<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update 5.1.1 for Multi-Linux Manager Client Tools</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:3817-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-10-28T07:19:09Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-10-28T07:19:09Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-10-28T07:19:09Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update 5.1.1 for Multi-Linux Manager Client Tools</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update fixes the following issues:

golang-github-prometheus-alertmanager:

- Update to version 0.28.1 (jsc#PED-13285):
  * Improved performance of inhibition rules when using Equal
    labels.
  * Improve the documentation on escaping in UTF-8 matchers.
  * Update alertmanager_config_hash metric help to document the
    hash is not cryptographically strong.
  * Fix panic in amtool when using --verbose.
  * Fix templating of channel field for Rocket.Chat.
  * Fix rocketchat_configs written as rocket_configs in docs.
  * Fix usage for --enable-feature flag.
  * Trim whitespace from OpsGenie API Key.
  * Fix Jira project template not rendered when searching for
    existing issues.
  * Fix subtle bug in JSON/YAML encoding of inhibition rules that
    would cause Equal labels to be omitted.
  * Fix header for slack_configs in docs.
  * Fix weight and wrap of Microsoft Teams notifications.
- Upgrade to version 0.28.0:
  * CVE-2025-47908: Bump github.com/rs/cors (bsc#1247748).
  * Templating errors in the SNS integration now return an error.
  * Adopt log/slog, drop go-kit/log.
  * Add a new Microsoft Teams integration based on Flows.
  * Add a new Rocket.Chat integration.
  * Add a new Jira integration.
  * Add support for GOMEMLIMIT, enable it via the feature flag
    --enable-feature=auto-gomemlimit.
  * Add support for GOMAXPROCS, enable it via the feature flag
    --enable-feature=auto-gomaxprocs.
  * Add support for limits of silences including the maximum number
    of active and pending silences, and the maximum size per
    silence (in bytes). You can use the flags
    --silences.max-silences and --silences.max-silence-size-bytes
    to set them accordingly.
  * Muted alerts now show whether they are suppressed or not in
    both the /api/v2/alerts endpoint and the Alertmanager UI.
- Upgrade to version 0.27.0:
  * API: Removal of all api/v1/ endpoints. These endpoints
    now log and return a deprecation message and respond with a
    status code of 410.
  * UTF-8 Support: Introduction of support for any UTF-8
    character as part of label names and matchers.
  * Discord Integration: Enforce max length in message.
  * Metrics: Introduced the experimental feature flag
    --enable-feature=receiver-name-in-metrics to include the
    receiver name.
  * Metrics: Introduced a new gauge named
    alertmanager_inhibition_rules that counts the number of
    configured inhibition rules.
  * Metrics: Introduced a new counter named
    alertmanager_alerts_supressed_total that tracks muted alerts,
    it contains a reason label to indicate the source of the mute.
  * Discord Integration: Introduced support for webhook_url_file.
  * Microsoft Teams Integration: Introduced support for
    webhook_url_file.
  * Microsoft Teams Integration: Add support for summary.
  * Metrics: Notification metrics now support two new values for
    the label reason, contextCanceled and contextDeadlineExceeded.
  * Email Integration: Contents of auth_password_file are now
    trimmed of prefixed and suffixed whitespace.
  * amtool: Fixes the error scheme required for webhook url when
    using amtool with --alertmanager.url.
  * Mixin: Fix AlertmanagerFailedToSendAlerts,
    AlertmanagerClusterFailedToSendAlerts, and
    AlertmanagerClusterFailedToSendAlerts to make sure they ignore
    the reason label.

grafana:

- Update to version 11.5.7:
  * Security:
    CVE-2025-6023: Fix cross-site-scripting via scripted dashboards
                   (bsc#1246735)
    CVE-2025-6197: Fix open redirect in organization switching
                   (bsc#1246736)
  * Bug fixes:
    Azure: Fix legend formatting.
    Azure: Fix resource name determination in template variable
           queries.
- Update to version 11.5.6:
    CVE-2025-3415: Fix exposure of DingDing alerting integration
                   URL to Viewer level users (bsc#1245302)

mgr-push:

- Version 5.1.4-0
  * Use absolute paths when invoking external commands
  * Fix syntax error in changelog

python-defusedxml:

- Update to 0.6.0
  * Increase test coverage.
  * Add badges to README.
  * Test on Python 3.7 stable and 3.8-dev
  * Drop support for Python 3.4
  * No longer pass *html* argument to XMLParse. It has been deprecated and
    ignored for a long time. The DefusedXMLParser still takes a html argument.
    A deprecation warning is issued when the argument is False and a TypeError
    when it's True.
  * defusedxml now fails early when pyexpat stdlib module is not available or
    broken.
  * defusedxml.ElementTree.__all__ now lists ParseError as public attribute.
  * The defusedxml.ElementTree and defusedxml.cElementTree modules had a typo
    and used XMLParse instead of XMLParser as an alias for DefusedXMLParser.
    Both the old and fixed name are now available.
- Remove superfluous devel dependency for noarch package
- Fix source url.
- Update to 5.0
  * Add compatibility with Python 3.6
  * Drop support for Python 2.6, 3.1, 3.2, 3.3
  * Fix lxml tests (XMLSyntaxError: Detected an entity reference loop)
- Implement single-spec version.
- Dummy changelog for bsc#1019074, FATE#322329
- Initial packaging.

rhnlib:

- Version 5.1.3-0
  * Fix syntax error in changelog
  * Use more secure defusedxml parser (bsc#1227577)

spacecmd:

- Version 5.1.11-0
  * Make spacecmd work with Python 3.12 and higher
  * Call print statements properly in Python 3
- Version 5.1.10-0
  * Fix use of renamed config parser class where the backward
    compatible alias was dropped in latest python version
    (bsc#1246586)
- Version 5.1.9-0
  * Fix installation of python lib files on Ubuntu 24.04

spacewalk-client-tools:

- Version 5.1.7-0
  * Fix syntax error in changelog

supportutils-plugin-susemanager-client:

- Version 5.1.4-0
  * Fix syntax error in changelog

uyuni-tools:

- version 5.1.20-0
  * Add migration for server monitoring configuration (bsc#1247688)

- version 5.1.19-0
  * Add a lowercase version of --logLevel (bsc#1243611)
  * Stop executing scripts in temporary folder (bsc#1243704)
  * support config: collect podman inspect for hub container
    (bsc#1245099)
  * Use new dedicated path for Cobbler settings (bsc#1244027)
  * Migrate custom auto installation snippets (bsc#1246320)
  * Add SUSE Linux Enterprise 15 SP7 to buildin productmap
  * Fix loading product map from mgradm configuration file
    (bsc#1246068)
  * Fix channel override for distro copy
  * Do not use sudo when running as a root user (bsc#1246882)
  * Do not require backups to be at the same location for restoring
    (bsc#1246906)
  * Fix recomputing proxy images when installing a PTF or TEST
    (bsc#1246553)
  * Add mgradm server rename to change the server FQDN (bsc#1229825)
  * If no DB SSL CA parameter is given, use the other one
    (bsc#1245120)
  * More fault tolerant mgradm stop (bsc#1243331)
  * Backup systemd dropin directory too and create if missing
  * Add 3rd party SSL options for upgrade and migration scenarios
  * Do not consider stderr output of podman as an error
    (bsc#1247836)
  * Restore SELinux contexts for restored backup volumes
    (bsc#1244127)
  * Automatically get up-to-date systemid file on salt based proxy
    hosts (bsc#1246789)
  * Bump the default image tag to 5.1.1

- version 5.1.18-0
  * Update translation strings

- version 5.1.17-0
  * upgrade saline should use scale function (bsc#1246864)

- version 5.1.16-0
  * Use database backup volume as temporary backup location
    (bsc#1246628)

