openSUSE-SU-2025:0422-1: important: Security update for chromium
openSUSE-SU-2025:0423-1: important: Security update for chromium
openSUSE-SU-2025:15718-1: moderate: tomcat11-11.0.13-1.1 on GA media
openSUSE-SU-2025:15716-1: moderate: tomcat-9.0.111-1.1 on GA media
openSUSE-SU-2025:15711-1: moderate: opentofu-1.10.7-1.1 on GA media
openSUSE-SU-2025:15715-1: moderate: squid-7.3-1.1 on GA media
openSUSE-SU-2025:15713-1: moderate: python315-3.15.0~a1-1.1 on GA media
openSUSE-SU-2025:15712-1: moderate: python311-Django-5.2.8-1.1 on GA media
openSUSE-SU-2025:15710-1: moderate: govulncheck-vulndb-0.0.20251105T184115-1.1 on GA media
openSUSE-SU-2025:15709-1: moderate: google-osconfig-agent-20251028.00-1.1 on GA media
openSUSE-SU-2025:0422-1: important: Security update for chromium
openSUSE Security Update: Security update for chromium
_______________________________
Announcement ID: openSUSE-SU-2025:0422-1
Rating: important
References: #1253089
Cross-References: CVE-2025-12725 CVE-2025-12726 CVE-2025-12727
CVE-2025-12728 CVE-2025-12729
Affected Products:
openSUSE Backports SLE-15-SP6
_______________________________
An update that fixes 5 vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
- Chromium 142.0.7444.134 (boo#1253089):
* CVE-2025-12725: Out of bounds write in WebGPU
* CVE-2025-12726: Inappropriate implementation in Views
* CVE-2025-12727: Inappropriate implementation in V8
* CVE-2025-12728: Inappropriate implementation in Omnibox
* CVE-2025-12729: Inappropriate implementation in Omnibox
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2025-422=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 ppc64le x86_64):
chromedriver-142.0.7444.134-bp156.2.197.1
chromium-142.0.7444.134-bp156.2.197.1
References:
https://www.suse.com/security/cve/CVE-2025-12725.html
https://www.suse.com/security/cve/CVE-2025-12726.html
https://www.suse.com/security/cve/CVE-2025-12727.html
https://www.suse.com/security/cve/CVE-2025-12728.html
https://www.suse.com/security/cve/CVE-2025-12729.html
https://bugzilla.suse.com/1253089
openSUSE-SU-2025:0423-1: important: Security update for chromium
openSUSE Security Update: Security update for chromium
_______________________________
Announcement ID: openSUSE-SU-2025:0423-1
Rating: important
References: #1253089
Cross-References: CVE-2025-12725 CVE-2025-12726 CVE-2025-12727
CVE-2025-12728 CVE-2025-12729
Affected Products:
openSUSE Backports SLE-15-SP7
_______________________________
An update that fixes 5 vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
- Chromium 142.0.7444.134 (boo#1253089):
* CVE-2025-12725: Out of bounds write in WebGPU
* CVE-2025-12726: Inappropriate implementation in Views
* CVE-2025-12727: Inappropriate implementation in V8
* CVE-2025-12728: Inappropriate implementation in Omnibox
* CVE-2025-12729: Inappropriate implementation in Omnibox
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP7:
zypper in -t patch openSUSE-2025-423=1
Package List:
- openSUSE Backports SLE-15-SP7 (aarch64 ppc64le x86_64):
chromedriver-142.0.7444.134-bp157.2.79.1
chromium-142.0.7444.134-bp157.2.79.1
References:
https://www.suse.com/security/cve/CVE-2025-12725.html
https://www.suse.com/security/cve/CVE-2025-12726.html
https://www.suse.com/security/cve/CVE-2025-12727.html
https://www.suse.com/security/cve/CVE-2025-12728.html
https://www.suse.com/security/cve/CVE-2025-12729.html
https://bugzilla.suse.com/1253089
openSUSE-SU-2025:15718-1: moderate: tomcat11-11.0.13-1.1 on GA media
# tomcat11-11.0.13-1.1 on GA media
Announcement ID: openSUSE-SU-2025:15718-1
Rating: moderate
Cross-References:
* CVE-2025-55752
* CVE-2025-55754
* CVE-2025-61795
CVSS scores:
* CVE-2025-55752 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-55752 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-55754 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-55754 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-61795 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61795 ( SUSE ): 6 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 3 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the tomcat11-11.0.13-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* tomcat11 11.0.13-1.1
