Aktion: Feed

Auch verfügbar in English, Français, Русский


{{feed
	url="https://...[|https://...|https://...]"
	[title="News feed title|no"]
		"text" - displayed as title
		"no" - means show no title
		empty title - title taken from feed
	[max="x"]
	[time=1]
		1 - show time tag of feed item
		0 - hide time tag of feed item (default)
	[nomark=1]
		1 - makes feed header h3 and feed-items headers h4
		0 - makes it all default
}}	

siehe auch: Externe Feeds Einbinden

Beispiel

{{feed url="https://news.opensuse.org/feed/"}}


XML

Feed Title: openSUSE News


Tumbleweed Monthly Update - June 2025

June brought a fresh wave of updates across openSUSE’s rolling release. There were major feature enhancements, performance improvements, and several critical security fixes.

KDE Plasma 6.4 as a the forefront of these updates alongside KDE Frameworks 6.15.0 and KDE Gear 25.04.2. The Linux kernel had a few updates and packages like GNU Compiler Collection 15, Mesa 25.1.3 and PipeWire 1.4.6 enhanced use of modern hardware, improved rendering capabilities and enhanced audio processing. Among the most crucial updates this month were those addressing security vulnerabilities.

A significant number of packages received important security patches this month. From libsoup, Mozilla Firefox, Python, libssh, Salt, ClamAV, gdm and more, multiple Common Vulnerabilities and Exposures (CVEs) were addressed to keep users and developers happy..

As always, be sure to roll back using snapper if any issues arise.

For more details on the change logs for the month, visit the openSUSE Factory mailing list.

New Features and Enhancements

KDE Plasma 6.4: This version brings a smoother and more customizable desktop experience. Key updates include flexible tiling layouts for each virtual desktop, enhanced window management, and a redesigned Spectacle for better screenshots and annotations. Accessibility sees keyboard navigation and Wayland enhancements. UI changes boost contrast and readability, especially in dark mode. Notifications now support direct update installs, full-screen “Do Not Disturb” mode, and mic-mute alerts. Widgets highlight new apps, media playback controls, and disk repair tools. Digital artists benefit from improved stylus configuration and relative mode support. The system also does a better job managing screen colors and performance with modern hardware. KRunner now visualizes color codes, while System Monitor adds GPU tracking and sensor data. Other tweaks improve file dragging, browser integration and Wayland protocol support.

KDE Frameworks 6.15.0: A major improvement in this version is the switch to QDoc, a modern documentation tool that is clearer and easier to for developers working with components like KArchive, Baloo, and Bluez Qt. Bug fixes across modules such as KArchive and KTextEditor improve stability and performance. User-interface frameworks like KWidgetsAddons and Kirigami received visual and functionality improvements. Accessibility features have also been enhanced. If you use KDE text editors like Kate and KWrite, you’ll see better support for different programming languages like Cap’n Proto and FreeFem.

KDE Gear 25.04.2: Kdenlive benefits from this update with fixes for several crashes, including fixing issues for gradients, histograms, and rendering. The update enhances NeoChat mobile support with better space switching and room management. Calligra improves formula handling to prevent crashes, and Akonadi now correctly handles tag editing and deletion. KDE Connect gains better compatibility with Qt 6.9, and the Konsole terminal app also got fixes..

ceph 18.2.7: This major update includes numerous architectural changes, performance improvements, and new features. One of the most notable changes is the deprecation of FileStore, which signals a full transition to BlueStore for all new deployments. There were enhancements for RADOS, include the introduction of a read balancer and the deprecation of cache tiering in favor of more modern storage strategies. The perf dump and perf schema commands have also been replaced with counter dump and counter schema for improved counter management. Additional updates include IPv6 fixes, orchestrator stability improvements, and updated Python binding patches for mgr modules. This release also disables ceph-mgr-cephadm and includes various build and compatibility patches to ensure smooth integration with modern toolchains and Python versions.

python-psutil 7.0.0: This major update has some significant changes. Support for Python 2.7 has been officially dropped and aligns with broader ecosystem shifts. A crash related to extremely high memory usage in Process.memory_maps() has been resolved and improves the stability for processes handling hundreds of gigabytes.

python-rich 14.0.0: This major version update introduces new features and behavioral changes that impact terminal output and error handling. A notable addition is the TTY_COMPATIBLE environment variable, which allows users to manually control TTY support detection. This is especially useful in headless or unusual terminal environments where automatic detection may fail. Notable changes include how Rich interprets color control variables and it now displays exception notes added via Exception.add_note() that enhances debugging clarity.

