "SUSE Bug 1243611",
"url": "https://bugzilla.suse.com/1243611"
},
{
"category": "self",
"summary": "SUSE Bug 1243704",
"url": "https://bugzilla.suse.com/1243704"
},
{
"category": "self",
"summary": "SUSE Bug 1244027",
"url": "https://bugzilla.suse.com/1244027"
},
{
"category": "self",
"summary": "SUSE Bug 1244127",
"url": "https://bugzilla.suse.com/1244127"
},
{
"category": "self",
"summary": "SUSE Bug 1245099",
"url": "https://bugzilla.suse.com/1245099"
},
{
"category": "self",
"summary": "SUSE Bug 1245120",
"url": "https://bugzilla.suse.com/1245120"
},
{
"category": "self",
"summary": "SUSE Bug 1245302",
"url": "https://bugzilla.suse.com/1245302"
},
{
"category": "self",
"summary": "SUSE Bug 1246068",
"url": "https://bugzilla.suse.com/1246068"
},
{
"category": "self",
"summary": "SUSE Bug 1246320",
"url": "https://bugzilla.suse.com/1246320"
},
{
"category": "self",
"summary": "SUSE Bug 1246553",
"url": "https://bugzilla.suse.com/1246553"
},
{
"category": "self",
"summary": "SUSE Bug 1246586",
"url": "https://bugzilla.suse.com/1246586"
},
{
"category": "self",
"summary": "SUSE Bug 1246628",
"url": "https://bugzilla.suse.com/1246628"
},
{
"category": "self",
"summary": "SUSE Bug 1246735",
"url": "https://bugzilla.suse.com/1246735"
},
{
"category": "self",
"summary": "SUSE Bug 1246736",
"url": "https://bugzilla.suse.com/1246736"
},
{
"category": "self",
"summary": "SUSE Bug 1246789",
"url": "https://bugzilla.suse.com/1246789"
},
{
"category": "self",
"summary": "SUSE Bug 1246864",
"url": "https://bugzilla.suse.com/1246864"
},
{
"category": "self",
"summary": "SUSE Bug 1246882",
"url": "https://bugzilla.suse.com/1246882"
},
{
"category": "self",
"summary": "SUSE Bug 1246906",
"url": "https://bugzilla.suse.com/1246906"
},
{
"category": "self",
"summary": "SUSE Bug 1247688",
"url": "https://bugzilla.suse.com/1247688"
},
{
"category": "self",
"summary": "SUSE Bug 1247748",
"url": "https://bugzilla.suse.com/1247748"
},
{
"category": "self",
"summary": "SUSE Bug 1247836",
"url": "https://bugzilla.suse.com/1247836"
},
{
"category": "self",
"summary": "SUSE Bug 1252100",
"url": "https://bugzilla.suse.com/1252100"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-3415 page",
"url": "https://www.suse.com/security/cve/CVE-2025-3415/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47908 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47908/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6023 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6023/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6197/"
}
],
"title": "Security update 5.1.1 for Multi-Linux Manager Client Tools",
"tracking": {
"current_release_date": "2025-10-28T07:20:07Z",
"generator": {
"date": "2025-10-28T07:20:07Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:3819-1",
"initial_release_date": "2025-10-28T07:20:07Z",
"revision_history": [
{
"date": "2025-10-28T07:20:07Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64"
}
},
{
"category": "product_version",
"name": "grafana-11.5.7-150002.4.3.3.aarch64",
"product": {
"name": "grafana-11.5.7-150002.4.3.3.aarch64",
"product_id": "grafana-11.5.7-150002.4.3.3.aarch64"
}
},
{
"category": "product_version",
"name": "mgrctl-5.1.20-150002.3.3.3.aarch64",
"product": {
"name": "mgrctl-5.1.20-150002.3.3.3.aarch64",
"product_id": "mgrctl-5.1.20-150002.3.3.3.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"product": {
"name": "dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"product_id": "dracut-saltboot-1.0.0-150002.3.3.1.noarch"
}
},
{
"category": "product_version",
"name": "mgr-push-5.1.4-150002.3.3.3.noarch",
"product": {
"name": "mgr-push-5.1.4-150002.3.3.3.noarch",
"product_id": "mgr-push-5.1.4-150002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"product": {
"name": "mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"product_id": "mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"product": {
"name": "mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"product_id": "mgrctl-lang-5.1.20-150002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"product": {
"name": "mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"product_id": "mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "python2-defusedxml-0.7.1-150002.1.3.2.noarch",
"product": {
"name": "python2-defusedxml-0.7.1-150002.1.3.2.noarch",
"product_id": "python2-defusedxml-0.7.1-150002.1.3.2.noarch"
}
},
{
"category": "product_version",
"name": "python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"product": {
"name": "python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"product_id": "python3-defusedxml-0.7.1-150002.1.3.2.noarch"
}
},
{
"category": "product_version",
"name": "python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"product": {
"name": "python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"product_id": "python3-mgr-push-5.1.4-150002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"product": {
"name": "python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"product_id": "python3-rhnlib-5.1.3-150002.3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"product": {
"name": "python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"product_id": "python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "spacecmd-5.1.11-150002.3.3.2.noarch",
"product": {
"name": "spacecmd-5.1.11-150002.3.3.2.noarch",
"product_id": "spacecmd-5.1.11-150002.3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"product": {
"name": "spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"product_id": "spacewalk-client-tools-5.1.7-150002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"product": {
"name": "supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"product_id": "supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le"
}
},
{
"category": "product_version",
"name": "grafana-11.5.7-150002.4.3.3.ppc64le",
"product": {
"name": "grafana-11.5.7-150002.4.3.3.ppc64le",
"product_id": "grafana-11.5.7-150002.4.3.3.ppc64le"
}
},
{
"category": "product_version",
"name": "mgrctl-5.1.20-150002.3.3.3.ppc64le",
"product": {
"name": "mgrctl-5.1.20-150002.3.3.3.ppc64le",
"product_id": "mgrctl-5.1.20-150002.3.3.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x"
}
},
{
"category": "product_version",
"name": "grafana-11.5.7-150002.4.3.3.s390x",
"product": {
"name": "grafana-11.5.7-150002.4.3.3.s390x",
"product_id": "grafana-11.5.7-150002.4.3.3.s390x"
}
},
{
"category": "product_version",
"name": "mgrctl-5.1.20-150002.3.3.3.s390x",
"product": {
"name": "mgrctl-5.1.20-150002.3.3.3.s390x",
"product_id": "mgrctl-5.1.20-150002.3.3.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "grafana-11.5.7-150002.4.3.3.x86_64",
"product": {
"name": "grafana-11.5.7-150002.4.3.3.x86_64",
"product_id": "grafana-11.5.7-150002.4.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "mgrctl-5.1.20-150002.3.3.3.x86_64",
"product": {
"name": "mgrctl-5.1.20-150002.3.3.3.x86_64",
"product_id": "mgrctl-5.1.20-150002.3.3.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Multi Linux Manager Tools SLE-15",