* tomcat11-admin-webapps 11.0.13-1.1
* tomcat11-doc 11.0.13-1.1
* tomcat11-docs-webapp 11.0.13-1.1
* tomcat11-el-6_0-api 11.0.13-1.1
* tomcat11-embed 11.0.13-1.1
* tomcat11-jsp-4_0-api 11.0.13-1.1
* tomcat11-jsvc 11.0.13-1.1
* tomcat11-lib 11.0.13-1.1
* tomcat11-servlet-6_1-api 11.0.13-1.1
* tomcat11-webapps 11.0.13-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-55752.html
* https://www.suse.com/security/cve/CVE-2025-55754.html
* https://www.suse.com/security/cve/CVE-2025-61795.html
openSUSE-SU-2025:15716-1: moderate: tomcat-9.0.111-1.1 on GA media
# tomcat-9.0.111-1.1 on GA media
Announcement ID: openSUSE-SU-2025:15716-1
Rating: moderate
Cross-References:
* CVE-2025-55752
* CVE-2025-55754
* CVE-2025-61795
CVSS scores:
* CVE-2025-55752 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-55752 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-55754 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-55754 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-61795 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61795 ( SUSE ): 6 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 3 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the tomcat-9.0.111-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* tomcat 9.0.111-1.1
* tomcat-admin-webapps 9.0.111-1.1
* tomcat-docs-webapp 9.0.111-1.1
* tomcat-el-3_0-api 9.0.111-1.1
* tomcat-embed 9.0.111-1.1
* tomcat-javadoc 9.0.111-1.1
* tomcat-jsp-2_3-api 9.0.111-1.1
* tomcat-jsvc 9.0.111-1.1
* tomcat-lib 9.0.111-1.1
* tomcat-servlet-4_0-api 9.0.111-1.1
* tomcat-webapps 9.0.111-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-55752.html
* https://www.suse.com/security/cve/CVE-2025-55754.html
* https://www.suse.com/security/cve/CVE-2025-61795.html
openSUSE-SU-2025:15711-1: moderate: opentofu-1.10.7-1.1 on GA media
# opentofu-1.10.7-1.1 on GA media
Announcement ID: openSUSE-SU-2025:15711-1
Rating: moderate
Cross-References:
* CVE-2025-58183
* CVE-2025-58185
* CVE-2025-58187
CVSS scores:
* CVE-2025-58183 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-58183 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58185 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58185 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58187 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58187 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 3 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the opentofu-1.10.7-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* opentofu 1.10.7-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-58183.html
* https://www.suse.com/security/cve/CVE-2025-58185.html
* https://www.suse.com/security/cve/CVE-2025-58187.html
openSUSE-SU-2025:15715-1: moderate: squid-7.3-1.1 on GA media
# squid-7.3-1.1 on GA media
Announcement ID: openSUSE-SU-2025:15715-1
Rating: moderate
Cross-References:
* CVE-2025-62168
CVSS scores:
* CVE-2025-62168 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
* CVE-2025-62168 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the squid-7.3-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* squid 7.3-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-62168.html
openSUSE-SU-2025:15713-1: moderate: python315-3.15.0~a1-1.1 on GA media
# python315-3.15.0~a1-1.1 on GA media
Announcement ID: openSUSE-SU-2025:15713-1
Rating: moderate
Cross-References:
* CVE-2011-3389
* CVE-2011-4944
* CVE-2012-0845
* CVE-2012-1150
* CVE-2013-1752
* CVE-2013-4238
* CVE-2014-2667
* CVE-2014-4650
* CVE-2019-20907
* CVE-2019-5010
* CVE-2019-9947
* CVE-2020-10735
* CVE-2020-15523
* CVE-2020-15801
* CVE-2020-8492
* CVE-2021-23336
* CVE-2021-3177
* CVE-2021-3426
* CVE-2022-25236
* CVE-2022-42919
* CVE-2022-45061
* CVE-2023-0286
* CVE-2023-24329
* CVE-2023-2650
* CVE-2023-27043
* CVE-2023-40217
* CVE-2023-52425
* CVE-2024-4030
* CVE-2024-4032
* CVE-2024-6232
* CVE-2024-6923
* CVE-2024-7592
* CVE-2024-8088
* CVE-2025-0938
* CVE-2025-4435
* CVE-2025-4516
* CVE-2025-6069
* CVE-2025-8194
* CVE-2025-8291
CVSS scores:
