SUSE 5495 Published by

SUSE Linux has released several security updates for various packages, including Python-Django and Warewulf4. The severity of these updates ranges from critical to low, indicating varying levels of risk if not addressed promptly. Additionally, openSUSE has also issued updates for libsuricata8_0_1, curl, and jupyter-jupyterlab on their GA media platform.

SUSE-SU-2025:03446-1: critical: Security update for python-Django
SUSE-SU-2025:03448-1: moderate: Security update for warewulf4
SUSE-SU-2025:03449-1: low: Security update for cairo
openSUSE-SU-2025:15592-1: moderate: libsuricata8_0_1-8.0.1-1.1 on GA media
openSUSE-SU-2025:15590-1: moderate: curl-8.16.0-1.1 on GA media
openSUSE-SU-2025:15591-1: moderate: jupyter-jupyterlab-4.4.9-1.1 on GA media




SUSE-SU-2025:03446-1: critical: Security update for python-Django


# Security update for python-Django

Announcement ID: SUSE-SU-2025:03446-1
Release Date: 2025-10-02T07:13:11Z
Rating: critical
References:

* bsc#1250485
* bsc#1250487

Cross-References:

* CVE-2025-59681
* CVE-2025-59682

CVSS scores:

* CVE-2025-59681 ( SUSE ): 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-59681 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-59681 ( NVD ): 7.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N
* CVE-2025-59682 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-59682 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-59682 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP6
* SUSE Package Hub 15 15-SP7

An update that solves two vulnerabilities can now be installed.

## Description:

This update for python-Django fixes the following issues:

* CVE-2025-59681: SQL injection via the `QuerySet`
annotate()`,`alias()`,`aggregate()`, or`extra()` methods when processing a
specially crafted dictionary with dictionary expansion (bsc#1250485).
* CVE-2025-59682: directory traversal via the `django.utils.archive.extract()`
function when processing an archive with file paths that share a common
prefix with the target directory (bsc#1250487).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-3446=1

* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-3446=1 openSUSE-SLE-15.6-2025-3446=1

* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-3446=1

## Package List:

* SUSE Package Hub 15 15-SP7 (noarch)
* python311-Django-4.2.11-150600.3.33.1
* openSUSE Leap 15.6 (noarch)
* python311-Django-4.2.11-150600.3.33.1
* SUSE Package Hub 15 15-SP6 (noarch)
* python311-Django-4.2.11-150600.3.33.1

## References:

* https://www.suse.com/security/cve/CVE-2025-59681.html
* https://www.suse.com/security/cve/CVE-2025-59682.html
* https://bugzilla.suse.com/show_bug.cgi?id=1250485
* https://bugzilla.suse.com/show_bug.cgi?id=1250487



SUSE-SU-2025:03448-1: moderate: Security update for warewulf4


# Security update for warewulf4

Announcement ID: SUSE-SU-2025:03448-1
Release Date: 2025-10-02T07:15:03Z
Rating: moderate
References:

* bsc#1227465
* bsc#1227686
* bsc#1246082
* bsc#1248768
* bsc#1248906

Cross-References:

* CVE-2025-58058

CVSS scores:

* CVE-2025-58058 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58058 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58058 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* HPC Module 15-SP6
* HPC Module 15-SP7
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7

An update that solves one vulnerability and has four security fixes can now be
installed.

## Description:

This update for warewulf4 fixes the following issues:

Update to version 4.6.4.

Security issues fixed:

* CVE-2025-58058: xz: excessive memory consuption when unpacking a large
number of corrupted LZMA archives (bsc#1248906).

Other issues fixed:

* Convert disk booleans from `wwbool` to `*bool` which allows bools in disk to
be set to false via command line (bsc#1248768).
* Fix `wwctl` upgrade nodes to handle kernel argument lists (bsc#1227686,
bsc#1227465).
* Mark `slurm` as recommeneded in the `warewulf4-overlay-slurm` package
(bsc#1246082).
* Switch to `dnsmasq` as default DHCP and TFTP provider.