"product": {
"name": "SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15"
}
},
{
"category": "product_name",
"name": "SUSE Multi Linux Manager Tools SLE-Micro-5",
"product": {
"name": "SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-saltboot-1.0.0-150002.3.3.1.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch"
},
"product_reference": "dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64 as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64 as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.7-150002.4.3.3.aarch64 as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64"
},
"product_reference": "grafana-11.5.7-150002.4.3.3.aarch64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.7-150002.4.3.3.ppc64le as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le"
},
"product_reference": "grafana-11.5.7-150002.4.3.3.ppc64le",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.7-150002.4.3.3.s390x as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x"
},
"product_reference": "grafana-11.5.7-150002.4.3.3.s390x",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.7-150002.4.3.3.x86_64 as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64"
},
"product_reference": "grafana-11.5.7-150002.4.3.3.x86_64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgr-push-5.1.4-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch"
},
"product_reference": "mgr-push-5.1.4-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-5.1.20-150002.3.3.3.aarch64 as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64"
},
"product_reference": "mgrctl-5.1.20-150002.3.3.3.aarch64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-5.1.20-150002.3.3.3.ppc64le as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le"
},
"product_reference": "mgrctl-5.1.20-150002.3.3.3.ppc64le",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-5.1.20-150002.3.3.3.s390x as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x"
},
"product_reference": "mgrctl-5.1.20-150002.3.3.3.s390x",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-5.1.20-150002.3.3.3.x86_64 as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64"
},
"product_reference": "mgrctl-5.1.20-150002.3.3.3.x86_64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch"
},
"product_reference": "mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-lang-5.1.20-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch"
},
"product_reference": "mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
},
"product_reference": "mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-defusedxml-0.7.1-150002.1.3.2.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch"
},
"product_reference": "python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-mgr-push-5.1.4-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch"
},
"product_reference": "python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rhnlib-5.1.3-150002.3.3.2.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch"
},
"product_reference": "python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch"
},
"product_reference": "python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacecmd-5.1.11-150002.3.3.2.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch"
},
"product_reference": "spacecmd-5.1.11-150002.3.3.2.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-client-tools-5.1.7-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch"
},
"product_reference": "spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch as component of SUSE Multi Linux Manager Tools SLE-15",
"product_id": "SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch"
},
"product_reference": "supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dracut-saltboot-1.0.0-150002.3.3.1.noarch as component of SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch"
},
"product_reference": "dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-Micro-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-5.1.20-150002.3.3.3.aarch64 as component of SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64"
},
"product_reference": "mgrctl-5.1.20-150002.3.3.3.aarch64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-Micro-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-5.1.20-150002.3.3.3.ppc64le as component of SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le"
},
"product_reference": "mgrctl-5.1.20-150002.3.3.3.ppc64le",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-Micro-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-5.1.20-150002.3.3.3.s390x as component of SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x"
},
"product_reference": "mgrctl-5.1.20-150002.3.3.3.s390x",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-Micro-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-5.1.20-150002.3.3.3.x86_64 as component of SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64"
},
"product_reference": "mgrctl-5.1.20-150002.3.3.3.x86_64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-Micro-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch"
},
"product_reference": "mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-Micro-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-lang-5.1.20-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch"
},
"product_reference": "mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-Micro-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-Micro-5",
"product_id": "SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
},
"product_reference": "mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-Micro-5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-3415",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-3415"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. The Grafana Alerting DingDing integration was not properly protected and could be exposed to users with Viewer permission. \nFixed in versions 10.4.19+security-01, 11.2.10+security-01, 11.3.7+security-01, 11.4.5+security-01, 11.5.5+security-01, 11.6.2+security-01 and 12.0.1+security-01",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-3415",
"url": "https://www.suse.com/security/cve/CVE-2025-3415"
},
{
"category": "external",
"summary": "SUSE Bug 1245302 for CVE-2025-3415",
"url": "https://bugzilla.suse.com/1245302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-28T07:20:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-3415"
},
{
"cve": "CVE-2025-47908",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47908"
}
],
"notes": [
{
"category": "general",
"text": "Middleware causes a prohibitive amount of heap allocations when processing malicious preflight requests that include a Access-Control-Request-Headers (ACRH) header whose value contains many commas. This behavior can be abused by attackers to produce undue load on the middleware/server as an attempt to cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47908",
"url": "https://www.suse.com/security/cve/CVE-2025-47908"
},
{
"category": "external",
"summary": "SUSE Bug 1247746 for CVE-2025-47908",