Key Package Updates

webkit2gtk3 2.48.3: This update brings stability and performance enhancements for GTK-based web applications and browsers like Epiphany. A major crash fix addresses issues introduced by the new threaded rendering system using the Skia graphics Application Programming Interface; users who experienced instability with recent rendering updates will see improvements. Rendering performance has also been refined by optimizing how dirty regions are processed across worker threads, which leads to smoother visuals and lower CPU usage. Dirty regions are parts of the screen or user interface that have changed and need to be redrawn during rendering. This update enhances both the usability and reliability in WebKit-based applications on GNOME and other GTK environments.

python313 3.13.5: This update provides security fixes and stability improvements. Notable changes include patching CVEs related to tarfile extraction vulnerabilities, fixing a use-after-free in the unicode-escape decoder, and restoring correct behavior for random.getrandbits() with integer-like objects. Library updates improve the handling of IPv6 addresses, email parsing, and zipfile operations. Some generator-related changes from 3.13.4 were rolled back to maintain backward compatibility. Upgrading is recommended for all users to ensure security and stability.

iproute2 6.15: An addition in this release is the support for 64-bit hardware packet counters in tc_util, which enables more precise monitoring of high-throughput interfaces that exceed 32-bit limits. The iprule utility now allows users to specify ports in hexadecimal notation and it improves compatibility and readability when working with low-level network protocols or masks. All backported patches from previous versions have been dropped in favor of upstream-clean code.

kernel-source 6.15.0 and 6.15.3: The 6.15.3 addresses a PCIe hotplug issue where late-arriving device detection signals (Presence Detect Changed) caused unnecessary errors . It also improves how background tasks are handled in I/O scheduling and resolves regressions in WiFi driver compatibility . The update fixes target power management, cryptographic operations, and file system handling (including btrfs and gfs2 ) for better data integrity and performance. The 6.15.0 Kernel reverts the “x86/smp: Eliminate mwait_play_dead_cpuid_hint()” commit to address stability issues and enables support for the Haoyu Microelectronics HYM8563 RTC module that is widely used on ARM64 platforms like Rockchip SoCs. Several patches were integrated to improve ACPI build handling and a number of critical bug fixes from the 6.14.8 update were carried forward, particularly in memory management, DMA engine handling, and I/O subsystems, improving reliability under complex workloads and reducing memory leaks in error paths.

gcc 15: This update introduces new language support and adds packages for Modula-2 and Cobol, which expands its already broad range of supported programming languages. The main toolchain now defaults to GCC 15, the -build flavor remains at version 13 to ensure compatibility and stability for environments requiring a proven compiler backend. The release also includes performance gains, better diagnostics and expanded offloading support, which makes it a recommended upgrade for developers.

fwupd 2.0.12: This update adds support for HP Portable USB-C hubs, more Foxconn 5G modems, and Intel Arc Battlemage GPUs. Some new features include Thunderbolt host controller emulation, enforcement of immutable device enumeration and improved handling of UEFI secure boot variables.

Mesa 25.1.3: Notable changes in this version include fixes for rendering issues in games like DOOM: The Dark Ages and improved driver behavior across Vulkan and OpenGL implementations. Support for osmesa has been dropped as it’s now considered redundant with EGL surfaceless contexts. Several patches were updated or removed, including adjustments to build fixes, SPIR-V translation, and Clover OpenCL handling.

gpg2 2.5.8: This release has a key improvement in the ability to show revocation reasons directly in standard key listings (-k), making it easier to track why a key was revoked without needing additional queries. The update also ensures better interoperability with external tools by emitting revocation reasons as comments in “pub” records and improving compatibility with systems that parse GnuPG key outputs. Two critical regressions were addressed; one affecting decryption and the other impacting the export of SSH keys from smart cards. Additionally, gpg --fetch-key no longer requires a keyserver to be configured, allowing direct key retrieval from URLs or local files, which simplifies key management workflows.

cryptsetup 2.8.0: This release has a key addition that enables better performance by using hardware sectors with additional metadata space. It makes all keyslot types self-contained and improves re-encryption workflows with options like --key-description, --new-key-description, and support for resuming re-encryption using tokens or volume keys. The update also enhances memory handling for Argon2 KDF (used in LUKS2), and improves error reporting for low-memory scenarios. It also optimizes metadata writes in LUKS2 and expands veritysetup capabilities with options like --error-as-corruption.

pipewire 1.4.6: This update fixes crasher bugs in the filter-chain and Advanced Linux Sound Architecture plugin. Latency reporting has been improved in module-combine-stream, and the module-filter-chain now better handles activation and deactivation to avoid crashes. A new option allows users to disable RAOP (Remote Audio Output Protocol) via a context property, offering more control over audio routing.