* v4.6.4 release updates:

* Update NetworkManager Overlay
* Disable IPv4 in NetworkManager if no address or route is specified
* Fix(`wwctl`): create overlay edit `tempfile` in `tmpdir`
* Add default for systemd name for warewulf in `warewulf.conf`
* Atomic overlay file application in `wwclient`
* Simpler names for overlay methods
* Fix `warewulfd` API behavior when deleting distribution overlay

* v4.6.3 release updates:

* IPv6 iPXE support
* Fix a race condition in `wwctl` overlay edit
* Fixed handling of comma-separated mount options in `fstab` and `ignition`
overlays
* Move `reexec.Init()` to beginning of `wwctl`
* Added `warewuld` configure option
* Address copilot review from #1945
* Bugfix: cloning a site overlay when parent dir does not exist
* Clone to a site overlay when adding files in `wwapi`
* Consolidated `createOverlayFile` and `updateOverlayFile` to `addOverlayFile`
* Support for creating and updating overlay file in `wwapi`
* Only return overlay files that refer to a path within the overlay
* Add overlay file deletion support
* `DELETE /api/overlays/{id}?force=true` can delete overlays in use
* Restore idempotency of `PUT /api/nodes/{id}`
* Simplify overlay mtime API and add tests
* Add node overlay buildtime
* Improved `netplan` support
* Rebuild overlays for discovered nodes

* v4.6.2 release updates:

* (preview) support for provisioning to local disk

* incoperated from v4.6.1:

* REST API, which is disabled in the default configuration

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2025-3448=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-3448=1

* HPC Module 15-SP6
zypper in -t patch SUSE-SLE-Module-HPC-15-SP6-2025-3448=1

* HPC Module 15-SP7
zypper in -t patch SUSE-SLE-Module-HPC-15-SP7-2025-3448=1

## Package List:

* openSUSE Leap 15.5 (aarch64 x86_64)
* warewulf4-overlay-4.6.4-150500.6.37.1
* warewulf4-4.6.4-150500.6.37.1
* openSUSE Leap 15.5 (noarch)
* warewulf4-overlay-slurm-4.6.4-150500.6.37.1
* warewulf4-man-4.6.4-150500.6.37.1
* warewulf4-dracut-4.6.4-150500.6.37.1
* warewulf4-overlay-rke2-4.6.4-150500.6.37.1
* warewulf4-reference-doc-4.6.4-150500.6.37.1
* openSUSE Leap 15.6 (aarch64 x86_64)
* warewulf4-overlay-4.6.4-150500.6.37.1
* warewulf4-4.6.4-150500.6.37.1
* openSUSE Leap 15.6 (noarch)
* warewulf4-overlay-slurm-4.6.4-150500.6.37.1
* warewulf4-man-4.6.4-150500.6.37.1
* warewulf4-reference-doc-4.6.4-150500.6.37.1
* warewulf4-dracut-4.6.4-150500.6.37.1
* HPC Module 15-SP6 (aarch64 x86_64)
* warewulf4-overlay-4.6.4-150500.6.37.1
* warewulf4-4.6.4-150500.6.37.1
* HPC Module 15-SP6 (noarch)
* warewulf4-overlay-slurm-4.6.4-150500.6.37.1
* warewulf4-man-4.6.4-150500.6.37.1
* warewulf4-reference-doc-4.6.4-150500.6.37.1
* warewulf4-dracut-4.6.4-150500.6.37.1
* HPC Module 15-SP7 (aarch64 x86_64)
* warewulf4-overlay-4.6.4-150500.6.37.1
* warewulf4-4.6.4-150500.6.37.1
* HPC Module 15-SP7 (noarch)
* warewulf4-overlay-slurm-4.6.4-150500.6.37.1
* warewulf4-man-4.6.4-150500.6.37.1
* warewulf4-reference-doc-4.6.4-150500.6.37.1
* warewulf4-dracut-4.6.4-150500.6.37.1

## References:

* https://www.suse.com/security/cve/CVE-2025-58058.html
* https://bugzilla.suse.com/show_bug.cgi?id=1227465
* https://bugzilla.suse.com/show_bug.cgi?id=1227686
* https://bugzilla.suse.com/show_bug.cgi?id=1246082
* https://bugzilla.suse.com/show_bug.cgi?id=1248768
* https://bugzilla.suse.com/show_bug.cgi?id=1248906