"url": "https://bugzilla.suse.com/1247746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-28T07:20:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-47908"
},
{
"cve": "CVE-2025-6023",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6023"
}
],
"notes": [
{
"category": "general",
"text": "An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.\n\nThe open redirect can be chained with path traversal vulnerabilities to achieve XSS.\n\nFixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6023",
"url": "https://www.suse.com/security/cve/CVE-2025-6023"
},
{
"category": "external",
"summary": "SUSE Bug 1246735 for CVE-2025-6023",
"url": "https://bugzilla.suse.com/1246735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-28T07:20:07Z",
"details": "important"
}
],
"title": "CVE-2025-6023"
},
{
"cve": "CVE-2025-6197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6197"
}
],
"notes": [
{
"category": "general",
"text": "An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.\n\n\nPrerequisites for exploitation:\n\n- Multiple organizations must exist in the Grafana instance\n\n- Victim must be on a different organization than the one specified in the URL",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6197",
"url": "https://www.suse.com/security/cve/CVE-2025-6197"
},
{
"category": "external",
"summary": "SUSE Bug 1246736 for CVE-2025-6197",
"url": "https://bugzilla.suse.com/1246736"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Multi Linux Manager Tools SLE-15:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:grafana-11.5.7-150002.4.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-defusedxml-0.7.1-150002.1.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-mgr-push-5.1.4-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-rhnlib-5.1.3-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:python3-spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacecmd-5.1.11-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-15:spacewalk-client-tools-5.1.7-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-15:supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:dracut-saltboot-1.0.0-150002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.aarch64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.ppc64le",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.s390x",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-5.1.20-150002.3.3.3.x86_64",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-bash-completion-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-lang-5.1.20-150002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-Micro-5:mgrctl-zsh-completion-5.1.20-150002.3.3.3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-28T07:20:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-6197"
}
]
}
SUSE-SU-2025:3817-1
Vulnerability from csaf_suse - Published: 2025-10-28 07:19 - Updated: 2025-10-28 07:19Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update 5.1.1 for Multi-Linux Manager Client Tools",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update fixes the following issues:\n\ngolang-github-prometheus-alertmanager:\n\n- Update to version 0.28.1 (jsc#PED-13285):\n * Improved performance of inhibition rules when using Equal\n labels.\n * Improve the documentation on escaping in UTF-8 matchers.\n * Update alertmanager_config_hash metric help to document the\n hash is not cryptographically strong.\n * Fix panic in amtool when using --verbose.\n * Fix templating of channel field for Rocket.Chat.\n * Fix rocketchat_configs written as rocket_configs in docs.\n * Fix usage for --enable-feature flag.\n * Trim whitespace from OpsGenie API Key.\n * Fix Jira project template not rendered when searching for\n existing issues.\n * Fix subtle bug in JSON/YAML encoding of inhibition rules that\n would cause Equal labels to be omitted.\n * Fix header for slack_configs in docs.\n * Fix weight and wrap of Microsoft Teams notifications.\n- Upgrade to version 0.28.0:\n * CVE-2025-47908: Bump github.com/rs/cors (bsc#1247748).\n * Templating errors in the SNS integration now return an error.\n * Adopt log/slog, drop go-kit/log.\n * Add a new Microsoft Teams integration based on Flows.\n * Add a new Rocket.Chat integration.\n * Add a new Jira integration.\n * Add support for GOMEMLIMIT, enable it via the feature flag\n --enable-feature=auto-gomemlimit.\n * Add support for GOMAXPROCS, enable it via the feature flag\n --enable-feature=auto-gomaxprocs.\n * Add support for limits of silences including the maximum number\n of active and pending silences, and the maximum size per\n silence (in bytes). You can use the flags\n --silences.max-silences and --silences.max-silence-size-bytes\n to set them accordingly.\n * Muted alerts now show whether they are suppressed or not in\n both the /api/v2/alerts endpoint and the Alertmanager UI.\n- Upgrade to version 0.27.0:\n * API: Removal of all api/v1/ endpoints. These endpoints\n now log and return a deprecation message and respond with a\n status code of 410.\n * UTF-8 Support: Introduction of support for any UTF-8\n character as part of label names and matchers.\n * Discord Integration: Enforce max length in message.\n * Metrics: Introduced the experimental feature flag\n --enable-feature=receiver-name-in-metrics to include the\n receiver name.\n * Metrics: Introduced a new gauge named\n alertmanager_inhibition_rules that counts the number of\n configured inhibition rules.\n * Metrics: Introduced a new counter named\n alertmanager_alerts_supressed_total that tracks muted alerts,\n it contains a reason label to indicate the source of the mute.\n * Discord Integration: Introduced support for webhook_url_file.\n * Microsoft Teams Integration: Introduced support for\n webhook_url_file.\n * Microsoft Teams Integration: Add support for summary.\n * Metrics: Notification metrics now support two new values for\n the label reason, contextCanceled and contextDeadlineExceeded.\n * Email Integration: Contents of auth_password_file are now\n trimmed of prefixed and suffixed whitespace.\n * amtool: Fixes the error scheme required for webhook url when\n using amtool with --alertmanager.url.\n * Mixin: Fix AlertmanagerFailedToSendAlerts,\n AlertmanagerClusterFailedToSendAlerts, and\n AlertmanagerClusterFailedToSendAlerts to make sure they ignore\n the reason label.\n\ngrafana:\n\n- Update to version 11.5.7:\n * Security:\n CVE-2025-6023: Fix cross-site-scripting via scripted dashboards\n (bsc#1246735)\n CVE-2025-6197: Fix open redirect in organization switching\n (bsc#1246736)\n * Bug fixes:\n Azure: Fix legend formatting.\n Azure: Fix resource name determination in template variable\n queries.\n- Update to version 11.5.6:\n CVE-2025-3415: Fix exposure of DingDing alerting integration\n URL to Viewer level users (bsc#1245302)\n\nmgr-push:\n\n- Version 5.1.4-0\n * Use absolute paths when invoking external commands\n * Fix syntax error in changelog\n\npython-defusedxml:\n\n- Update to 0.6.0\n * Increase test coverage.\n * Add badges to README.