Bug Fixes and Security Updates

Several key security vulnerabilities were addressed this month. Common Vulnerabilities and Exposures this month are:

Security Updates

libsoup:

  • CVE-2025-32911: Fixed a buffer over-read in libsoup’s chunked transfer parser.
  • CVE-2025-32910: Resolved out‑of‑bounds access in libsoup’s header parsing.
  • CVE-2025-32906: Patched insufficient validation in libsoup’s cookie handling.
  • CVE-2025-32912: Fixed HTTP/2 session hijacking vulnerability in libsoup.
  • CVE-2025-32909: Addressed memory leak in libsoup’s multipart parser.
  • CVE-2025-4948: Fixed wolfSSL QUIC SSL peer verification bypass in libcurl.
  • CVE-2025-4969: Patched buffer overflow in libcurl’s dynbuf API.
  • CVE-2025-4945: Fixed an out-of-bounds read in the Linux kernel’s USB subsystem leading to potential information disclosure.

Mozilla Firefox 139:

  • CVE-2025-5263: Prevented cross-origin script execution leakage in Firefox.
  • CVE-2025-5264: Fixed newline-escaping flaw in “Copy as cURL” feature that allowed code execution.
  • CVE-2025-5265: Patched similar “Copy as cURL” code-execution bug in Firefox.
  • CVE-2025-5266: Fixed event leak from script elements across origins.
  • CVE-2025-5267: Fixed clickjacking flaw that exposed saved payment card details.
  • CVE-2025-5268: Addressed multiple memory safety bugs in Firefox/Thunderbird.
  • CVE-2025-5270: [Reserved: details pending public disclosure.]
  • CVE-2025-5271: [Reserved: details pending public disclosure.]
  • CVE-2025-5272: [Reserved: details pending public disclosure.]
  • CVE-2025-49709: Patched memory corruption in canvas surfaces.
  • CVE-2025-49710: Fixed unspecified memory safety issue in Firefox 139.0.4.

python313 3.13.5:

  • CVE-2024-12718: Patched Python 3.12+ tarfile filter bug allowing metadata or permission changes outside the extraction directory.
  • CVE-2025-4138: Fixed a buffer overflow in libarchive’s ZIP filter handling that could lead to memory corruption.
  • CVE-2025-4330: Patched out-of-bounds read in SQLite’s JSON extension when parsing invalid JSON input.
  • CVE-2025-4517: Resolved a race condition in OpenSSL’s session cache causing potential use-after-free scenarios.
  • CVE-2025-4516: Fixed a use-after-free in CPython’s bytes.decode("unicode_escape", errors="ignore|replace"), preventing memory corruption.

python311:

  • CVE-2025-4516: Fixed a use-after-free in CPython’s bytes.decode("unicode_escape", errors="ignore|replace") that could lead to memory corruption.

libssh

  • CVE-2025-4877: Write beyond bounds in binary to base64 conversion functions.
  • CVE-2025-4878: Use of uninitialized variable in privatekey_from_file().
  • CVE-2025-5318: Likely read beyond bounds in sftp server handle management.
  • CVE-2025-5351: Double free in functions exporting keys.
  • CVE-2025-5372: ssh_kdf() returns a success code on certain failures.
  • CVE-2025-5449: Likely read beyond bounds in sftp server message decoding.
  • CVE-2025-5987: Invalid return code for chacha20 poly1305 with OpenSSL backend.