SUSE-SU-2025:03449-1: low: Security update for cairo


# Security update for cairo

Announcement ID: SUSE-SU-2025:03449-1
Release Date: 2025-10-02T07:15:33Z
Rating: low
References:

* bsc#1247589

Cross-References:

* CVE-2025-50422

CVSS scores:

* CVE-2025-50422 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-50422 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2025-50422 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* Basesystem Module 15-SP6
* Basesystem Module 15-SP7
* Desktop Applications Module 15-SP6
* Desktop Applications Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for cairo fixes the following issues:

* CVE-2025-50422: Fixed Poppler crash on malformed input (bsc#1247589)

* Update to version 1.18.4:

* The dependency on LZO has been made optional through a build time
configuration toggle.
* You can build Cairo against a Freetype installation that does not have the
FT_Color type.
* Cairo tests now build on Solaris 11.4 with GCC 14.
* The DirectWrite backend now builds on MINGW 11.
* The DirectWrite backend now supports font variations and proper glyph
coverage.
* Use tarball in lieu of source service due to freedesktop gitlab migration,
will switch back at next release at the latest.
* Add pkgconfig(lzo2) BuildRequires: New optional dependency, build lzo2
support feature.

* Convert to source service: allows for easier upgrades by the GNOME team.

* Update to version 1.18.2:

* The malloc-stats code has been removed from the tests directory
* Cairo now requires a version of pixman equal to, or newer than, 0.40.
* There have been multiple build fixes for newer versions of GCC for MSVC; for
Solaris; and on macOS 10.7.
* PNG errors caused by loading malformed data are correctly propagated to
callers, so they can handle the case.
* Both stroke and fill colors are now set when showing glyphs on a PDF
surface.
* All the font options are copied when creating a fallback font object.
* When drawing text on macOS, Cairo now tries harder to select the appropriate
font name.
* Cairo now prefers the COLRv1 table inside a font, if one is available.
* Cairo requires a C11 toolchain when building.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-3449=1 SUSE-2025-3449=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-3449=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-3449=1

* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-3449=1

* Desktop Applications Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-3449=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libcairo-script-interpreter2-debuginfo-1.18.4-150600.3.3.1
* libcairo2-1.18.4-150600.3.3.1
* libcairo-gobject2-1.18.4-150600.3.3.1
* libcairo-script-interpreter2-1.18.4-150600.3.3.1
* cairo-devel-1.18.4-150600.3.3.1
* libcairo2-debuginfo-1.18.4-150600.3.3.1
* cairo-tools-1.18.4-150600.3.3.1
* libcairo-gobject2-debuginfo-1.18.4-150600.3.3.1
* cairo-debugsource-1.18.4-150600.3.3.1
* cairo-tools-debuginfo-1.18.4-150600.3.3.1
* openSUSE Leap 15.6 (x86_64)
* libcairo-gobject2-32bit-debuginfo-1.18.4-150600.3.3.1
* libcairo-script-interpreter2-32bit-debuginfo-1.18.4-150600.3.3.1
* libcairo2-32bit-1.18.4-150600.3.3.1
* libcairo2-32bit-debuginfo-1.18.4-150600.3.3.1
* cairo-devel-32bit-1.18.4-150600.3.3.1
* libcairo-gobject2-32bit-1.18.4-150600.3.3.1
* libcairo-script-interpreter2-32bit-1.18.4-150600.3.3.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libcairo-script-interpreter2-64bit-1.18.4-150600.3.3.1
* libcairo-gobject2-64bit-debuginfo-1.18.4-150600.3.3.1
* libcairo-gobject2-64bit-1.18.4-150600.3.3.1
* libcairo-script-interpreter2-64bit-debuginfo-1.18.4-150600.3.3.1
* libcairo2-64bit-debuginfo-1.18.4-150600.3.3.1
* libcairo2-64bit-1.18.4-150600.3.3.1
* cairo-devel-64bit-1.18.4-150600.3.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libcairo-script-interpreter2-debuginfo-1.18.4-150600.3.3.1
* libcairo2-1.18.4-150600.3.3.1
* libcairo-gobject2-1.18.4-150600.3.3.1
* libcairo-script-interpreter2-1.18.4-150600.3.3.1
* libcairo2-debuginfo-1.18.4-150600.3.3.1
* libcairo-gobject2-debuginfo-1.18.4-150600.3.3.1
* cairo-debugsource-1.18.4-150600.3.3.1
* cairo-devel-1.18.4-150600.3.3.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libcairo-script-interpreter2-debuginfo-1.18.4-150600.3.3.1
* libcairo2-1.18.4-150600.3.3.1
* libcairo-gobject2-1.18.4-150600.3.3.1
* libcairo-script-interpreter2-1.18.4-150600.3.3.1
* libcairo2-debuginfo-1.18.4-150600.3.3.1
* libcairo-gobject2-debuginfo-1.18.4-150600.3.3.1
* cairo-debugsource-1.18.4-150600.3.3.1
* cairo-devel-1.18.4-150600.3.3.1
* Desktop Applications Module 15-SP6 (x86_64)
* libcairo2-32bit-1.18.4-150600.3.3.1
* libcairo2-32bit-debuginfo-1.18.4-150600.3.3.1
* Desktop Applications Module 15-SP7 (x86_64)
* libcairo2-32bit-1.18.4-150600.3.3.1
* libcairo2-32bit-debuginfo-1.18.4-150600.3.3.1