\n * Test on Python 3.7 stable and 3.8-dev\n * Drop support for Python 3.4\n * No longer pass *html* argument to XMLParse. It has been deprecated and\n ignored for a long time. The DefusedXMLParser still takes a html argument.\n A deprecation warning is issued when the argument is False and a TypeError\n when it\u0027s True.\n * defusedxml now fails early when pyexpat stdlib module is not available or\n broken.\n * defusedxml.ElementTree.__all__ now lists ParseError as public attribute.\n * The defusedxml.ElementTree and defusedxml.cElementTree modules had a typo\n and used XMLParse instead of XMLParser as an alias for DefusedXMLParser.\n Both the old and fixed name are now available.\n- Remove superfluous devel dependency for noarch package\n- Fix source url.\n- Update to 5.0\n * Add compatibility with Python 3.6\n * Drop support for Python 2.6, 3.1, 3.2, 3.3\n * Fix lxml tests (XMLSyntaxError: Detected an entity reference loop)\n- Implement single-spec version.\n- Dummy changelog for bsc#1019074, FATE#322329\n- Initial packaging.\n\nrhnlib:\n\n- Version 5.1.3-0\n * Fix syntax error in changelog\n * Use more secure defusedxml parser (bsc#1227577)\n\nspacecmd:\n\n- Version 5.1.11-0\n * Make spacecmd work with Python 3.12 and higher\n * Call print statements properly in Python 3\n- Version 5.1.10-0\n * Fix use of renamed config parser class where the backward\n compatible alias was dropped in latest python version\n (bsc#1246586)\n- Version 5.1.9-0\n * Fix installation of python lib files on Ubuntu 24.04\n\nspacewalk-client-tools:\n\n- Version 5.1.7-0\n * Fix syntax error in changelog\n\nsupportutils-plugin-susemanager-client:\n\n- Version 5.1.4-0\n * Fix syntax error in changelog\n\nuyuni-tools:\n\n- version 5.1.20-0\n * Add migration for server monitoring configuration (bsc#1247688)\n\n- version 5.1.19-0\n * Add a lowercase version of --logLevel (bsc#1243611)\n * Stop executing scripts in temporary folder (bsc#1243704)\n * support config: collect podman inspect for hub container\n (bsc#1245099)\n * Use new dedicated path for Cobbler settings (bsc#1244027)\n * Migrate custom auto installation snippets (bsc#1246320)\n * Add SUSE Linux Enterprise 15 SP7 to buildin productmap\n * Fix loading product map from mgradm configuration file\n (bsc#1246068)\n * Fix channel override for distro copy\n * Do not use sudo when running as a root user (bsc#1246882)\n * Do not require backups to be at the same location for restoring\n (bsc#1246906)\n * Fix recomputing proxy images when installing a PTF or TEST\n (bsc#1246553)\n * Add mgradm server rename to change the server FQDN (bsc#1229825)\n * If no DB SSL CA parameter is given, use the other one\n (bsc#1245120)\n * More fault tolerant mgradm stop (bsc#1243331)\n * Backup systemd dropin directory too and create if missing\n * Add 3rd party SSL options for upgrade and migration scenarios\n * Do not consider stderr output of podman as an error\n (bsc#1247836)\n * Restore SELinux contexts for restored backup volumes\n (bsc#1244127)\n * Automatically get up-to-date systemid file on salt based proxy\n hosts (bsc#1246789)\n * Bump the default image tag to 5.1.1\n\n- version 5.1.18-0\n * Update translation strings\n\n- version 5.1.17-0\n * upgrade saline should use scale function (bsc#1246864)\n\n- version 5.1.16-0\n * Use database backup volume as temporary backup location\n (bsc#1246628)\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-3817,SUSE-MultiLinuxManagerTools-SLE-12-2025-3817",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_3817-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:3817-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253817-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:3817-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023071.html"
},
{
"category": "self",
"summary": "SUSE Bug 1019074",
"url": "https://bugzilla.suse.com/1019074"
},
{
"category": "self",
"summary": "SUSE Bug 1227577",
"url": "https://bugzilla.suse.com/1227577"
},
{
"category": "self",
"summary": "SUSE Bug 1229825",
"url": "https://bugzilla.suse.com/1229825"
},
{
"category": "self",
"summary": "SUSE Bug 1243331",
"url": "https://bugzilla.suse.com/1243331"
},
{
"category": "self",
"summary": "SUSE Bug 1243611",
"url": "https://bugzilla.suse.com/1243611"
},
{
"category": "self",
"summary": "SUSE Bug 1243704",
"url": "https://bugzilla.suse.com/1243704"
},
{
"category": "self",
"summary": "SUSE Bug 1244027",
"url": "https://bugzilla.suse.com/1244027"
},
{
"category": "self",
"summary": "SUSE Bug 1244127",
"url": "https://bugzilla.suse.com/1244127"
},
{
"category": "self",
"summary": "SUSE Bug 1245099",
"url": "https://bugzilla.suse.com/1245099"
},
{
"category": "self",
"summary": "SUSE Bug 1245120",
"url": "https://bugzilla.suse.com/1245120"
},
{
"category": "self",
"summary": "SUSE Bug 1245302",
"url": "https://bugzilla.suse.com/1245302"
},
{
"category": "self",
"summary": "SUSE Bug 1246068",
"url": "https://bugzilla.suse.com/1246068"
},
{
"category": "self",
"summary": "SUSE Bug 1246320",
"url": "https://bugzilla.suse.com/1246320"
},
{
"category": "self",
"summary": "SUSE Bug 1246553",
"url": "https://bugzilla.suse.com/1246553"
},
{
"category": "self",
"summary": "SUSE Bug 1246586",
"url": "https://bugzilla.suse.com/1246586"
},
{
"category": "self",
"summary": "SUSE Bug 1246628",
"url": "https://bugzilla.suse.com/1246628"
},
{
"category": "self",
"summary": "SUSE Bug 1246735",
"url": "https://bugzilla.suse.com/1246735"
},
{
"category": "self",
"summary": "SUSE Bug 1246736",
"url": "https://bugzilla.suse.com/1246736"
},
{
"category": "self",
"summary": "SUSE Bug 1246789",
"url": "https://bugzilla.suse.com/1246789"
},
{
"category": "self",
"summary": "SUSE Bug 1246864",
"url": "https://bugzilla.suse.com/1246864"
},
{
"category": "self",
"summary": "SUSE Bug 1246882",
"url": "https://bugzilla.suse.com/1246882"
},
{
"category": "self",
"summary": "SUSE Bug 1246906",
"url": "https://bugzilla.suse.com/1246906"
},
{
"category": "self",
"summary": "SUSE Bug 1247688",
"url": "https://bugzilla.suse.com/1247688"
},
{
"category": "self",
"summary": "SUSE Bug 1247748",
"url": "https://bugzilla.suse.com/1247748"
},
{
"category": "self",
"summary": "SUSE Bug 1247836",
"url": "https://bugzilla.suse.com/1247836"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-3415 page",
"url": "https://www.suse.com/security/cve/CVE-2025-3415/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47908 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47908/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6023 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6023/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6197/"
}
],
"title": "Security update 5.1.1 for Multi-Linux Manager Client Tools",
"tracking": {
"current_release_date": "2025-10-28T07:19:09Z",
"generator": {
"date": "2025-10-28T07:19:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:3817-1",
"initial_release_date": "2025-10-28T07:19:09Z",
"revision_history": [
{
"date": "2025-10-28T07:19:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"product": {
