<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update 5.0.6 for Multi-Linux Manager Client Tools</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:4458-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-12-18T11:57:30Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-12-18T11:57:30Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-12-18T11:57:30Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update 5.0.6 for Multi-Linux Manager Client Tools</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update fixes the following issues:

dracut-saltboot:

- Update to version 1.0.0
  * Reboot on salt key timeout (bsc#1237495)
  * Fixed parsing files with space in the name (bsc#1252100)

grafana was updated from version 11.5.5 to 11.5.10:

- Security issues fixed:

  * CVE-2025-47911: Fix parsing HTML documents (bsc#1251454)
  * CVE-2025-58190: Fix excessive memory consumption (bsc#1251657)
  * CVE-2025-64751: Drop experimental implementation of authorization Zanzana server/client
                    (bsc#1254113)
  * CVE-2025-11065: Fixed sensitive information leak in logs (version 11.5.9) (bsc#1250616)
  * CVE-2025-6023: Fixed cross-site-scripting via scripted dashboards (version 11.5.7) (bsc#1246735)
  * CVE-2025-6197: Fixed open redirect in organization switching (version 11.5.7) (bsc#1246736)
  * CVE-2025-3415: Fixed exposure of DingDing alerting integration URL to Viewer level users (version 11.5.6)
                   (bsc#1245302)

- Other changes, new features and bugs fixed:
    
  * Version 11.5.10:
    + Update to Go 1.25
    + Update to golang.org/x/net v0.45.0
    + Auth: Fix render user OAuth passthrough
    + LDAP Authentication: Fix URL to propagate username context as parameter

  * Version 11.5.9:
    + Auditing: Document new options for recording datasource query request/response body.
    + Login: Fixed redirection after login when Grafana is served from subpath.

  * Version 11.5.7:
    + Azure: Fixed legend formatting and resource name determination in template variable queries.

mgr-push:

- Version 5.0.3-0
  * Fixed syntax error in changelog

rhnlib:

- Version 5.0.6-0
  * Use more secure defusedxml parser (bsc#1227577)

spacecmd:

- Version 5.0.14-0
  * Fixed installation of python lib files on Ubuntu 24.04 (bsc#1246586)
  * Use JSON instead of pickle for spacecmd cache (bsc#1227579)
  * Make spacecmd to work with Python 3.12 and higher
  * Call print statements properly in Python 3

uyuni-tools:

- Version 0.1.37-0
  * Handle CA files with symlinks during migration (bsc#1251044)
  * Add a lowercase version of --logLevel (bsc#1243611)
  * Adjust traefik exposed configuration for chart v27+ (bsc#1247721)
  * Stop executing scripts in temporary folder (bsc#1243704)
  * Convert the traefik install time to local time (bsc#1251138)
  * Run smdba and reindex only during migration (bsc#1244534)
  * Support config: collect podman inspect for hub container (bsc#1245099)
  * Add --registry-host, --registry-user and --registry-password to pull images from an authenticate registry
  * Deprecate --registry
  * Use new dedicated path for Cobbler settings (bsc#1244027)
  * Migrate custom auto installation snippets (bsc#1246320)
  * Add SLE15SP7 to buildin productmap
  * Fix loading product map from mgradm configuration file (bsc#1246068)
  * Fix channel override for distro copy
  * Do not use sudo when running as a root user (bsc#1246882)
  * Do not require backups to be at the same location for restoring (bsc#1246906)
  * Check for restorecon presence before calling (bsc#1246925)
  * Automatically get up-to-date systemid file on salt based proxy hosts (bsc#1246789)
  * Fix recomputing proxy images when installing a ptf or test (bsc#1246553)
  * Add migration for server monitoring configuration (bsc#1247688)
- Version 0.1.36-0
  * Bump the default image tag
- Version 0.1.35-0
  * Restore SELinux contexts for restored backup volumes (bsc#1244127)
- Version 0.1.34-0
  * Fix mgradm backup create handling of images and systemd files (bsc#1246738)
- Version 0.1.33-0
  * Restore volumes using tar instead of podman import (bsc#1244127)

