SUSE 5522 Published by

There are two security updates available for openSUSE Tumbleweed. The first update, python312-Django6-6.0-1.1, fixes 70 vulnerabilities and can be installed now. The second update, fluidsynth-2.5.2-1.1, addresses one vulnerability. Both updates are rated as moderate severity and are available for installation on openSUSE Tumbleweed.

openSUSE-SU-2026:10005-1: moderate: python312-Django6-6.0-1.1 on GA media
openSUSE-SU-2026:10004-1: moderate: fluidsynth-2.5.2-1.1 on GA media




openSUSE-SU-2026:10005-1: moderate: python312-Django6-6.0-1.1 on GA media


# python312-Django6-6.0-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10005-1
Rating: moderate

Cross-References:

* CVE-2015-3982
* CVE-2015-5145
* CVE-2015-5963
* CVE-2016-7401
* CVE-2017-12794
* CVE-2017-7233
* CVE-2017-7234
* CVE-2018-16984
* CVE-2018-6188
* CVE-2018-7536
* CVE-2018-7537
* CVE-2019-11358
* CVE-2019-12308
* CVE-2019-12781
* CVE-2019-14232
* CVE-2019-19118
* CVE-2019-19844
* CVE-2019-3498
* CVE-2019-6975
* CVE-2020-13254
* CVE-2020-13596
* CVE-2020-24583
* CVE-2020-24584
* CVE-2020-7471
* CVE-2020-9402
* CVE-2021-31542
* CVE-2021-32052
* CVE-2021-33203
* CVE-2021-33571
* CVE-2021-35042
* CVE-2021-45115
* CVE-2021-45452
* CVE-2022-22818
* CVE-2022-23833
* CVE-2022-28346
* CVE-2022-28347
* CVE-2022-34265
* CVE-2022-36359
* CVE-2022-41323
* CVE-2023-23969
* CVE-2023-24580
* CVE-2023-31047
* CVE-2023-36053
* CVE-2023-41164
* CVE-2023-43665
* CVE-2024-24680
* CVE-2024-27351
* CVE-2024-38875
* CVE-2024-39329
* CVE-2024-39330
* CVE-2024-39614
* CVE-2024-41989
* CVE-2024-41990
* CVE-2024-41991
* CVE-2024-42005
* CVE-2024-45230
* CVE-2024-45231
* CVE-2024-53907
* CVE-2024-53908
* CVE-2024-56374
* CVE-2025-13372
* CVE-2025-26699
* CVE-2025-27556
* CVE-2025-32873
* CVE-2025-48432
* CVE-2025-57833
* CVE-2025-59681
* CVE-2025-59682
* CVE-2025-64459
* CVE-2025-64460

CVSS scores:

* CVE-2016-7401 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2018-16984 ( SUSE ): 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2018-7537 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2019-12308 ( SUSE ): 6.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2019-12781 ( SUSE ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2019-14232 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2019-19844 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2019-3498 ( SUSE ): 4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2019-6975 ( SUSE ): 5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2020-13596 ( SUSE ): 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
* CVE-2020-24583 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2020-24584 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2020-7471 ( SUSE ): 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
* CVE-2020-9402 ( SUSE ): 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
* CVE-2021-31542 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-32052 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2021-33203 ( SUSE ): 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-33571 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2021-45115 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-45452 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2022-22818 ( SUSE ): 5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2022-23833 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-28346 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-28347 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-34265 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-36359 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
* CVE-2023-23969 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-24580 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-31047 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-36053 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-41164 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-43665 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-24680 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27351 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38875 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39329 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-39330 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-39614 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41989 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41990 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41991 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42005 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45230 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45231 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-53907 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53908 ( SUSE ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-56374 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56374 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-13372 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2025-26699 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-26699 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-27556 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
* CVE-2025-32873 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-48432 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
* CVE-2025-48432 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:H/SA:N
* CVE-2025-57833 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-59681 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-59681 ( SUSE ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-59682 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-59682 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-64460 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Tumbleweed

An update that solves 70 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the python312-Django6-6.0-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* python312-Django6 6.0-1.1
* python313-Django6 6.0-1.1