* CVE-2011-3389 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2011-4944 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2012-0845 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2012-1150 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2013-1752 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2013-4238 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2014-2667 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2014-4650 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2019-20907 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2019-5010 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2019-9947 ( SUSE ): 5.4 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
* CVE-2020-10735 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2020-8492 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2021-23336 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H
* CVE-2021-3177 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-3426 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-25236 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-42919 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-45061 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-0286 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-24329 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
* CVE-2023-2650 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-27043 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2023-40217 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2023-52425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-4030 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-4032 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-6232 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-6232 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-6923 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-7592 ( SUSE ): 2.6 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-8088 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-8088 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-0938 ( SUSE ): 4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
* CVE-2025-0938 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N
* CVE-2025-4435 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
* CVE-2025-4516 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-4516 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-6069 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
* CVE-2025-6069 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H
* CVE-2025-8194 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-8194 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-8291 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2025-8291 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 39 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the python315-3.15.0~a1-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* python315 3.15.0~a1-1.1
* python315-curses 3.15.0~a1-1.1
* python315-dbm 3.15.0~a1-1.1
* python315-idle 3.15.0~a1-1.1
* python315-profiling 3.15.0~a1-1.1
* python315-tk 3.15.0~a1-1.1
* python315-x86-64-v3 3.15.0~a1-1.1
## References:
* https://www.suse.com/security/cve/CVE-2011-3389.html
* https://www.suse.com/security/cve/CVE-2011-4944.html
* https://www.suse.com/security/cve/CVE-2012-0845.html
* https://www.suse.com/security/cve/CVE-2012-1150.html
* https://www.suse.com/security/cve/CVE-2013-1752.html
* https://www.suse.com/security/cve/CVE-2013-4238.html
* https://www.suse.com/security/cve/CVE-2014-2667.html
* https://www.suse.com/security/cve/CVE-2014-4650.html
* https://www.suse.com/security/cve/CVE-2019-20907.html
* https://www.suse.com/security/cve/CVE-2019-5010.html
* https://www.suse.com/security/cve/CVE-2019-9947.html
* https://www.suse.com/security/cve/CVE-2020-10735.html
* https://www.suse.com/security/cve/CVE-2020-15523.html
* https://www.suse.com/security/cve/CVE-2020-15801.html
* https://www.suse.com/security/cve/CVE-2020-8492.html
* https://www.suse.com/security/cve/CVE-2021-23336.html
* https://www.suse.com/security/cve/CVE-2021-3177.html
* https://www.suse.com/security/cve/CVE-2021-3426.html
* https://www.suse.com/security/cve/CVE-2022-25236.html
* https://www.suse.com/security/cve/CVE-2022-42919.html
* https://www.suse.com/security/cve/CVE-2022-45061.html
* https://www.suse.com/security/cve/CVE-2023-0286.html
* https://www.suse.com/security/cve/CVE-2023-24329.html