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-4458,SUSE-SLE-Manager-Tools-15-2025-4458,SUSE-SLE-Manager-Tools-For-Micro-5-2025-4458,openSUSE-SLE-15.6-2025-4458</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254458-1/</URL>
      <Description>Link for SUSE-SU-2025:4458-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-December/023628.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:4458-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227577</URL>
      <Description>SUSE Bug 1227577</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227579</URL>
      <Description>SUSE Bug 1227579</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1237495</URL>
      <Description>SUSE Bug 1237495</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1243611</URL>
      <Description>SUSE Bug 1243611</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1243704</URL>
      <Description>SUSE Bug 1243704</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244027</URL>
      <Description>SUSE Bug 1244027</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244127</URL>
      <Description>SUSE Bug 1244127</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244534</URL>
      <Description>SUSE Bug 1244534</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245099</URL>
      <Description>SUSE Bug 1245099</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245302</URL>
      <Description>SUSE Bug 1245302</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246068</URL>
      <Description>SUSE Bug 1246068</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246320</URL>
      <Description>SUSE Bug 1246320</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246553</URL>
      <Description>SUSE Bug 1246553</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246586</URL>
      <Description>SUSE Bug 1246586</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246662</URL>
      <Description>SUSE Bug 1246662</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246735</URL>
      <Description>SUSE Bug 1246735</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246736</URL>
      <Description>SUSE Bug 1246736</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246738</URL>
      <Description>SUSE Bug 1246738</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246789</URL>
      <Description>SUSE Bug 1246789</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246882</URL>
      <Description>SUSE Bug 1246882</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246906</URL>
      <Description>SUSE Bug 1246906</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246925</URL>
      <Description>SUSE Bug 1246925</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247688</URL>
      <Description>SUSE Bug 1247688</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247721</URL>
      <Description>SUSE Bug 1247721</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1250616</URL>
      <Description>SUSE Bug 1250616</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251044</URL>
      <Description>SUSE Bug 1251044</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251138</URL>
      <Description>SUSE Bug 1251138</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1252100</URL>
      <Description>SUSE Bug 1252100</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-11065/</URL>
      <Description>SUSE CVE CVE-2025-11065 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-3415/</URL>
      <Description>SUSE CVE CVE-2025-3415 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-6023/</URL>
      <Description>SUSE CVE CVE-2025-6023 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-6197/</URL>
      <Description>SUSE CVE CVE-2025-6197 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Manager Client Tools 15">
      <Branch Type="Product Name" Name="SUSE Manager Client Tools 15">
        <FullProductName ProductID="SUSE Manager Client Tools 15">SUSE Manager Client Tools 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Client Tools for SLE Micro 5">
      <Branch Type="Product Name" Name="SUSE Manager Client Tools for SLE Micro 5">
        <FullProductName ProductID="SUSE Manager Client Tools for SLE Micro 5" CPE="cpe:/o:suse:sle-manager-tools-micro:5">SUSE Manager Client Tools for SLE Micro 5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="dracut-saltboot-1.0.0-150000.1.62.1">
      <FullProductName ProductID="dracut-saltboot-1.0.0-150000.1.62.1">dracut-saltboot-1.0.0-150000.1.62.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="golang-github-prometheus-alertmanager-0.28.1-150000.9.1">
      <FullProductName ProductID="golang-github-prometheus-alertmanager-0.28.1-150000.9.1">golang-github-prometheus-alertmanager-0.28.1-150000.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="grafana-11.5.10-150000.1.87.1">
      <FullProductName ProductID="grafana-11.5.10-150000.1.87.1">grafana-11.5.10-150000.1.87.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mgr-push-5.0.3-150000.1.30.1">
      <FullProductName ProductID="mgr-push-5.0.3-150000.1.30.1">mgr-push-5.0.3-150000.1.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mgrctl-0.1.37-150000.1.27.1">
      <FullProductName ProductID="mgrctl-0.1.37-150000.1.27.1">mgrctl-0.1.37-150000.1.27.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mgrctl-bash-completion-0.1.37-150000.1.27.1">
      <FullProductName ProductID="mgrctl-bash-completion-0.1.37-150000.1.27.1">mgrctl-bash-completion-0.1.37-150000.1.27.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mgrctl-lang-0.1.37-150000.1.27.1">
      <FullProductName ProductID="mgrctl-lang-0.1.37-150000.1.27.1">mgrctl-lang-0.1.37-150000.1.27.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mgrctl-zsh-completion-0.1.37-150000.1.27.1">
      <FullProductName ProductID="mgrctl-zsh-completion-0.1.37-150000.1.27.1">mgrctl-zsh-completion-0.1.37-150000.1.27.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-mgr-push-5.0.3-150000.1.30.1">
      <FullProductName ProductID="python3-mgr-push-5.0.3-150000.1.30.1">python3-mgr-push-5.0.3-150000.1.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-rhnlib-5.0.6-150000.3.49.1">
      <FullProductName ProductID="python3-rhnlib-5.0.6-150000.3.49.1">python3-rhnlib-5.0.6-150000.3.49.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="spacecmd-5.0.14-150000.3.139.1">
      <FullProductName ProductID="spacecmd-5.0.14-150000.3.139.1">spacecmd-5.0.14-150000.3.139.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1">
      <FullProductName ProductID="supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1">supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1</FullProductName>
    </Branch>
