<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for grafana and mybatis</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:1530-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-05-06T09:52:35Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-05-06T09:52:35Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-05-06T09:52:35Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for grafana and mybatis</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for grafana and mybatis fixes the following issues:

grafana was updated to version 9.5.18:

- Grafana now requires Go 1.20
- Security issues fixed:

  * CVE-2024-1313: Require same organisation when deleting snapshots (bsc#1222155)
  * CVE-2023-6152: Add email verification when updating user email (bsc#1219912)

- Other non-security related changes:

  * Version 9.5.17:

    + [FEATURE] Alerting: Backport use Alertmanager API v2

  * Version 9.5.16:

    + [BUGFIX] Annotations: Split cleanup into separate queries and
      deletes to avoid deadlocks on MySQL

  * Version 9.5.15:

    + [FEATURE] Alerting: Attempt to retry retryable errors

  * Version 9.5.14:

    + [BUGFIX] Alerting: Fix state manager to not keep
      datasource_uid and ref_id labels in state after Error
    + [BUGFIX] Transformations: Config overrides being lost when
      config from query transform is applied
    + [BUGFIX] LDAP: Fix enable users on successfull login

  * Version 9.5.13:

    + [BUGFIX] BrowseDashboards: Only remember the most recent
      expanded folder
    + [BUGFIX] Licensing: Pass func to update env variables when
      starting plugin

  * Version 9.5.12:

    + [FEATURE] Azure: Add support for Workload Identity
      authentication

  * Version 9.5.9:

    + [FEATURE] SSE: Fix DSNode to not panic when response has empty
      response
    + [FEATURE] Prometheus: Handle the response with different field
      key order
    + [BUGFIX] LDAP: Fix user disabling


mybatis:

- `apache-commons-ognl` is now a non-optional dependency
- Fixed building with log4j v1 and v2 dependencies
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Container suse/manager/5.0/x86_64/server-attestation:latest-2024-1530,Container suse/manager/5.0/x86_64/server:latest-2024-1530,Image server-attestation-image-2024-1530,Image server-image-2024-1530,SUSE-2024-1530,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1530,openSUSE-SLE-15.5-2024-1530</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241530-1/</URL>
      <Description>Link for SUSE-SU-2024:1530-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2024-May/035151.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:1530-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1219912</URL>
      <Description>SUSE Bug 1219912</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222155</URL>
      <Description>SUSE Bug 1222155</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-6152/</URL>
      <Description>SUSE CVE CVE-2023-6152 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-1313/</URL>
      <Description>SUSE CVE CVE-2024-1313 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Container suse/manager/5.0/x86_64/server-attestation:latest">
      <Branch Type="Product Name" Name="Container suse/manager/5.0/x86_64/server-attestation:latest">
        <FullProductName ProductID="Container suse/manager/5.0/x86_64/server-attestation:latest">Container suse/manager/5.0/x86_64/server-attestation:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Container suse/manager/5.0/x86_64/server:latest">
      <Branch Type="Product Name" Name="Container suse/manager/5.0/x86_64/server:latest">
        <FullProductName ProductID="Container suse/manager/5.0/x86_64/server:latest">Container suse/manager/5.0/x86_64/server:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image server-attestation-image">
      <Branch Type="Product Name" Name="Image server-attestation-image">
        <FullProductName ProductID="Image server-attestation-image">Image server-attestation-image</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image server-image">
      <Branch Type="Product Name" Name="Image server-image">
        <FullProductName ProductID="Image server-image">Image server-image</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Package Hub 15 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Package Hub 15 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP5" CPE="cpe:/o:suse:packagehub:15:sp5">SUSE Linux Enterprise Module for Package Hub 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.5">
      <Branch Type="Product Name" Name="openSUSE Leap 15.5">
        <FullProductName ProductID="openSUSE Leap 15.5" CPE="cpe:/o:opensuse:leap:15.5">openSUSE Leap 15.5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="mybatis-3.5.6-150200.5.6.1">
      <FullProductName ProductID="mybatis-3.5.6-150200.5.6.1">mybatis-3.5.6-150200.5.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="grafana-9.5.18-150200.3.56.1">
      <FullProductName ProductID="grafana-9.5.18-150200.3.56.1">grafana-9.5.18-150200.3.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mybatis-javadoc-3.5.6-150200.5.6.1">
      <FullProductName ProductID="mybatis-javadoc-3.5.6-150200.5.6.1">mybatis-javadoc-3.5.6-150200.5.6.1</FullProductName>
    </Branch>
    <Relationship ProductReference="mybatis-3.5.6-150200.5.6.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/manager/5.0/x86_64/server-attestation:latest">
      <FullProductName ProductID="Container suse/manager/5.0/x86_64/server-attestation:latest:mybatis-3.5.6-150200.5.6.1">mybatis-3.5.6-150200.5.6.1 as a component of Container suse/manager/5.0/x86_64/server-attestation:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="mybatis-3.5.6-150200.5.6.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/manager/5.0/x86_64/server:latest">
      <FullProductName ProductID="Container suse/manager/5.0/x86_64/server:latest:mybatis-3.5.6-150200.5.6.1">mybatis-3.5.6-150200.5.6.1 as a component of Container suse/manager/5.0/x86_64/server:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="mybatis-3.5.6-150200.5.6.1" RelationType="Default Component Of" RelatesToProductReference="Image server-attestation-image">
      <FullProductName ProductID="Image server-attestation-image:mybatis-3.5.6-150200.5.6.1">mybatis-3.5.6-150200.5.6.1 as a component of Image server-attestation-image</FullProductName>
    </Relationship>
    <Relationship ProductReference="mybatis-3.5.6-150200.5.6.1" RelationType="Default Component Of" RelatesToProductReference="Image server-image">
      <FullProductName ProductID="Image server-image:mybatis-3.5.6-150200.5.6.1">mybatis-3.5.6-150200.5.6.1 as a component of Image server-image</FullProductName>
    </Relationship>
    <Relationship ProductReference="grafana-9.5.18-150200.3.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Package Hub 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.18-150200.3.56.1">grafana-9.5.18-150200.3.56.1 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="grafana-9.5.18-150200.3.56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:grafana-9.5.18-150200.3.56.1">grafana-9.5.18-150200.3.56.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="mybatis-3.5.6-150200.5.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:mybatis-3.5.6-150200.5.6.1">mybatis-3.5.6-150200.5.6.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="mybatis-javadoc-3.5.6-150200.5.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:mybatis-javadoc-3.5.6-150200.5.6.1">mybatis-javadoc-3.5.6-150200.5.6.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A user changing their email after signing up and verifying it can change it without verification in profile settings.