* https://www.suse.com/security/cve/CVE-2023-2650.html
* https://www.suse.com/security/cve/CVE-2023-27043.html
* https://www.suse.com/security/cve/CVE-2023-40217.html
* https://www.suse.com/security/cve/CVE-2023-52425.html
* https://www.suse.com/security/cve/CVE-2024-4030.html
* https://www.suse.com/security/cve/CVE-2024-4032.html
* https://www.suse.com/security/cve/CVE-2024-6232.html
* https://www.suse.com/security/cve/CVE-2024-6923.html
* https://www.suse.com/security/cve/CVE-2024-7592.html
* https://www.suse.com/security/cve/CVE-2024-8088.html
* https://www.suse.com/security/cve/CVE-2025-0938.html
* https://www.suse.com/security/cve/CVE-2025-4435.html
* https://www.suse.com/security/cve/CVE-2025-4516.html
* https://www.suse.com/security/cve/CVE-2025-6069.html
* https://www.suse.com/security/cve/CVE-2025-8194.html
* https://www.suse.com/security/cve/CVE-2025-8291.html
openSUSE-SU-2025:15712-1: moderate: python311-Django-5.2.8-1.1 on GA media
# python311-Django-5.2.8-1.1 on GA media
Announcement ID: openSUSE-SU-2025:15712-1
Rating: moderate
Cross-References:
* CVE-2025-64459
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the python311-Django-5.2.8-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* python311-Django 5.2.8-1.1
* python312-Django 5.2.8-1.1
* python313-Django 5.2.8-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-64459.html
openSUSE-SU-2025:15710-1: moderate: govulncheck-vulndb-0.0.20251105T184115-1.1 on GA media
# govulncheck-vulndb-0.0.20251105T184115-1.1 on GA media
Announcement ID: openSUSE-SU-2025:15710-1
Rating: moderate
Cross-References:
* CVE-2016-11063
* CVE-2016-11066
* CVE-2016-11067
* CVE-2016-11068
* CVE-2016-11069
* CVE-2016-11070
* CVE-2016-11071
* CVE-2016-11072
* CVE-2016-11073
* CVE-2016-11074
* CVE-2016-11075
* CVE-2016-11076
* CVE-2016-11077
* CVE-2016-11078
* CVE-2016-11079
* CVE-2016-11080
* CVE-2016-11081
* CVE-2016-11082
* CVE-2016-11083
* CVE-2016-11084
* CVE-2017-18872
* CVE-2023-32199
* CVE-2024-58269
* CVE-2025-10545
* CVE-2025-10678
* CVE-2025-10954
* CVE-2025-11374
* CVE-2025-11375
* CVE-2025-11579
* CVE-2025-11621
* CVE-2025-12044
* CVE-2025-26625
* CVE-2025-27093
* CVE-2025-41410
* CVE-2025-41443
* CVE-2025-54286
* CVE-2025-54287
* CVE-2025-54288
* CVE-2025-54289
* CVE-2025-54290
* CVE-2025-54291
* CVE-2025-54293
* CVE-2025-54469
* CVE-2025-54470
* CVE-2025-54471
* CVE-2025-54499
* CVE-2025-58073
* CVE-2025-58075
* CVE-2025-58356
* CVE-2025-59043
* CVE-2025-59048
* CVE-2025-59530
* CVE-2025-59836
* CVE-2025-59937
* CVE-2025-61141
* CVE-2025-61524
* CVE-2025-61581
* CVE-2025-61688
* CVE-2025-62156
* CVE-2025-62157
* CVE-2025-62375
* CVE-2025-62506
* CVE-2025-62513
* CVE-2025-62705
* CVE-2025-62714
* CVE-2025-62725
* CVE-2025-62820
* CVE-2025-64101
* CVE-2025-64102
* CVE-2025-64103
CVSS scores:
* CVE-2025-11579 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-11579 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-26625 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-26625 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-54469 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2025-54470 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-54471 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-62725 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2025-62725 ( SUSE ): 8.9 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected Products:
* openSUSE Tumbleweed
An update that solves 70 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the govulncheck-vulndb-0.0.20251105T184115-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* govulncheck-vulndb 0.0.20251105T184115-1.1
## References:
* https://www.suse.com/security/cve/CVE-2016-11063.html
* https://www.suse.com/security/cve/CVE-2016-11066.html
* https://www.suse.com/security/cve/CVE-2016-11067.html
* https://www.suse.com/security/cve/CVE-2016-11068.html
* https://www.suse.com/security/cve/CVE-2016-11069.html
* https://www.suse.com/security/cve/CVE-2016-11070.html
* https://www.suse.com/security/cve/CVE-2016-11071.html
* https://www.suse.com/security/cve/CVE-2016-11072.html
* https://www.suse.com/security/cve/CVE-2016-11073.html