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"product_id": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"product": {
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"product_id": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "grafana-11.5.7-120002.4.3.2.aarch64",
"product": {
"name": "grafana-11.5.7-120002.4.3.2.aarch64",
"product_id": "grafana-11.5.7-120002.4.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "mgrctl-5.1.20-120002.3.3.2.aarch64",
"product": {
"name": "mgrctl-5.1.20-120002.3.3.2.aarch64",
"product_id": "mgrctl-5.1.20-120002.3.3.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "mgr-push-5.1.4-120002.3.3.3.noarch",
"product": {
"name": "mgr-push-5.1.4-120002.3.3.3.noarch",
"product_id": "mgr-push-5.1.4-120002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "mgrctl-bash-completion-5.1.20-120002.3.3.2.noarch",
"product": {
"name": "mgrctl-bash-completion-5.1.20-120002.3.3.2.noarch",
"product_id": "mgrctl-bash-completion-5.1.20-120002.3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "mgrctl-lang-5.1.20-120002.3.3.2.noarch",
"product": {
"name": "mgrctl-lang-5.1.20-120002.3.3.2.noarch",
"product_id": "mgrctl-lang-5.1.20-120002.3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "mgrctl-zsh-completion-5.1.20-120002.3.3.2.noarch",
"product": {
"name": "mgrctl-zsh-completion-5.1.20-120002.3.3.2.noarch",
"product_id": "mgrctl-zsh-completion-5.1.20-120002.3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "python-defusedxml-0.6.0-120002.1.3.1.noarch",
"product": {
"name": "python-defusedxml-0.6.0-120002.1.3.1.noarch",
"product_id": "python-defusedxml-0.6.0-120002.1.3.1.noarch"
}
},
{
"category": "product_version",
"name": "python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"product": {
"name": "python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"product_id": "python2-mgr-push-5.1.4-120002.3.3.3.noarch"
}
},
{
"category": "product_version",
"name": "python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"product": {
"name": "python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"product_id": "python2-rhnlib-5.1.3-120002.3.3.1.noarch"
}
},
{
"category": "product_version",
"name": "python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"product": {
"name": "python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"product_id": "python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "python3-defusedxml-0.6.0-120002.1.3.1.noarch",
"product": {
"name": "python3-defusedxml-0.6.0-120002.1.3.1.noarch",
"product_id": "python3-defusedxml-0.6.0-120002.1.3.1.noarch"
}
},
{
"category": "product_version",
"name": "spacecmd-5.1.11-120002.3.3.2.noarch",
"product": {
"name": "spacecmd-5.1.11-120002.3.3.2.noarch",
"product_id": "spacecmd-5.1.11-120002.3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"product": {
"name": "spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"product_id": "spacewalk-client-tools-5.1.7-120002.3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch",
"product": {
"name": "supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch",
"product_id": "supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"product": {
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"product_id": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"product": {
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"product_id": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "grafana-11.5.7-120002.4.3.2.ppc64le",
"product": {
"name": "grafana-11.5.7-120002.4.3.2.ppc64le",
"product_id": "grafana-11.5.7-120002.4.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "mgrctl-5.1.20-120002.3.3.2.ppc64le",
"product": {
"name": "mgrctl-5.1.20-120002.3.3.2.ppc64le",
"product_id": "mgrctl-5.1.20-120002.3.3.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"product": {
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"product_id": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x"
}
},
{
"category": "product_version",
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"product": {
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"product_id": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x"
}
},
{
"category": "product_version",
"name": "grafana-11.5.7-120002.4.3.2.s390x",
"product": {
"name": "grafana-11.5.7-120002.4.3.2.s390x",
"product_id": "grafana-11.5.7-120002.4.3.2.s390x"
}
},
{
"category": "product_version",
"name": "mgrctl-5.1.20-120002.3.3.2.s390x",
"product": {
"name": "mgrctl-5.1.20-120002.3.3.2.s390x",
"product_id": "mgrctl-5.1.20-120002.3.3.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"product": {
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"product_id": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"product": {
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"product_id": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"product": {
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"product_id": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "grafana-11.5.7-120002.4.3.2.x86_64",
"product": {
"name": "grafana-11.5.7-120002.4.3.2.x86_64",
"product_id": "grafana-11.5.7-120002.4.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "mgrctl-5.1.20-120002.3.3.2.x86_64",
"product": {
"name": "mgrctl-5.1.20-120002.3.3.2.x86_64",
"product_id": "mgrctl-5.1.20-120002.3.3.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Multi Linux Manager Tools SLE-12",
"product": {
"name": "SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64 as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64"
},
"product_reference": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le"
},
"product_reference": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x"
},
"product_reference": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64 as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64"
},
"product_reference": "Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64 as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64"
},
"product_reference": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le"
},
"product_reference": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x"
},
"product_reference": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64 as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64"
},
"product_reference": "Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64 as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64 as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64"
},
"product_reference": "golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.7-120002.4.3.2.aarch64 as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64"
},
"product_reference": "grafana-11.5.7-120002.4.3.2.aarch64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.7-120002.4.3.2.ppc64le as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le"
},
"product_reference": "grafana-11.5.7-120002.4.3.2.ppc64le",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.7-120002.4.3.2.s390x as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x"
},