## References:

* https://www.suse.com/security/cve/CVE-2025-50422.html
* https://bugzilla.suse.com/show_bug.cgi?id=1247589



openSUSE-SU-2025:15592-1: moderate: libsuricata8_0_1-8.0.1-1.1 on GA media


# libsuricata8_0_1-8.0.1-1.1 on GA media

Announcement ID: openSUSE-SU-2025:15592-1
Rating: moderate

Cross-References:

* CVE-2025-59147
* CVE-2025-59148
* CVE-2025-59149
* CVE-2025-59150

Affected Products:

* openSUSE Tumbleweed

An update that solves 4 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the libsuricata8_0_1-8.0.1-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* libsuricata8_0_1 8.0.1-1.1
* suricata 8.0.1-1.1
* suricata-devel 8.0.1-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-59147.html
* https://www.suse.com/security/cve/CVE-2025-59148.html
* https://www.suse.com/security/cve/CVE-2025-59149.html
* https://www.suse.com/security/cve/CVE-2025-59150.html



openSUSE-SU-2025:15590-1: moderate: curl-8.16.0-1.1 on GA media


# curl-8.16.0-1.1 on GA media

Announcement ID: openSUSE-SU-2025:15590-1
Rating: moderate

Cross-References:

* CVE-2025-10148
* CVE-2025-9086

CVSS scores:

* CVE-2025-9086 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Tumbleweed

An update that solves 2 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the curl-8.16.0-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* curl 8.16.0-1.1
* curl-fish-completion 8.16.0-1.1
* curl-zsh-completion 8.16.0-1.1
* libcurl-devel 8.16.0-1.1
* libcurl-devel-32bit 8.16.0-1.1
* libcurl-devel-doc 8.16.0-1.1
* libcurl4 8.16.0-1.1
* libcurl4-32bit 8.16.0-1.1
* wcurl 8.16.0-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-10148.html
* https://www.suse.com/security/cve/CVE-2025-9086.html



openSUSE-SU-2025:15591-1: moderate: jupyter-jupyterlab-4.4.9-1.1 on GA media


# jupyter-jupyterlab-4.4.9-1.1 on GA media

Announcement ID: openSUSE-SU-2025:15591-1
Rating: moderate

Cross-References:

* CVE-2025-59842

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the jupyter-jupyterlab-4.4.9-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* jupyter-jupyterlab 4.4.9-1.1
* python311-jupyterlab 4.4.9-1.1
* python312-jupyterlab 4.4.9-1.1
* python313-jupyterlab 4.4.9-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-59842.html