* https://www.suse.com/security/cve/CVE-2016-11074.html
* https://www.suse.com/security/cve/CVE-2016-11075.html
* https://www.suse.com/security/cve/CVE-2016-11076.html
* https://www.suse.com/security/cve/CVE-2016-11077.html
* https://www.suse.com/security/cve/CVE-2016-11078.html
* https://www.suse.com/security/cve/CVE-2016-11079.html
* https://www.suse.com/security/cve/CVE-2016-11080.html
* https://www.suse.com/security/cve/CVE-2016-11081.html
* https://www.suse.com/security/cve/CVE-2016-11082.html
* https://www.suse.com/security/cve/CVE-2016-11083.html
* https://www.suse.com/security/cve/CVE-2016-11084.html
* https://www.suse.com/security/cve/CVE-2017-18872.html
* https://www.suse.com/security/cve/CVE-2023-32199.html
* https://www.suse.com/security/cve/CVE-2024-58269.html
* https://www.suse.com/security/cve/CVE-2025-10545.html
* https://www.suse.com/security/cve/CVE-2025-10678.html
* https://www.suse.com/security/cve/CVE-2025-10954.html
* https://www.suse.com/security/cve/CVE-2025-11374.html
* https://www.suse.com/security/cve/CVE-2025-11375.html
* https://www.suse.com/security/cve/CVE-2025-11579.html
* https://www.suse.com/security/cve/CVE-2025-11621.html
* https://www.suse.com/security/cve/CVE-2025-12044.html
* https://www.suse.com/security/cve/CVE-2025-26625.html
* https://www.suse.com/security/cve/CVE-2025-27093.html
* https://www.suse.com/security/cve/CVE-2025-41410.html
* https://www.suse.com/security/cve/CVE-2025-41443.html
* https://www.suse.com/security/cve/CVE-2025-54286.html
* https://www.suse.com/security/cve/CVE-2025-54287.html
* https://www.suse.com/security/cve/CVE-2025-54288.html
* https://www.suse.com/security/cve/CVE-2025-54289.html
* https://www.suse.com/security/cve/CVE-2025-54290.html
* https://www.suse.com/security/cve/CVE-2025-54291.html
* https://www.suse.com/security/cve/CVE-2025-54293.html
* https://www.suse.com/security/cve/CVE-2025-54469.html
* https://www.suse.com/security/cve/CVE-2025-54470.html
* https://www.suse.com/security/cve/CVE-2025-54471.html
* https://www.suse.com/security/cve/CVE-2025-54499.html
* https://www.suse.com/security/cve/CVE-2025-58073.html
* https://www.suse.com/security/cve/CVE-2025-58075.html
* https://www.suse.com/security/cve/CVE-2025-58356.html
* https://www.suse.com/security/cve/CVE-2025-59043.html
* https://www.suse.com/security/cve/CVE-2025-59048.html
* https://www.suse.com/security/cve/CVE-2025-59530.html
* https://www.suse.com/security/cve/CVE-2025-59836.html
* https://www.suse.com/security/cve/CVE-2025-59937.html
* https://www.suse.com/security/cve/CVE-2025-61141.html
* https://www.suse.com/security/cve/CVE-2025-61524.html
* https://www.suse.com/security/cve/CVE-2025-61581.html
* https://www.suse.com/security/cve/CVE-2025-61688.html
* https://www.suse.com/security/cve/CVE-2025-62156.html
* https://www.suse.com/security/cve/CVE-2025-62157.html
* https://www.suse.com/security/cve/CVE-2025-62375.html
* https://www.suse.com/security/cve/CVE-2025-62506.html
* https://www.suse.com/security/cve/CVE-2025-62513.html
* https://www.suse.com/security/cve/CVE-2025-62705.html
* https://www.suse.com/security/cve/CVE-2025-62714.html
* https://www.suse.com/security/cve/CVE-2025-62725.html
* https://www.suse.com/security/cve/CVE-2025-62820.html
* https://www.suse.com/security/cve/CVE-2025-64101.html
* https://www.suse.com/security/cve/CVE-2025-64102.html
* https://www.suse.com/security/cve/CVE-2025-64103.html
openSUSE-SU-2025:15709-1: moderate: google-osconfig-agent-20251028.00-1.1 on GA media
# google-osconfig-agent-20251028.00-1.1 on GA media
Announcement ID: openSUSE-SU-2025:15709-1
Rating: moderate
Cross-References:
* CVE-2025-47911
* CVE-2025-58190
CVSS scores:
* CVE-2025-47911 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-47911 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58190 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58190 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 2 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the google-osconfig-agent-20251028.00-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* google-osconfig-agent 20251028.00-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-47911.html
* https://www.suse.com/security/cve/CVE-2025-58190.html