Salt:

  • CVE-2024-38822: Fixed improper access control in Salt file client functionality.
  • CVE-2024-38823: Addressed command injection risk from untrusted pillar data.
  • CVE-2024-38824: Patched insecure deserialization in Salt event system.
  • CVE-2024-38825: Resolved directory traversal via improperly sanitized paths.
  • CVE-2025-22240: Fixed remote command execution through crafted Salt minion returns.
  • CVE-2025-22236: Salt minions could overwrite unintended files under specific conditions.
  • CVE-2025-22241: Addressed denial-of-service caused by malformed Salt return payloads.
  • CVE-2025-22237: Resolved issue where Salt master logs sensitive return data.
  • CVE-2025-22238: Patched exposure of minion keys in debug logs.
  • CVE-2025-22239: Addressed misconfigured ACLs leading to privilege escalation.
  • CVE-2025-22242: Fixed input validation issue in Salt’s ssh module.

xorg-x11-server:

  • CVE-2025-49176: Fixed an integer overflow vulnerability bypassing the size check.

libtpms 0.10.1:

  • CVE-2025-49133: Fixed an out-of-bounds read vulnerability in the CryptHmacSign function of libtpms, which could be triggered by malicious commands to a TPM 2.0/vTPM, causing service disruption.

ClamAV:

  • CVE-2025-20260: PDF parser buffer overflow allowing DoS or remote code execution with large scan limits.
  • CVE-2025-20234: UDF parser buffer overflow that may leak data or cause denial-of-service.

gdm:

  • CVE-2025-6018: Security risk from use of pam_env in authentication stack.

pam_pkcs11:

  • CVE-2025-6018: Same issue as in gdm — use of pam_env in auth stack.

jq 1.8.0:

pam 1.7.1:

xwayland 24.1.7:

  • CVE-2025-49175: Fixed an out-of-bounds access issue in the X Rendering extension related to animated cursors.
  • CVE-2025-49176: Prevented integer overflow in the Big Requests Extension.
  • CVE-2025-49177: Prevented data leaks in the XFIXES extension.
  • CVE-2025-49178: Ensured proper handling of input buffer bytes to ignore.
  • CVE-2025-49179: Addressed integer overflows in the X Record extension.
  • CVE-2025-49180: Fixed integer overflows in the RandR extension, preventing potential crashes or memory corruption.

yelp 42.3:

  • CVE-2025-3155: Patched a JavaScript execution flaw in the Yelp help viewer that allowed arbitrary file reads via crafted help documents.

perl-CryptX 0.87.0:

  • CVE-2025-40914: Fixed CryptX that embeds a version of the libtommath library that is susceptible to integer overflow.

glib2 2.84.3:

  • CVE-2025-6052: Patched integer overflow in GLib’s GString expansion (g_string_maybe_expand), preventing potential buffer overflows.

Users are advised to update to the latest versions to mitigate these vulnerabilities.

Conclusion

June had multiple vulnerability fixes and also had multiple firmware packages that were updated to version 20250613. This includes improvements for Qualcomm, Mediatek, Realtek, and Cirrus sound chips, along with a Bluetooth firmware upgrade and better symlink handling. There were also multiple Xfce panel plugins updates (mailwatch, mount, mpc, netload, notes, places, and sensors) to new versions. These package updates were for transitioning builds to Meson, replacing deprecated dependencies like Exo with libxfce4ui 4.21.0, automating copyright management, improving code structure, fixing build warnings and updating translations. Security was a major theme this month, with critical vulnerabilities patched across Firefox, Python, Salt, ClamAV, libssh, and more. Happy updating!.

Slowroll Arrivals

Please note that these updates also apply to Slowroll and arrive between an average of 5 to 10 days after being released in Tumbleweed snapshot. This monthly approach has been consistent for many months, ensuring stability and timely enhancements for users. Updated packages for Slowroll are regularly published in emails on openSUSE Factory mailing list.

Contributing to openSUSE Tumbleweed

Stay updated with the latest snapshots by subscribing to the openSUSE Factory mailing list. For those Tumbleweed users who want to contribute or want to engage with detailed technological discussions, subscribe to the openSUSE Factory mailing list . The openSUSE team encourages users to continue participating through bug reports, feature suggestions and discussions.

Your contributions and feedback make openSUSE Tumbleweed better with every update. Whether reporting bugs, suggesting features, or participating in community discussions, your involvement is highly valued.


{{feed url="https://www.flickr.com/services/feeds/photos_public.gne?tags=art&format=rss_200" max=1 time=1}}


XML

Feed Title: Pool von Japan Through the Eyes of Others


DSCF9598 Kyoto

capsule63 hat dem Pool ein Foto hinzugefügt:

DSCF9598 Kyoto

ecureuils volants geants du japon (musasabi) se disputant une femelle ,sous l'oeil curieux des chats qui attendent la chute...au milieu de 10000 Torii