    <Relationship ProductReference="dracut-saltboot-1.0.0-150000.1.62.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:dracut-saltboot-1.0.0-150000.1.62.1">dracut-saltboot-1.0.0-150000.1.62.1 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="grafana-11.5.10-150000.1.87.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1">grafana-11.5.10-150000.1.87.1 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgr-push-5.0.3-150000.1.30.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:mgr-push-5.0.3-150000.1.30.1">mgr-push-5.0.3-150000.1.30.1 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgrctl-0.1.37-150000.1.27.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1">mgrctl-0.1.37-150000.1.27.1 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgrctl-bash-completion-0.1.37-150000.1.27.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:mgrctl-bash-completion-0.1.37-150000.1.27.1">mgrctl-bash-completion-0.1.37-150000.1.27.1 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgrctl-lang-0.1.37-150000.1.27.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:mgrctl-lang-0.1.37-150000.1.27.1">mgrctl-lang-0.1.37-150000.1.27.1 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgrctl-zsh-completion-0.1.37-150000.1.27.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:mgrctl-zsh-completion-0.1.37-150000.1.27.1">mgrctl-zsh-completion-0.1.37-150000.1.27.1 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-mgr-push-5.0.3-150000.1.30.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:python3-mgr-push-5.0.3-150000.1.30.1">python3-mgr-push-5.0.3-150000.1.30.1 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-rhnlib-5.0.6-150000.3.49.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:python3-rhnlib-5.0.6-150000.3.49.1">python3-rhnlib-5.0.6-150000.3.49.1 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="spacecmd-5.0.14-150000.3.139.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:spacecmd-5.0.14-150000.3.139.1">spacecmd-5.0.14-150000.3.139.1 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1">supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="dracut-saltboot-1.0.0-150000.1.62.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools for SLE Micro 5">
      <FullProductName ProductID="SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-1.0.0-150000.1.62.1">dracut-saltboot-1.0.0-150000.1.62.1 as a component of SUSE Manager Client Tools for SLE Micro 5</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgrctl-0.1.37-150000.1.27.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools for SLE Micro 5">
      <FullProductName ProductID="SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1">mgrctl-0.1.37-150000.1.27.1 as a component of SUSE Manager Client Tools for SLE Micro 5</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgrctl-bash-completion-0.1.37-150000.1.27.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools for SLE Micro 5">
      <FullProductName ProductID="SUSE Manager Client Tools for SLE Micro 5:mgrctl-bash-completion-0.1.37-150000.1.27.1">mgrctl-bash-completion-0.1.37-150000.1.27.1 as a component of SUSE Manager Client Tools for SLE Micro 5</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgrctl-lang-0.1.37-150000.1.27.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools for SLE Micro 5">
      <FullProductName ProductID="SUSE Manager Client Tools for SLE Micro 5:mgrctl-lang-0.1.37-150000.1.27.1">mgrctl-lang-0.1.37-150000.1.27.1 as a component of SUSE Manager Client Tools for SLE Micro 5</FullProductName>
    </Relationship>
    <Relationship ProductReference="mgrctl-zsh-completion-0.1.37-150000.1.27.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools for SLE Micro 5">
      <FullProductName ProductID="SUSE Manager Client Tools for SLE Micro 5:mgrctl-zsh-completion-0.1.37-150000.1.27.1">mgrctl-zsh-completion-0.1.37-150000.1.27.1 as a component of SUSE Manager Client Tools for SLE Micro 5</FullProductName>
    </Relationship>
    <Relationship ProductReference="dracut-saltboot-1.0.0-150000.1.62.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:dracut-saltboot-1.0.0-150000.1.62.1">dracut-saltboot-1.0.0-150000.1.62.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="spacecmd-5.0.14-150000.3.139.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:spacecmd-5.0.14-150000.3.139.1">spacecmd-5.0.14-150000.3.139.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1">supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">unknown</Note>
    </Notes>
    <CVE>CVE-2025-11065</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Manager Client Tools 15:dracut-saltboot-1.0.0-150000.1.62.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgr-push-5.0.3-150000.1.30.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgrctl-bash-completion-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgrctl-lang-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgrctl-zsh-completion-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-mgr-push-5.0.3-150000.1.30.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-rhnlib-5.0.6-150000.3.49.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacecmd-5.0.14-150000.3.139.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-1.0.0-150000.1.62.1</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:mgrctl-bash-completion-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:mgrctl-lang-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:mgrctl-zsh-completion-0.1.37-150000.1.27.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dracut-saltboot-1.0.0-150000.1.62.1</ProductID>
        <ProductID>openSUSE Leap 15.6:spacecmd-5.0.14-150000.3.139.1</ProductID>
        <ProductID>openSUSE Leap 15.6:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254458-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-11065.html</URL>
        <Description>CVE-2025-11065</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1250608</URL>
        <Description>SUSE Bug 1250608</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Grafana is an open-source platform for monitoring and observability. The Grafana Alerting DingDing integration was not properly protected and could be exposed to users with Viewer permission. 
Fixed in versions 10.4.19+security-01, 11.2.10+security-01, 11.3.7+security-01, 11.4.5+security-01, 11.5.5+security-01, 11.6.2+security-01 and 12.0.1+security-01</Note>
    </Notes>
    <CVE>CVE-2025-3415</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Manager Client Tools 15:dracut-saltboot-1.0.0-150000.1.62.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgr-push-5.0.3-150000.1.30.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgrctl-bash-completion-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgrctl-lang-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgrctl-zsh-completion-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-mgr-push-5.0.3-150000.1.30.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-rhnlib-5.0.6-150000.3.49.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacecmd-5.0.14-150000.3.139.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-1.0.0-150000.1.62.1</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:mgrctl-bash-completion-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:mgrctl-lang-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:mgrctl-zsh-completion-0.1.37-150000.1.27.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dracut-saltboot-1.0.0-150000.1.62.1</ProductID>
        <ProductID>openSUSE Leap 15.6:spacecmd-5.0.14-150000.3.139.1</ProductID>
        <ProductID>openSUSE Leap 15.6:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254458-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-3415.html</URL>
        <Description>CVE-2025-3415</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245302</URL>
        <Description>SUSE Bug 1245302</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.