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-3817,SUSE-MultiLinuxManagerTools-SLE-12-2025-3817</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20253817-1/</URL>
      <Description>Link for SUSE-SU-2025:3817-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-October/023071.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:3817-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1019074</URL>
      <Description>SUSE Bug 1019074</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227577</URL>
      <Description>SUSE Bug 1227577</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229825</URL>
      <Description>SUSE Bug 1229825</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1243331</URL>
      <Description>SUSE Bug 1243331</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1243611</URL>
      <Description>SUSE Bug 1243611</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1243704</URL>
      <Description>SUSE Bug 1243704</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244027</URL>
      <Description>SUSE Bug 1244027</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244127</URL>
      <Description>SUSE Bug 1244127</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245099</URL>
      <Description>SUSE Bug 1245099</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245120</URL>
      <Description>SUSE Bug 1245120</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245302</URL>
      <Description>SUSE Bug 1245302</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246068</URL>
      <Description>SUSE Bug 1246068</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246320</URL>
      <Description>SUSE Bug 1246320</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246553</URL>
      <Description>SUSE Bug 1246553</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246586</URL>
      <Description>SUSE Bug 1246586</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246628</URL>
      <Description>SUSE Bug 1246628</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246735</URL>
      <Description>SUSE Bug 1246735</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246736</URL>
      <Description>SUSE Bug 1246736</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246789</URL>
      <Description>SUSE Bug 1246789</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246864</URL>
      <Description>SUSE Bug 1246864</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246882</URL>
      <Description>SUSE Bug 1246882</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246906</URL>
      <Description>SUSE Bug 1246906</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247688</URL>
      <Description>SUSE Bug 1247688</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247748</URL>
      <Description>SUSE Bug 1247748</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247836</URL>
      <Description>SUSE Bug 1247836</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-3415/</URL>
      <Description>SUSE CVE CVE-2025-3415 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-47908/</URL>
      <Description>SUSE CVE CVE-2025-47908 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-6023/</URL>
      <Description>SUSE CVE CVE-2025-6023 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-6197/</URL>
      <Description>SUSE CVE CVE-2025-6197 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Multi Linux Manager Tools SLE-12">
      <Branch Type="Product Name" Name="SUSE Multi Linux Manager Tools SLE-12">
        <FullProductName ProductID="SUSE Multi Linux Manager Tools SLE-12">SUSE Multi Linux Manager Tools SLE-12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2">
      <FullProductName ProductID="Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2">Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2">
      <FullProductName ProductID="Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2">Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2">
      <FullProductName ProductID="golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2">golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="grafana-11.5.7-120002.4.3.2">
      <FullProductName ProductID="grafana-11.5.7-120002.4.3.2">grafana-11.5.7-120002.4.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mgr-push-5.1.4-120002.3.3.3">
      <FullProductName ProductID="mgr-push-5.1.4-120002.3.3.3">mgr-push-5.1.4-120002.3.3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mgrctl-5.1.20-120002.3.3.2">
      <FullProductName ProductID="mgrctl-5.1.20-120002.3.3.2">mgrctl-5.1.20-120002.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mgrctl-bash-completion-5.1.20-120002.3.3.2">
      <FullProductName ProductID="mgrctl-bash-completion-5.1.20-120002.3.3.2">mgrctl-bash-completion-5.1.20-120002.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mgrctl-lang-5.1.20-120002.3.3.2">
      <FullProductName ProductID="mgrctl-lang-5.1.20-120002.3.3.2">mgrctl-lang-5.1.20-120002.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mgrctl-zsh-completion-5.1.20-120002.3.3.2">
      <FullProductName ProductID="mgrctl-zsh-completion-5.1.20-120002.3.3.2">mgrctl-zsh-completion-5.1.20-120002.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python-defusedxml-0.6.0-120002.1.3.1">
      <FullProductName ProductID="python-defusedxml-0.6.0-120002.1.3.1">python-defusedxml-0.6.0-120002.1.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python2-mgr-push-5.1.4-120002.3.3.3">
      <FullProductName ProductID="python2-mgr-push-5.1.4-120002.3.3.3">python2-mgr-push-5.1.4-120002.3.3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python2-rhnlib-5.1.3-120002.3.3.1">
      <FullProductName ProductID="python2-rhnlib-5.1.3-120002.3.3.1">python2-rhnlib-5.1.3-120002.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python2-spacewalk-client-tools-5.1.7-120002.3.3.2">
      <FullProductName ProductID="python2-spacewalk-client-tools-5.1.7-120002.3.3.2">python2-spacewalk-client-tools-5.1.7-120002.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-defusedxml-0.6.0-120002.1.3.1">
      <FullProductName ProductID="python3-defusedxml-0.6.0-120002.1.3.1">python3-defusedxml-0.6.0-120002.1.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="spacecmd-5.1.11-120002.3.3.2">
      <FullProductName ProductID="spacecmd-5.1.11-120002.3.3.2">spacecmd-5.1.11-120002.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="spacewalk-client-tools-5.1.7-120002.3.3.2">
      <FullProductName ProductID="spacewalk-client-tools-5.1.7-120002.3.3.2">spacewalk-client-tools-5.1.7-120002.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1">
      <FullProductName ProductID="supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1">supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Multi Linux Manager Tools SLE-12">
      <FullProductName ProductID="SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2">Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2 as a component of SUSE Multi Linux Manager Tools SLE-12</FullProductName>
    </Relationship>
    <Relationship ProductReference="Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Multi Linux Manager Tools SLE-12">
      <FullProductName ProductID="SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2">Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2 as a component of SUSE Multi Linux Manager Tools SLE-12</FullProductName>
    </Relationship>
    <Relationship ProductReference="golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Multi Linux Manager Tools SLE-12">
      <FullProductName ProductID="SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2">golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2 as a component of SUSE Multi Linux Manager Tools SLE-12</FullProductName>
    </Relationship>
    <Relationship ProductReference="grafana-11.5.7-120002.4.3.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Multi Linux Manager Tools SLE-12">
      <FullProductName ProductID="SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2">grafana-11.5.7-120002.4.3.2 as a component of SUSE Multi Linux Manager Tools SLE-12</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgr-push-5.1.4-120002.3.3.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Multi Linux Manager Tools SLE-12">
      <FullProductName ProductID="SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3">mgr-push-5.1.4-120002.3.3.3 as a component of SUSE Multi Linux Manager Tools SLE-12</FullProductName>
    </Relationship>
    <Relationship ProductReference="python-defusedxml-0.6.0-120002.1.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Multi Linux Manager Tools SLE-12">
      <FullProductName ProductID="SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1">python-defusedxml-0.6.0-120002.1.3.1 as a component of SUSE Multi Linux Manager Tools SLE-12</FullProductName>
    </Relationship>
    <Relationship ProductReference="python2-mgr-push-5.1.4-120002.3.3.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Multi Linux Manager Tools SLE-12">
      <FullProductName ProductID="SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3">python2-mgr-push-5.1.4-120002.3.3.3 as a component of SUSE Multi Linux Manager Tools SLE-12</FullProductName>
    </Relationship>
    <Relationship ProductReference="python2-rhnlib-5.1.3-120002.3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Multi Linux Manager Tools SLE-12">
      <FullProductName ProductID="SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1">python2-rhnlib-5.1.3-120002.3.3.1 as a component of SUSE Multi Linux Manager Tools SLE-12</FullProductName>
    </Relationship>
    <Relationship ProductReference="python2-spacewalk-client-tools-5.1.7-120002.3.3.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Multi Linux Manager Tools SLE-12">
      <FullProductName ProductID="SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2">python2-spacewalk-client-tools-5.1.7-120002.3.3.2 as a component of SUSE Multi Linux Manager Tools SLE-12</FullProductName>
    </Relationship>
    <Relationship ProductReference="spacecmd-5.1.11-120002.3.3.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Multi Linux Manager Tools SLE-12">
      <FullProductName ProductID="SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2">spacecmd-5.1.11-120002.3.3.2 as a component of SUSE Multi Linux Manager Tools SLE-12</FullProductName>
    </Relationship>
    <Relationship ProductReference="spacewalk-client-tools-5.1.7-120002.3.3.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Multi Linux Manager Tools SLE-12">
      <FullProductName ProductID="SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2">spacewalk-client-tools-5.1.7-120002.3.3.2 as a component of SUSE Multi Linux Manager Tools SLE-12</FullProductName>
    </Relationship>
    <Relationship ProductReference="supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Multi Linux Manager Tools SLE-12">
      <FullProductName ProductID="SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1">supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1 as a component of SUSE Multi Linux Manager Tools SLE-12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Grafana is an open-source platform for monitoring and observability. The Grafana Alerting DingDing integration was not properly protected and could be exposed to users with Viewer permission. 
Fixed in versions 10.4.19+security-01, 11.2.10+security-01, 11.3.7+security-01, 11.4.5+security-01, 11.5.5+security-01, 11.6.2+security-01 and 12.0.1+security-01</Note>
    </Notes>
    <CVE>CVE-2025-3415</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20253817-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-3415.html</URL>
        <Description>CVE-2025-3415</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245302</URL>
        <Description>SUSE Bug 1245302</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Middleware causes a prohibitive amount of heap allocations when processing malicious preflight requests that include a Access-Control-Request-Headers (ACRH) header whose value contains many commas. This behavior can be abused by attackers to produce undue load on the middleware/server as an attempt to cause a denial of service.</Note>
    </Notes>
    <CVE>CVE-2025-47908</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20253817-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-47908.html</URL>
        <Description>CVE-2025-47908</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247746</URL>
        <Description>SUSE Bug 1247746</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.

