File _patchinfo of Package patchinfo.41611
<patchinfo incident="41611">
<issue tracker="ijsc" id="MSQA-1034"/>
<issue tracker="jsc" id="PED-14178"/>
<issue tracker="cve" id="2025-11065"/>
<issue tracker="cve" id="2025-6023"/>
<issue tracker="cve" id="2025-6197"/>
<issue tracker="cve" id="2025-3415"/>
<issue tracker="cve" id="2025-64751"/>
<issue tracker="cve" id="2025-47911"/>
<issue tracker="cve" id="2025-58190"/>
<issue tracker="bnc" id="1251454">VUL-0: CVE-2025-47911: grafana: golang.org/x/net/html: various algorithms with quadratic complexity when parsing HTML documents</issue>
<issue tracker="bnc" id="1251657">VUL-0: CVE-2025-58190: grafana: golang.org/x/net/html: excessive memory consumption by `html.ParseFragment` when processing specially crafted input</issue>
<issue tracker="bnc" id="1254113">VUL-0: CVE-2025-64751: grafana: openfga: improper policy enforcement could allow unauthorized access to resources</issue>
<issue tracker="bnc" id="1246736">VUL-0: CVE-2025-6197: grafana: open redirect in organization switching functionality</issue>
<issue tracker="bnc" id="1250616">VUL-0: CVE-2025-11065: grafana: github.com/go-viper/mapstructure/v2: sensitive Information leak in logs</issue>
<issue tracker="bnc" id="1245302">VUL-0: CVE-2025-3415: grafana: exposure of DingDing alerting integration URL to Viewer level users</issue>
<issue tracker="bnc" id="1246735">VUL-0: CVE-2025-6023: grafana: open redirect can be chained with path traversal vulnerabilities to achieve XSS</issue>
<packager>raulosuna</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for grafana</summary>
<description>This update for grafana fixes the following issues:
grafana was updated from version 11.5.5 to 11.5.10:
- Security issues fixed:
* CVE-2025-64751: Dropped experimental implementation of authorization Zanzana server/client (version 11.5.10)
(bsc#1254113)
* CVE-2025-47911: Fixed parsing HTML documents (version 11.5.10) (bsc#1251454)
* CVE-2025-58190: Fixed excessive memory consumption (version 11.5.10) (bsc#1251657)
* CVE-2025-11065: Fixed sensitive information leak in logs (version 11.5.9) (bsc#1250616)
* CVE-2025-6023: Fixed cross-site-scripting via scripted dashboards (version 11.5.7) (bsc#1246735)
* CVE-2025-6197: Fixed open redirect in organization switching (version 11.5.7) (bsc#1246736)
* CVE-2025-3415: Fixed exposure of DingDing alerting integration URL to Viewer level users (version 11.5.6)
(bsc#1245302)
- Other changes, new features and bugs fixed:
* Version 11.5.10:
+ Use forked wire from Grafana repository instead of external package (jsc#PED-14178)
+ Auth: Fix render user OAuth passthrough.
+ LDAP Authentication: Fix URL to propagate username context as parameter.
+ Plugins: Dependencies do not inherit parent URL for preinstall.
* Version 11.5.9:
+ Auditing: Document new options for recording datasource query request/response body.
+ Login: Fixed redirection after login when Grafana is served from subpath.
* Version 11.5.7:
+ Azure: Fixed legend formatting and resource name determination in template variable queries.
</description>
</patchinfo>