Tumbleweed Monthly Update - April 2026
Three hundred twenty-one developers, students and technology professionals converged on Universidad Libre in Barranquilla, Colombia, for the first-ever openSUSE America Summit.
It was a two-day event held at Universidad Libre’s campuses that wrapped up on May 1 with calls to expand open-source culture and contribution across the region.
A capture the flag competition added a hands-on cybersecurity dimension to the summit, challenging participants to test their offensive and defensive skills in a live environment. The exercise drew significant interest from students and IT professionals alike.
The conference drew presenters from across the globe, which reflects the international reach of the open-source community. Speakers representing Colombia, Argentina, Brazil, Mexico, the Dominican Republic, India, the United Kingdom, Germany and the United States addressed topics ranging from cybersecurity and cloud infrastructure to machine learning and community development.
Luis Delascar of Colombia opened Day 2 with a presentation on Kuná Red, an offline-first, open-source mesh networking solution designed to enable communication in rural and underserved regions lacking reliable internet or cellular infrastructure. Diego Córdoba of Argentina delivered a deep dive into Netfilter and firewall architecture in openSUSE using nftables, while compatriot Andrea Navarro, also from Argentina, addressed the use of Jupyter notebooks in educational settings as an alternative to commercial cloud platforms.
Patrick Fitzgerald made the case for Linux migration in an update talk titled about migrating from Windows to Linux citing growing concerns around data sovereignty, tariffs, and unreliable international partnerships as compelling reasons for individuals and organizations to move to Linux.
Ram Mohan Rao Chukka and Shibi Ramachandran, both from India, presented two sessions; one on improving end-to-end testing using Kuttl to reduce broken builds, and another on intelligent drift detection and auto-remediation in ArgoCD for enterprise Kubernetes environments.
Walddys Dorrejo of the Dominican Republic, an openSUSE moderator, presented on unified observability and security using Wazuh. Gabriel Bazzotti of Brazil introduced Git-based packaging for openSUSE and Anuar Harb of Mexico spoke about open-source infrastructure as the foundation for connected digital ecosystems in emerging regions.
Colombian speakers were featured prominently throughout the program. Jorge Lambrano presented a full machine learning workflow. Jorge Aguilar addressed building modern, robust open-source data platforms for demanding analytics workloads. Jesuse Bossa explored the historical and philosophical purpose of engineering and Deiner Bello showcased VisitChocó, an interactive tourism platform built with React, TypeScript and geospatial data promoting the Colombian department of Chocó. Integration of Weblate to enable community-driven translations and expand the platform’s reach to broader audiences across Latin America and beyond is being considered.
Johannes Segitz delivered two sessions. His talk about the current AI landscape and how LLMs are reshaping how people code, patch and package software was a crowd pleaser.
Organized by sponsorship lead Astian Inc., which the company behind the Midori light-weight Web Browser along with a network of local support from LinuxBQ and Red Team Barranquilla, Barranquilla’s community of free and open-source software enthusiasts organized and ran the summt April 29 through May 1.
Having the event at two campuses, Universidad Libre’s Central Campus on April 29 and North Campus on April 30, was a natural fit for the open-source event. Attendees included speakers, IT professionals and students from university had hours of discussions about openSUSE and the broader open-source ecosystem.
The event was made possible with support from SUSE and the Geeko Foundation, both of which help to champion growth of the openSUSE Project and the global open-source community.
The choice of Barranquilla as host city may prove to be more than symbolic. Organizers and attendees have begun discussing the possibility of transforming the openSUSE America Summit into a recurring, traveling event modeled after the openSUSE.Asia Summit, which rotates among countries throughout Asia. Each host nation contributes its own cultural identity and local community to the gathering.
Colombia, with its growing technology sector, strong university ecosystem and passionate open-source community, make a compelling case as a starting point and center of gravity for future events. The LinuxBQ community’s enthusiasm and the active participation of Universidad Libre students signal that the conditions for a sustainable, grassroots open-source movement in the region are already in place. If the model takes hold, future editions of the summit could travel to other nations across the Americas and the Caribbean, amplifying the voices of tech leaders throughout the region and building a collective, traveling community of experts much as the Asia Summit has done across that continent.
