<div class="container">
    <h1>Security update for Multi-Linux Manager Client Tools</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2025:01989-1</td>
        </tr>
        <tr>
            <th>Release Date:</th>
            <td>2025-06-18T02:11:30Z</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>moderate</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208752">bsc#1208752</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231844">bsc#1231844</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233343">bsc#1233343</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236510">bsc#1236510</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236515">bsc#1236515</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236516">bsc#1236516</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238680">bsc#1238680</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238686">bsc#1238686</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238703">bsc#1238703</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1241683">bsc#1241683</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1241687">bsc#1241687</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1241809">bsc#1241809</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1243672">bsc#1243672</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1243714">bsc#1243714</a>
                        </li>
                    
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/MSQA-992">jsc#MSQA-992</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-11740">jsc#PED-11740</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-12872">jsc#PED-12872</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-12918">jsc#PED-12918</a>
                        </li>
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-45288.html">CVE-2023-45288</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-9264.html">CVE-2024-9264</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-9476.html">CVE-2024-9476</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2025-22870.html">CVE-2025-22870</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2025-22872.html">CVE-2025-22872</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2025-2703.html">CVE-2025-2703</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2025-29923.html">CVE-2025-29923</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2025-3454.html">CVE-2025-3454</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-45288</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.9</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-45288</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-9264</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">9.4</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-9264</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">9.9</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-9264</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">9.4</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-9264</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">9.9</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-9264</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">8.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-9476</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-9476</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.1</span>
                                <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-9476</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">0.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-22870</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.8</span>
                                <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-22870</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-22870</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-22872</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.3</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-22872</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-22872</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-2703</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-2703</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-29923</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-29923</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-3454</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-3454</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">openSUSE Leap 15.3</li>
                    
                        <li class="list-group-item">openSUSE Leap 15.4</li>
                    
                        <li class="list-group-item">openSUSE Leap 15.5</li>
                    
                        <li class="list-group-item">openSUSE Leap 15.6</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP6</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP7</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.0</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP6</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP7</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP6</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP7</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP2</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP6</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP7</li>
                    
                        <li class="list-group-item">SUSE Manager Client Tools for SLE 15</li>
                    
                        <li class="list-group-item">SUSE Manager Client Tools for SLE Micro 5</li>
                    
                        <li class="list-group-item">SUSE Manager Proxy 4.3</li>
                    
                        <li class="list-group-item">SUSE Manager Proxy 4.3 Module</li>
                    
                        <li class="list-group-item">SUSE Manager Retail Branch Server 4.3</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves eight vulnerabilities, contains four features and has six security fixes can now be installed.</p>

    


    
        <h2>Description:</h2>
    
    <p>This update fixes the following issues:</p>
<p>golang-github-prometheus-prometheus was updated to version 2.53.4:</p>
<ul>
<li>Security issues fixed:</li>
<li>CVE-2023-45288: Require Go >= 1.23 for building (bsc#1236516)</li>
<li>
<p>CVE-2025-22870: Bumped golang.org/x/net to version 0.39.0 (bsc#1238686)</p>
</li>
<li>
<p>Other bugs fixes from version 2.53.4:   </p>
</li>
<li>Runtime: fixed GOGC being set to 0 when installed
    with empty prometheus.yml file resulting high cpu usage</li>
<li>Scrape: fixed dropping valid metrics after previous
    scrape failed</li>
</ul>
<p>prometheus-blackbox_exporter was updated from version 0.24.0 to 0.26.0 (jsc#PED-12872):   </p>
<ul>
<li>Security issues fixed:</li>
<li>CVE-2025-22870: Fixed proxy bypassing using IPv6 zone IDs (bsc#1238680)</li>
<li>
<p>CVE-2023-45288: Fixed closing connections when receiving too many headers (bsc#1236515)</p>
</li>
<li>
<p>Other changes from version 0.26.0:</p>
</li>
<li>Changes:<ul>
<li>Replace go-kit/log with log/slog module.</li>
</ul>
</li>
<li>Features:<ul>
<li>Add metric to record tls ciphersuite negotiated during
  handshake.</li>
<li>Add a way to export labels with content matched by the probe.
  Reports Certificate Serial number.</li>
</ul>
</li>
<li>Enhancement:<ul>
<li>Add stale workflow to start sync with stale.yaml in Prometheus.</li>
</ul>
</li>
<li>
<p>Bug fixes:</p>
<ul>
<li>Only register grpc TLS metrics on successful handshake.</li>
</ul>
</li>
<li>
<p>Other changes from version 0.25.0:</p>
</li>
<li>Features:<ul>
<li>Allow to get Probe logs by target.</li>
<li>Log errors from probe.</li>
</ul>
</li>
<li>Bug fixes:<ul>
<li>Prevent logging confusing error message.</li>
<li>Explicit registration of internal exporter metrics.</li>
</ul>
</li>
</ul>
<p>grafana was updated from version 10.4.15 to 11.5.5 (jsc#PED-12918):</p>
<ul>
<li>Security issues fixed:</li>
<li>CVE-2025-4123: Fix cross-site scripting vulnerability (bsc#1243714).</li>
<li>CVE-2025-22872: Bump golang.org/x/net/html (bsc#1241809)</li>
<li>CVE-2025-3580: Prevent unauthorized server admin deletion (bsc#1243672).</li>
<li>CVE-2025-29923: Bump github.com/redis/go-redis/v9 to 9.6.3.</li>
<li>CVE-2025-3454: Sanitize paths before evaluating access to route (bsc#1241683).</li>
<li>CVE-2025-2703: Fix built-in XY Chart plugin (bsc#1241687).</li>
<li>CVE-2025-22870: Bump golang.org/x/net (bsc#1238703).</li>
<li>CVE-2024-9476: Fix Migration Assistant issue (bsc#1233343)</li>
<li>CVE-2024-9264: SQL Expressions (bsc#1231844)</li>
<li>CVE-2023-45288: Bump golang.org/x/net (bsc#1236510)</li>
<li>
<p>CVE-2025-22870: Bump golang.org/x/net to version 0.37.0 (bsc#1238686)</p>
</li>
<li>
<p>Potential breaking changes in version 11.5.0:</p>
</li>
<li>
<p>Loki: Default to /labels API with query param instead of /series API.</p>
</li>
<li>
<p>Potential breaking changes in version 11.0.1:</p>
</li>
<li>
<p>If you had selected your language as "Português Brasileiro"
    previously, this will be reset. You have to select it again in
    your Preferences for the fix to be applied and the translations
    will then be shown.</p>
</li>
<li>
<p>Potential breaking changes in version 11.0.0:</p>
</li>
<li>AngularJS support is turned off by default.</li>
<li>Legacy alerting is entirely removed.</li>
<li>Subfolders cause very rare issues with folders which have
    slashes in their names.</li>
<li>The input data source is removed.</li>
<li>Data sources: Responses which are associated with hidden
    queries will be removed (filtered) by Grafana.</li>
<li>The URL which is generated when viewing an individual repeated
    panel has changed.</li>
<li>React Router is deprecated.</li>
<li>
<p>The grafana/e2e testing tool is deprecated.</p>
</li>
<li>
<p>This update brings many new features, enhancements and fixes highlighted at:</p>
</li>
<li>https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-5/</li>
<li>https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-4/</li>
<li>https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-3/</li>
<li>https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-2/</li>
<li>https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-1/</li>
<li>https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-0/</li>
</ul>