"product_reference": "grafana-11.5.7-120002.4.3.2.s390x",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.5.7-120002.4.3.2.x86_64 as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64"
},
"product_reference": "grafana-11.5.7-120002.4.3.2.x86_64",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgr-push-5.1.4-120002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch"
},
"product_reference": "mgr-push-5.1.4-120002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-defusedxml-0.6.0-120002.1.3.1.noarch as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch"
},
"product_reference": "python-defusedxml-0.6.0-120002.1.3.1.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-mgr-push-5.1.4-120002.3.3.3.noarch as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch"
},
"product_reference": "python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-rhnlib-5.1.3-120002.3.3.1.noarch as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch"
},
"product_reference": "python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch"
},
"product_reference": "python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacecmd-5.1.11-120002.3.3.2.noarch as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch"
},
"product_reference": "spacecmd-5.1.11-120002.3.3.2.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-client-tools-5.1.7-120002.3.3.2.noarch as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch"
},
"product_reference": "spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch as component of SUSE Multi Linux Manager Tools SLE-12",
"product_id": "SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
},
"product_reference": "supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch",
"relates_to_product_reference": "SUSE Multi Linux Manager Tools SLE-12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-3415",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-3415"
}
],
"notes": [
{
"category": "general",
"text": "Grafana is an open-source platform for monitoring and observability. The Grafana Alerting DingDing integration was not properly protected and could be exposed to users with Viewer permission. \nFixed in versions 10.4.19+security-01, 11.2.10+security-01, 11.3.7+security-01, 11.4.5+security-01, 11.5.5+security-01, 11.6.2+security-01 and 12.0.1+security-01",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-3415",
"url": "https://www.suse.com/security/cve/CVE-2025-3415"
},
{
"category": "external",
"summary": "SUSE Bug 1245302 for CVE-2025-3415",
"url": "https://bugzilla.suse.com/1245302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-28T07:19:09Z",
"details": "moderate"
}
],
"title": "CVE-2025-3415"
},
{
"cve": "CVE-2025-47908",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47908"
}
],
"notes": [
{
"category": "general",
"text": "Middleware causes a prohibitive amount of heap allocations when processing malicious preflight requests that include a Access-Control-Request-Headers (ACRH) header whose value contains many commas. This behavior can be abused by attackers to produce undue load on the middleware/server as an attempt to cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47908",
"url": "https://www.suse.com/security/cve/CVE-2025-47908"
},
{
"category": "external",
"summary": "SUSE Bug 1247746 for CVE-2025-47908",
"url": "https://bugzilla.suse.com/1247746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-28T07:19:09Z",
"details": "moderate"
}
],
"title": "CVE-2025-47908"
},
{
"cve": "CVE-2025-6023",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6023"
}
],
"notes": [
{
"category": "general",
"text": "An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.\n\nThe open redirect can be chained with path traversal vulnerabilities to achieve XSS.\n\nFixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6023",
"url": "https://www.suse.com/security/cve/CVE-2025-6023"
},
{
"category": "external",
"summary": "SUSE Bug 1246735 for CVE-2025-6023",
"url": "https://bugzilla.suse.com/1246735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-28T07:19:09Z",
"details": "important"
}
],
"title": "CVE-2025-6023"
},
{
"cve": "CVE-2025-6197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6197"
}
],
"notes": [
{
"category": "general",
"text": "An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.\n\n\nPrerequisites for exploitation:\n\n- Multiple organizations must exist in the Grafana instance\n\n- Victim must be on a different organization than the one specified in the URL",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6197",
"url": "https://www.suse.com/security/cve/CVE-2025-6197"
},
{
"category": "external",
"summary": "SUSE Bug 1246736 for CVE-2025-6197",
"url": "https://bugzilla.suse.com/1246736"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.aarch64",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.ppc64le",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.s390x",
"SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2.x86_64",
"SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1.noarch",
"SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2.noarch",
"SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-28T07:19:09Z",
"details": "moderate"
}
],
"title": "CVE-2025-6197"
}
]
}
OPENSUSE-SU-2025:15372-1
Vulnerability from csaf_opensuse - Published: 2025-07-23 00:00 - Updated: 2025-07-23 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "grafana-11.6.3+security01-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the grafana-11.6.3+security01-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15372",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15372-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6023 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6023/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6197/"
}
],
"title": "grafana-11.6.3+security01-1.1 on GA media",
"tracking": {
"current_release_date": "2025-07-23T00:00:00Z",
"generator": {
"date": "2025-07-23T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15372-1",
"initial_release_date": "2025-07-23T00:00:00Z",
"revision_history": [
{
"date": "2025-07-23T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "grafana-11.6.3+security01-1.1.aarch64",
"product": {
"name": "grafana-11.6.3+security01-1.1.aarch64",
"product_id": "grafana-11.6.3+security01-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-11.6.3+security01-1.1.ppc64le",
"product": {
"name": "grafana-11.6.3+security01-1.1.ppc64le",
"product_id": "grafana-11.6.3+security01-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-11.6.3+security01-1.1.s390x",
"product": {
"name": "grafana-11.6.3+security01-1.1.s390x",
"product_id": "grafana-11.6.3+security01-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-11.6.3+security01-1.1.x86_64",
"product": {
"name": "grafana-11.6.3+security01-1.1.x86_64",
"product_id": "grafana-11.6.3+security01-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.6.3+security01-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.aarch64"
},