A community barbecue on May 1 brought speakers and volunteers together to close out the event. Sessions were livestreamed and are available for viewing on the LinuxBQ YouTube channel.
Summit Draws Landmark Regional Gathering
Three hundred twenty-one developers, students and technology professionals converged on Universidad Libre in Barranquilla, Colombia, for the first-ever openSUSE America Summit.
It was a two-day event held at Universidad Libre’s campuses that wrapped up on May 1 with calls to expand open-source culture and contribution across the region.
A capture the flag competition added a hands-on cybersecurity dimension to the summit, challenging participants to test their offensive and defensive skills in a live environment. The exercise drew significant interest from students and IT professionals alike.
The conference drew presenters from across the globe, which reflects the international reach of the open-source community. Speakers representing Colombia, Argentina, Brazil, Mexico, the Dominican Republic, India, the United Kingdom, Germany and the United States addressed topics ranging from cybersecurity and cloud infrastructure to machine learning and community development.
Luis Delascar of Colombia opened Day 2 with a presentation on Kuná Red, an offline-first, open-source mesh networking solution designed to enable communication in rural and underserved regions lacking reliable internet or cellular infrastructure. Diego Córdoba of Argentina delivered a deep dive into Netfilter and firewall architecture in openSUSE using nftables, while compatriot Andrea Navarro, also from Argentina, addressed the use of Jupyter notebooks in educational settings as an alternative to commercial cloud platforms.
Patrick Fitzgerald made the case for Linux migration in an update talk titled about migrating from Windows to Linux citing growing concerns around data sovereignty, tariffs, and unreliable international partnerships as compelling reasons for individuals and organizations to move to Linux.
Ram Mohan Rao Chukka and Shibi Ramachandran, both from India, presented two sessions; one on improving end-to-end testing using Kuttl to reduce broken builds, and another on intelligent drift detection and auto-remediation in ArgoCD for enterprise Kubernetes environments.
Walddys Dorrejo of the Dominican Republic, an openSUSE moderator, presented on unified observability and security using Wazuh. Gabriel Bazzotti of Brazil introduced Git-based packaging for openSUSE and Anuar Harb of Mexico spoke about open-source infrastructure as the foundation for connected digital ecosystems in emerging regions.
Colombian speakers were featured prominently throughout the program. Jorge Lambrano presented a full machine learning workflow. Jorge Aguilar addressed building modern, robust open-source data platforms for demanding analytics workloads. Jesuse Bossa explored the historical and philosophical purpose of engineering and Deiner Bello showcased VisitChocó, an interactive tourism platform built with React, TypeScript and geospatial data promoting the Colombian department of Chocó. Integration of Weblate to enable community-driven translations and expand the platform’s reach to broader audiences across Latin America and beyond is being considered.
Johannes Segitz delivered two sessions. His talk about the current AI landscape and how LLMs are reshaping how people code, patch and package software was a crowd pleaser.
Organized by sponsorship lead Astian Inc., which the company behind the Midori light-weight Web Browser along with a network of local support from LinuxBQ and Red Team Barranquilla, Barranquilla’s community of free and open-source software enthusiasts organized and ran the summt April 29 through May 1.
Having the event at two campuses, Universidad Libre’s Central Campus on April 29 and North Campus on April 30, was a natural fit for the open-source event. Attendees included speakers, IT professionals and students from university had hours of discussions about openSUSE and the broader open-source ecosystem.
The event was made possible with support from SUSE and the Geeko Foundation, both of which help to champion growth of the openSUSE Project and the global open-source community.
The choice of Barranquilla as host city may prove to be more than symbolic. Organizers and attendees have begun discussing the possibility of transforming the openSUSE America Summit into a recurring, traveling event modeled after the openSUSE.Asia Summit, which rotates among countries throughout Asia. Each host nation contributes its own cultural identity and local community to the gathering.
Colombia, with its growing technology sector, strong university ecosystem and passionate open-source community, make a compelling case as a starting point and center of gravity for future events. The LinuxBQ community’s enthusiasm and the active participation of Universidad Libre students signal that the conditions for a sustainable, grassroots open-source movement in the region are already in place. If the model takes hold, future editions of the summit could travel to other nations across the Americas and the Caribbean, amplifying the voices of tech leaders throughout the region and building a collective, traveling community of experts much as the Asia Summit has done across that continent.