## References:

* https://www.suse.com/security/cve/CVE-2015-3982.html
* https://www.suse.com/security/cve/CVE-2015-5145.html
* https://www.suse.com/security/cve/CVE-2015-5963.html
* https://www.suse.com/security/cve/CVE-2016-7401.html
* https://www.suse.com/security/cve/CVE-2017-12794.html
* https://www.suse.com/security/cve/CVE-2017-7233.html
* https://www.suse.com/security/cve/CVE-2017-7234.html
* https://www.suse.com/security/cve/CVE-2018-16984.html
* https://www.suse.com/security/cve/CVE-2018-6188.html
* https://www.suse.com/security/cve/CVE-2018-7536.html
* https://www.suse.com/security/cve/CVE-2018-7537.html
* https://www.suse.com/security/cve/CVE-2019-11358.html
* https://www.suse.com/security/cve/CVE-2019-12308.html
* https://www.suse.com/security/cve/CVE-2019-12781.html
* https://www.suse.com/security/cve/CVE-2019-14232.html
* https://www.suse.com/security/cve/CVE-2019-19118.html
* https://www.suse.com/security/cve/CVE-2019-19844.html
* https://www.suse.com/security/cve/CVE-2019-3498.html
* https://www.suse.com/security/cve/CVE-2019-6975.html
* https://www.suse.com/security/cve/CVE-2020-13254.html
* https://www.suse.com/security/cve/CVE-2020-13596.html
* https://www.suse.com/security/cve/CVE-2020-24583.html
* https://www.suse.com/security/cve/CVE-2020-24584.html
* https://www.suse.com/security/cve/CVE-2020-7471.html
* https://www.suse.com/security/cve/CVE-2020-9402.html
* https://www.suse.com/security/cve/CVE-2021-31542.html
* https://www.suse.com/security/cve/CVE-2021-32052.html
* https://www.suse.com/security/cve/CVE-2021-33203.html
* https://www.suse.com/security/cve/CVE-2021-33571.html
* https://www.suse.com/security/cve/CVE-2021-35042.html
* https://www.suse.com/security/cve/CVE-2021-45115.html
* https://www.suse.com/security/cve/CVE-2021-45452.html
* https://www.suse.com/security/cve/CVE-2022-22818.html
* https://www.suse.com/security/cve/CVE-2022-23833.html
* https://www.suse.com/security/cve/CVE-2022-28346.html
* https://www.suse.com/security/cve/CVE-2022-28347.html
* https://www.suse.com/security/cve/CVE-2022-34265.html
* https://www.suse.com/security/cve/CVE-2022-36359.html
* https://www.suse.com/security/cve/CVE-2022-41323.html
* https://www.suse.com/security/cve/CVE-2023-23969.html
* https://www.suse.com/security/cve/CVE-2023-24580.html
* https://www.suse.com/security/cve/CVE-2023-31047.html
* https://www.suse.com/security/cve/CVE-2023-36053.html
* https://www.suse.com/security/cve/CVE-2023-41164.html
* https://www.suse.com/security/cve/CVE-2023-43665.html
* https://www.suse.com/security/cve/CVE-2024-24680.html
* https://www.suse.com/security/cve/CVE-2024-27351.html
* https://www.suse.com/security/cve/CVE-2024-38875.html
* https://www.suse.com/security/cve/CVE-2024-39329.html
* https://www.suse.com/security/cve/CVE-2024-39330.html
* https://www.suse.com/security/cve/CVE-2024-39614.html
* https://www.suse.com/security/cve/CVE-2024-41989.html
* https://www.suse.com/security/cve/CVE-2024-41990.html
* https://www.suse.com/security/cve/CVE-2024-41991.html
* https://www.suse.com/security/cve/CVE-2024-42005.html
* https://www.suse.com/security/cve/CVE-2024-45230.html
* https://www.suse.com/security/cve/CVE-2024-45231.html
* https://www.suse.com/security/cve/CVE-2024-53907.html
* https://www.suse.com/security/cve/CVE-2024-53908.html
* https://www.suse.com/security/cve/CVE-2024-56374.html
* https://www.suse.com/security/cve/CVE-2025-13372.html
* https://www.suse.com/security/cve/CVE-2025-26699.html
* https://www.suse.com/security/cve/CVE-2025-27556.html
* https://www.suse.com/security/cve/CVE-2025-32873.html
* https://www.suse.com/security/cve/CVE-2025-48432.html
* https://www.suse.com/security/cve/CVE-2025-57833.html
* https://www.suse.com/security/cve/CVE-2025-59681.html
* https://www.suse.com/security/cve/CVE-2025-59682.html
* https://www.suse.com/security/cve/CVE-2025-64459.html
* https://www.suse.com/security/cve/CVE-2025-64460.html



openSUSE-SU-2026:10004-1: moderate: fluidsynth-2.5.2-1.1 on GA media


# fluidsynth-2.5.2-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10004-1
Rating: moderate

Cross-References:

* CVE-2025-68617

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the fluidsynth-2.5.2-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* fluidsynth 2.5.2-1.1
* fluidsynth-devel 2.5.2-1.1
* libfluidsynth3 2.5.2-1.1
* libfluidsynth3-32bit 2.5.2-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-68617.html