The open redirect can be chained with path traversal vulnerabilities to achieve XSS.

Fixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01</Note>
    </Notes>
    <CVE>CVE-2025-6023</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20253817-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-6023.html</URL>
        <Description>CVE-2025-6023</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246735</URL>
        <Description>SUSE Bug 1246735</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.


Prerequisites for exploitation:

- Multiple organizations must exist in the Grafana instance

- Victim must be on a different organization than the one specified in the URL</Note>
    </Notes>
    <CVE>CVE-2025-6197</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-12-120002.1.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:Multi-Linux-ManagerTools-SLE-release-POOL-12-120002.1.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:golang-github-prometheus-alertmanager-0.28.1-120002.4.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:grafana-11.5.7-120002.4.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:mgr-push-5.1.4-120002.3.3.3</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:python-defusedxml-0.6.0-120002.1.3.1</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:python2-mgr-push-5.1.4-120002.3.3.3</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:python2-rhnlib-5.1.3-120002.3.3.1</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:python2-spacewalk-client-tools-5.1.7-120002.3.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:spacecmd-5.1.11-120002.3.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:spacewalk-client-tools-5.1.7-120002.3.3.2</ProductID>
        <ProductID>SUSE Multi Linux Manager Tools SLE-12:supportutils-plugin-susemanager-client-5.1.4-120002.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20253817-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-6197.html</URL>
        <Description>CVE-2025-6197</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246736</URL>
        <Description>SUSE Bug 1246736</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