    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                SUSE Manager Client Tools for SLE Micro 5
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2025-1989=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Manager Proxy 4.3 Module
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2025-1989=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                openSUSE Leap 15.6
                
                    
                        <br/>
                        <code>zypper in -t patch openSUSE-SLE-15.6-2025-1989=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Manager Client Tools for SLE 15
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Manager-Tools-15-2025-1989=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    SUSE Manager Client Tools for SLE Micro 5 (aarch64 s390x x86_64)
                    <ul>
                        
                            <li>prometheus-blackbox_exporter-0.26.0-150000.1.27.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Manager Proxy 4.3 Module (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>prometheus-blackbox_exporter-0.26.0-150000.1.27.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>prometheus-blackbox_exporter-0.26.0-150000.1.27.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>grafana-11.5.5-150000.1.79.1</li>
                        
                            <li>firewalld-prometheus-config-0.1-150000.3.62.2</li>
                        
                            <li>golang-github-prometheus-prometheus-2.53.4-150000.3.62.2</li>
                        
                            <li>prometheus-blackbox_exporter-0.26.0-150000.1.27.1</li>
                        
                            <li>grafana-debuginfo-11.5.5-150000.1.79.1</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-45288.html">https://www.suse.com/security/cve/CVE-2023-45288.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-9264.html">https://www.suse.com/security/cve/CVE-2024-9264.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-9476.html">https://www.suse.com/security/cve/CVE-2024-9476.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2025-22870.html">https://www.suse.com/security/cve/CVE-2025-22870.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2025-22872.html">https://www.suse.com/security/cve/CVE-2025-22872.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2025-2703.html">https://www.suse.com/security/cve/CVE-2025-2703.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2025-29923.html">https://www.suse.com/security/cve/CVE-2025-29923.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2025-3454.html">https://www.suse.com/security/cve/CVE-2025-3454.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208752">https://bugzilla.suse.com/show_bug.cgi?id=1208752</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231844">https://bugzilla.suse.com/show_bug.cgi?id=1231844</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233343">https://bugzilla.suse.com/show_bug.cgi?id=1233343</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236510">https://bugzilla.suse.com/show_bug.cgi?id=1236510</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236515">https://bugzilla.suse.com/show_bug.cgi?id=1236515</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236516">https://bugzilla.suse.com/show_bug.cgi?id=1236516</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238680">https://bugzilla.suse.com/show_bug.cgi?id=1238680</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238686">https://bugzilla.suse.com/show_bug.cgi?id=1238686</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238703">https://bugzilla.suse.com/show_bug.cgi?id=1238703</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1241683">https://bugzilla.suse.com/show_bug.cgi?id=1241683</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1241687">https://bugzilla.suse.com/show_bug.cgi?id=1241687</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1241809">https://bugzilla.suse.com/show_bug.cgi?id=1241809</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1243672">https://bugzilla.suse.com/show_bug.cgi?id=1243672</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1243714">https://bugzilla.suse.com/show_bug.cgi?id=1243714</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/MSQA-992">https://jira.suse.com/browse/MSQA-992</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-11740">https://jira.suse.com/browse/PED-11740</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-12872">https://jira.suse.com/browse/PED-12872</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-12918">https://jira.suse.com/browse/PED-12918</a>
                    </li>
                
            
        </ul>
    
</div>