"product_reference": "grafana-11.6.3+security01-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.6.3+security01-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.ppc64le"
},
"product_reference": "grafana-11.6.3+security01-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.6.3+security01-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.s390x"
},
"product_reference": "grafana-11.6.3+security01-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.6.3+security01-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.x86_64"
},
"product_reference": "grafana-11.6.3+security01-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6023",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6023"
}
],
"notes": [
{
"category": "general",
"text": "An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.\n\nThe open redirect can be chained with path traversal vulnerabilities to achieve XSS.\n\nFixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6023",
"url": "https://www.suse.com/security/cve/CVE-2025-6023"
},
{
"category": "external",
"summary": "SUSE Bug 1246735 for CVE-2025-6023",
"url": "https://bugzilla.suse.com/1246735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-23T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-6023"
},
{
"cve": "CVE-2025-6197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6197"
}
],
"notes": [
{
"category": "general",
"text": "An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.\n\n\nPrerequisites for exploitation:\n\n- Multiple organizations must exist in the Grafana instance\n\n- Victim must be on a different organization than the one specified in the URL",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6197",
"url": "https://www.suse.com/security/cve/CVE-2025-6197"
},
{
"category": "external",
"summary": "SUSE Bug 1246736 for CVE-2025-6197",
"url": "https://bugzilla.suse.com/1246736"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.3+security01-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-23T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-6197"
}
]
}
WID-SEC-W-2025-1593
Vulnerability from csaf_certbund - Published: 2025-07-17 22:00 - Updated: 2025-07-27 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Grafana ist eine Open-Source Analyse- und Visualisierungssoftware.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Grafana ausnutzen, um einen Cross-Site Scripting Angriff durchzuf\u00fchren und um Daten zu manipulieren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1593 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1593.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1593 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1593"
},
{
"category": "external",
"summary": "Grafana security release vom 2025-07-17",
"url": "https://grafana.com/blog/2025/07/17/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-6197-and-cve-2025-6023/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15372-1 vom 2025-07-25",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MNRNDD7KU4ETCJFFYOE7LEYOFJQCGAG/"
}
],
"source_lang": "en-US",
"title": "Grafana: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-07-27T22:00:00.000+00:00",
"generator": {
"date": "2025-07-28T07:54:39.913+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1593",
"initial_release_date": "2025-07-17T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-07-17T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-07-27T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von openSUSE aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c12.0.2+security-01",
"product": {
"name": "Open Source Grafana \u003c12.0.2+security-01",
"product_id": "T045503"
}
},
{
"category": "product_version",
"name": "12.0.2+security-01",
"product": {
"name": "Open Source Grafana 12.0.2+security-01",
"product_id": "T045503-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:grafana:grafana:12.0.2security-01"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.6.3+security-01",
"product": {
"name": "Open Source Grafana \u003c11.6.3+security-01",
"product_id": "T045504"
}
},
{
"category": "product_version",
"name": "11.6.3+security-01",
"product": {
"name": "Open Source Grafana 11.6.3+security-01",
"product_id": "T045504-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:grafana:grafana:11.6.3security-01"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.5.6+security-01",
"product": {
"name": "Open Source Grafana \u003c11.5.6+security-01",
"product_id": "T045505"
}
},
{
"category": "product_version",
"name": "11.5.6+security-01",
"product": {
"name": "Open Source Grafana 11.5.6+security-01",
"product_id": "T045505-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:grafana:grafana:11.5.6security-01"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.4.6+security-01",
"product": {
"name": "Open Source Grafana \u003c11.4.6+security-01",
"product_id": "T045506"
}
},
{
"category": "product_version",
"name": "11.4.6+security-01",
"product": {
"name": "Open Source Grafana 11.4.6+security-01",
"product_id": "T045506-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:grafana:grafana:11.4.6security-01"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.3.8+security-01",
"product": {
"name": "Open Source Grafana \u003c11.3.8+security-01",
"product_id": "T045507"
}
},
{
"category": "product_version",
"name": "11.3.8+security-01",
"product": {
"name": "Open Source Grafana 11.3.8+security-01",
"product_id": "T045507-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:grafana:grafana:11.3.8security-01"
}
}
}
],
"category": "product_name",
"name": "Grafana"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6023",
"product_status": {
"known_affected": [
"T045503",
"T045505",
"T045504",
"T045507",
"T045506",
"T027843"
]
},
"release_date": "2025-07-17T22:00:00.000+00:00",
"title": "CVE-2025-6023"
},
{
"cve": "CVE-2025-6197",
"product_status": {
"known_affected": [
"T045503",
"T045505",
"T045504",
"T045507",
"T045506",
"T027843"
]
},
"release_date": "2025-07-17T22:00:00.000+00:00",
"title": "CVE-2025-6197"
}
]
}
CERTFR-2025-AVI-0597
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Grafana. Elles permettent à un attaquant de provoquer une injection de code indirecte à distance (XSS) et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Grafana Labs | N/A | Grafana versions 11.6.x antérieures à 11.6.3+security-01 | ||
| Grafana Labs | N/A | Grafana versions 11.4.x antérieures à 11.4.6+security-01 | ||
| Grafana Labs | N/A | Grafana versions antérieures à 11.3.8+security-01 | ||
| Grafana Labs | N/A | Grafana versions 12.0.x antérieures à 12.0.2+security-01 | ||
| Grafana Labs | N/A | Grafana versions 11.5.x antérieures à 11.5.6+security-01 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Grafana versions 11.6.x ant\u00e9rieures \u00e0 11.6.3+security-01",
"product": {
"name": "N/A",
"vendor": {
"name": "Grafana Labs",
"scada": false
}
}
},
{
"description": "Grafana versions 11.4.x ant\u00e9rieures \u00e0 11.4.6+security-01",
"product": {
"name": "N/A",
"vendor": {
"name": "Grafana Labs",
"scada": false
}
}