A community barbecue on May 1 brought speakers and volunteers together to close out the event. Sessions were livestreamed and are available for viewing on the LinuxBQ YouTube channel.
Tumbleweed Monthly Update - April 2026
There were several software package updates for openSUSE Tumbleweed during April and the later half of the month brought some urgency with Copy Fail, which is now safe for users of the rolling release and Slowroll for those who have done a zypper dup at the end of the month.
The information about affected flavors of openSUSE was covered in a blog by the security team.
April brought a major desktop release of GNOME 50 and there was a fourth Plasma 6.6 point release. PHP, GTK4 with the new native GtkSvg renderer, SQLite, iproute2, and nano were among some of the develop packages updated this month. The Linux kernel advances to 7.0.2, and Mesa progressed through 26.0.4 and 26.0.5 with raytracing fixes ahead of upcoming game releases. Security received heavy attention with WebKitGTK, Python, CUPS, Flatpak, sudo, and OpenEXR all receiving multiple Common Vulnerabilities and Exposures fixes.
As always, be sure to roll back using snapper if any issues arise.
For more details on the change logs for the month, visit the openSUSE Factory mailing list.
New Features and Enhancements
KDE Gear 26.04.0: This major release updates 129 packages from the 25.12.3 series across the core PIM suite (Akonadi, KMail, Kontact, KOrganizer), graphics tools (Gwenview, Okular), development tools (Kate, Kompare, Umbrello), and system utilities (Dolphin, Konsole, Kleopatra). Dolphin prevents re-entrant signal activation across multiple view states, and Ark prevents silent replacement of existing files by directory entries during extraction. Okular avoids processing HTML with QDomDocument and improves certificate selection, and kdegraphics-thumbnailers addresses multiple crashes for malformed files. Infrastructure-wide changes include CMake modernization, a port to QDoc documentation, and migration toward modern C++ patterns such as std::shared_ptr over QSharedPointer. The companion ktextaddons library jumps from 1.8.0 to 2.0.1.
KDE Frameworks 6.25.0: This release emphasizes code quality, memory safety, and developer experience. KIO reverts a problematic permissions-based readability check, restores proper FTP UTF-8 negotiation, fixes WebDAV copy/move headers, and resolves multiple memory leaks across file operations and preview jobs. KCodecs streamlines encoding detection with safer initialization, improved codec lookup performance, and removes obsolete code since Qt 6.8+ is required.Kirigami enhances component reliability by preventing dialog layer leaks and adds a configurable textFormat property to TitleSubtitle, while Breeze Icons expands the icon set with new status icons. KTextEditor improves document handling by using the first line as a fallback title and adding relevant MIME types to save dialogs.
GNOME 50 for developers: This release brings significant improvements to the development stack. Builder gains a new save delegate system for better draft handling, refined dark theme colors matching the Adwaita palette, and more integrated help documentation. Flatpak support now moves deleted files to the trash, the LSP client better handles delete notifications, and the build pipeline supports more flexible post-install commands. Mutter Devkit receives a major feature expansion including HiDPI and fractional scaling simulation, multi-monitor support within a single session, clipboard integration between host and Devkit, and resizable virtual displays with emulated monitor modes — reducing the need for physical multi-monitor test setups. GTK 4.22 introduces GtkSvg, a new native in-process SVG renderer integrated with the GTK Scene Graph that supports SVG animations, passes over 1,250 tests in the resvg test suite, and maintains 60fps+ performance for trusted system icons and application resources (untrusted SVGs should still use the sandboxed Glycin library). Libadwaita 1.9 introduces new sidebar widgets including AdwSidebar and AdwViewSwitcherSidebar (replacing GtkStackSidebar), automatic support for the system-wide reduced motion preference across most widgets, context menus on AdwAboutDialog link rows, and GTK_DEBUG=builder diagnostics for all standard widgets. Autoloaded style resources are deprecated in favor of standard CSS media queries.