The configuration option "verify_email_enabled" will only validate email only on sign up.

</Note>
    </Notes>
    <CVE>CVE-2023-6152</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/5.0/x86_64/server-attestation:latest:mybatis-3.5.6-150200.5.6.1</ProductID>
        <ProductID>Container suse/manager/5.0/x86_64/server:latest:mybatis-3.5.6-150200.5.6.1</ProductID>
        <ProductID>Image server-attestation-image:mybatis-3.5.6-150200.5.6.1</ProductID>
        <ProductID>Image server-image:mybatis-3.5.6-150200.5.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.18-150200.3.56.1</ProductID>
        <ProductID>openSUSE Leap 15.5:grafana-9.5.18-150200.3.56.1</ProductID>
        <ProductID>openSUSE Leap 15.5:mybatis-3.5.6-150200.5.6.1</ProductID>
        <ProductID>openSUSE Leap 15.5:mybatis-javadoc-3.5.6-150200.5.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241530-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-6152.html</URL>
        <Description>CVE-2023-6152</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219912</URL>
        <Description>SUSE Bug 1219912</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/&lt;key&gt; using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized.

Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo 
Alto Research for discovering and disclosing this vulnerability.

This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.

</Note>
    </Notes>
    <CVE>CVE-2024-1313</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/5.0/x86_64/server-attestation:latest:mybatis-3.5.6-150200.5.6.1</ProductID>
        <ProductID>Container suse/manager/5.0/x86_64/server:latest:mybatis-3.5.6-150200.5.6.1</ProductID>
        <ProductID>Image server-attestation-image:mybatis-3.5.6-150200.5.6.1</ProductID>
        <ProductID>Image server-image:mybatis-3.5.6-150200.5.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana-9.5.18-150200.3.56.1</ProductID>
        <ProductID>openSUSE Leap 15.5:grafana-9.5.18-150200.3.56.1</ProductID>
        <ProductID>openSUSE Leap 15.5:mybatis-3.5.6-150200.5.6.1</ProductID>
        <ProductID>openSUSE Leap 15.5:mybatis-javadoc-3.5.6-150200.5.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241530-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-1313.html</URL>
        <Description>CVE-2024-1313</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222155</URL>
        <Description>SUSE Bug 1222155</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