},
{
"description": "Grafana versions ant\u00e9rieures \u00e0 11.3.8+security-01",
"product": {
"name": "N/A",
"vendor": {
"name": "Grafana Labs",
"scada": false
}
}
},
{
"description": "Grafana versions 12.0.x ant\u00e9rieures \u00e0 12.0.2+security-01",
"product": {
"name": "N/A",
"vendor": {
"name": "Grafana Labs",
"scada": false
}
}
},
{
"description": "Grafana versions 11.5.x ant\u00e9rieures \u00e0 11.5.6+security-01",
"product": {
"name": "N/A",
"vendor": {
"name": "Grafana Labs",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-6023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6023"
},
{
"name": "CVE-2025-6197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6197"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0597",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Grafana. Elles permettent \u00e0 un attaquant de provoquer une injection de code indirecte \u00e0 distance (XSS) et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Grafana",
"vendor_advisories": [
{
"published_at": "2025-07-17",
"title": "Bulletin de s\u00e9curit\u00e9 Grafana cve-2025-6197",
"url": "https://grafana.com/blog/2025/07/17/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-6197-and-cve-2025-6023/"
}
]
}
CERTFR-2025-AVI-0597
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Grafana. Elles permettent à un attaquant de provoquer une injection de code indirecte à distance (XSS) et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Grafana Labs | N/A | Grafana versions 11.6.x antérieures à 11.6.3+security-01 | ||
| Grafana Labs | N/A | Grafana versions 11.4.x antérieures à 11.4.6+security-01 | ||
| Grafana Labs | N/A | Grafana versions antérieures à 11.3.8+security-01 | ||
| Grafana Labs | N/A | Grafana versions 12.0.x antérieures à 12.0.2+security-01 | ||
| Grafana Labs | N/A | Grafana versions 11.5.x antérieures à 11.5.6+security-01 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Grafana versions 11.6.x ant\u00e9rieures \u00e0 11.6.3+security-01",
"product": {
"name": "N/A",
"vendor": {
"name": "Grafana Labs",
"scada": false
}
}
},
{
"description": "Grafana versions 11.4.x ant\u00e9rieures \u00e0 11.4.6+security-01",
"product": {
"name": "N/A",
"vendor": {
"name": "Grafana Labs",
"scada": false
}
}
},
{
"description": "Grafana versions ant\u00e9rieures \u00e0 11.3.8+security-01",
"product": {
"name": "N/A",
"vendor": {
"name": "Grafana Labs",
"scada": false
}
}
},
{
"description": "Grafana versions 12.0.x ant\u00e9rieures \u00e0 12.0.2+security-01",
"product": {
"name": "N/A",
"vendor": {
"name": "Grafana Labs",
"scada": false
}
}
},
{
"description": "Grafana versions 11.5.x ant\u00e9rieures \u00e0 11.5.6+security-01",
"product": {
"name": "N/A",
"vendor": {
"name": "Grafana Labs",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-6023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6023"
},
{
"name": "CVE-2025-6197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6197"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0597",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Grafana. Elles permettent \u00e0 un attaquant de provoquer une injection de code indirecte \u00e0 distance (XSS) et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Grafana",
"vendor_advisories": [
{
"published_at": "2025-07-17",
"title": "Bulletin de s\u00e9curit\u00e9 Grafana cve-2025-6197",
"url": "https://grafana.com/blog/2025/07/17/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-6197-and-cve-2025-6023/"
}
]
}
GHSA-VQPH-P5VC-G644
Vulnerability from github – Published: 2025-07-18 09:30 – Updated: 2025-07-20 16:35An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.
The open redirect can be chained with path traversal vulnerabilities to achieve XSS.
Fixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01
{
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "github.com/grafana/grafana"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.9.2-0.20250521205822-0ba0b99665a9"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-6023"
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"github_reviewed": true,
"github_reviewed_at": "2025-07-20T16:35:49Z",
"nvd_published_at": "2025-07-18T08:15:28Z",
"severity": "HIGH"
},
"details": "An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.\n\nThe open redirect can be chained with path traversal vulnerabilities to achieve XSS.\n\nFixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01",
"id": "GHSA-vqph-p5vc-g644",
"modified": "2025-07-20T16:35:49Z",
"published": "2025-07-18T09:30:31Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6023"
},
{
"type": "WEB",
"url": "https://github.com/grafana/grafana/commit/0ba0b99665a946cd96676ef85ec8bc83028cb1d7"
},
{
"type": "WEB",
"url": "https://github.com/grafana/grafana/commit/40ed88fe86d347bcde5ddaed6c4a20a95d2f0d55"
},
{
"type": "WEB",
"url": "https://github.com/grafana/grafana/commit/5b00e21638f565eed46acb4d0b7c009968df4c3b"
},
{
"type": "WEB",
"url": "https://github.com/grafana/grafana/commit/b6dd2b70c655c61b111b328f1a7dcca6b3954936"
},
{
"type": "WEB",
"url": "https://github.com/grafana/grafana/commit/e0ba4b480954f8a33aa2cff3229f6bcc05777bd9"
},
{
"type": "WEB",
"url": "https://github.com/grafana/grafana"
},
{
"type": "WEB",
"url": "https://grafana.com/blog/2025/07/17/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-6197-and-cve-2025-6023"
},
{
"type": "WEB",
"url": "https://grafana.com/security/security-advisories/cve-2025-6023"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"type": "CVSS_V3"
}
],
"summary": "Grafana is vulnerable to XSS attacks through open redirects and path traversal"
}
FKIE_CVE-2025-6023
Vulnerability from fkie_nvd - Published: 2025-07-18 08:15 - Updated: 2025-07-22 13:06| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.\n\nThe open redirect can be chained with path traversal vulnerabilities to achieve XSS.\n\nFixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01"
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de redirecci\u00f3n abierta en Grafana OSS que puede explotarse para realizar ataques XSS. Esta vulnerabilidad se introdujo en Grafana v11.5.0. La redirecci\u00f3n abierta puede combinarse con vulnerabilidades de path traversal para lograr XSS. Corregida en las versiones 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 y 11.3.8+security-01."
}
],
"id": "CVE-2025-6023",
"lastModified": "2025-07-22T13:06:27.983",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7,
"source": "security@grafana.com",
"type": "Secondary"
}
]
},
"published": "2025-07-18T08:15:28.040",
"references": [
{
"source": "security@grafana.com",
"url": "https://grafana.com/blog/2025/07/17/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-6197-and-cve-2025-6023/"
},
{
"source": "security@grafana.com",
"url": "https://grafana.com/security/security-advisories/cve-2025-6023/"
}
],
"sourceIdentifier": "security@grafana.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-601"
}
],
"source": "security@grafana.com",
"type": "Secondary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.