The open redirect can be chained with path traversal vulnerabilities to achieve XSS.

Fixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01</Note>
    </Notes>
    <CVE>CVE-2025-6023</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Manager Client Tools 15:dracut-saltboot-1.0.0-150000.1.62.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgr-push-5.0.3-150000.1.30.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgrctl-bash-completion-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgrctl-lang-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgrctl-zsh-completion-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-mgr-push-5.0.3-150000.1.30.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-rhnlib-5.0.6-150000.3.49.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacecmd-5.0.14-150000.3.139.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-1.0.0-150000.1.62.1</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:mgrctl-bash-completion-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:mgrctl-lang-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:mgrctl-zsh-completion-0.1.37-150000.1.27.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dracut-saltboot-1.0.0-150000.1.62.1</ProductID>
        <ProductID>openSUSE Leap 15.6:spacecmd-5.0.14-150000.3.139.1</ProductID>
        <ProductID>openSUSE Leap 15.6:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254458-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-6023.html</URL>
        <Description>CVE-2025-6023</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246735</URL>
        <Description>SUSE Bug 1246735</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.


Prerequisites for exploitation:

- Multiple organizations must exist in the Grafana instance

- Victim must be on a different organization than the one specified in the URL</Note>
    </Notes>
    <CVE>CVE-2025-6197</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Manager Client Tools 15:dracut-saltboot-1.0.0-150000.1.62.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:grafana-11.5.10-150000.1.87.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgr-push-5.0.3-150000.1.30.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgrctl-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgrctl-bash-completion-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgrctl-lang-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:mgrctl-zsh-completion-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-mgr-push-5.0.3-150000.1.30.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:python3-rhnlib-5.0.6-150000.3.49.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:spacecmd-5.0.14-150000.3.139.1</ProductID>
        <ProductID>SUSE Manager Client Tools 15:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-1.0.0-150000.1.62.1</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:mgrctl-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:mgrctl-bash-completion-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:mgrctl-lang-0.1.37-150000.1.27.1</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:mgrctl-zsh-completion-0.1.37-150000.1.27.1</ProductID>
        <ProductID>openSUSE Leap 15.6:dracut-saltboot-1.0.0-150000.1.62.1</ProductID>
        <ProductID>openSUSE Leap 15.6:spacecmd-5.0.14-150000.3.139.1</ProductID>
        <ProductID>openSUSE Leap 15.6:supportutils-plugin-susemanager-client-5.0.5-150000.3.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254458-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-6197.html</URL>
        <Description>CVE-2025-6197</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246736</URL>
        <Description>SUSE Bug 1246736</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