GDM 50.0: The most significant change for this in the GNOME 50 release is the complete removal of X11 support for GDM’s own sessions, which now always run on Wayland. Features like XDMCP and the system-wide Xserver are gone, though launching other desktops’ X11 sessions via per-user X servers is still possible. Compiling GDM without Wayland support is no longer possible. With systemd v260+, remote desktop sessions and local background sessions are now granted GPU access, enabling accelerated graphics for remote sessions on distributions that restrict GPU device node permissions. service simplifies starting headless graphical sessions for RDP purposes. The gdm/gdm3` user is no longer needed since GDM now fully relies on dynamically allocated users. Wtmp/utmp/btmp records now contain more useful values, especially for Wayland and headless RDP sessions.
Plasma 6.6.4: KWin fixes blur flickering after wobbly windows, improves startup feedback icon clarity, resolves crashes with accessibility keyboards, and enhances pointer scaling and key repeat handling on Wayland. The Oxygen theme addresses pixelated buttons under fractional scaling, restores missing menu shadows, and adds a missing switch SVG. Usability improvements include better RTL support in Kicker, proper drag initiation only after pointer movement, and refined shortcut conflict prevention in keyboard settings. Plasma Keyboard hardens virtual input handling with UTF-8 length fixes and disables predictive text during capture. Other fixes improve Discover by correcting how it tracks the number of active transactions, Dr Konqi with more reliable crash debugging, and Spectacle with a workaround for an overlay issue introduced in Qt 6.11. Several system tray and menu rendering glitches across multiple applets are also resolved, resulting in a smoother and more resilient desktop experience.
w3m 0.5.6: This is a major update for the terminal web browser. New features include commands to scroll the current line to top/bottom, a change directory (CD) command, a vim-like smartcase search option, recognition of aria-label for buttons, gopher protocol support, and experimental session store and restore. The image display in the kitty terminal is fixed, and slow backward search in long lines is improved.
LibreOffice 26.2.2.2: This is a major version upgrade with completely new features, improvements, and bug fixes across Writer, Calc, Impress, Draw, Math, and Base. Detailed release notes are available at The Document Foundation wiki. Bundled components are refreshed including PDFium updated from 7012 to 7471 and 2D Graphics Library Skia updated from milestone 136 to 142.
SDL3 3.4.2: This update adds SDL_HINT_OPENGL_FORCE_SRGB_FRAMEBUFFER to control sRGB behavior for OpenGL and OpenGL ES contexts. A long startup time on Windows caused by non-compliant input devices was fixed, along with a divide-by-zero when using Nintendo Switch 2 controllers and improved GameCube adapter handling in PC mode. Support for the Razer Raiju V5 Pro is added.
cryptsetup 2.8.6: This update has several disk encryption fixes. The resumed device UUID is now verified against the UUID stored in metadata, and the LUKS2 reencryption lock name was corrected. FileVault (fvault2) metadata parsing is fixed, including reading from the correct image offset. The OpenSSL crypto backend works again when built with LibreSSL and allows up to 64 concurrent threads.
Mozilla Firefox 149.0.2: This update addresses multiple security vulnerabilities, including integer overflow and memory safety bugs in Graphics: Text and Graphics: WebGPU components. The update also includes enterprise-related features such as AI-feature management, prevention of built-in VPN and IP protection, and correct application of browser homepage and start page policies. Other fixes include resolution of layout issues with graphics (SVG), crash prevention for security keys and WebAuthn features, and improved handling of web page printing and website error pages. Additionally, the build process is updated to be compatible with clang-based building on Leap, with the necessary libraries specified. [Linux]
PHP 8.5.5: This minor version bump from the 8.4 series brings numerous bug fixes across the core, DOM, Opcache, and OpenSSL modules. Notable fixes address JIT compiler arithmetic errors, memory leaks, and use-after-free vulnerabilities. The package now requires libcapstone as a dependency.
nano 9.0: This is a major version bump for the popular terminal text editor. The release improves horizontal scrolling, changes how macro recording is handled, and brings other usability refinements that build on the 8.x series.
iproute2 7.0: A major version bump for the Linux network configuration toolkit. New features include CAN XL support and DPLL mode setting, both of which extend networking and timing capabilities for newer hardware platforms.
iw 6.17: This wireless configuration tool sees a significant jump from 6.9. It adds support for WPA3 SAE association, EHT rate and bitrate handling for Wi-Fi 7, multi-radio RTS configuration, and endianness fixes across the wireless stack.
GIMP 3.2.4: This minor update to the GNU Image Manipulation Program continues the 3.2 series with bug fixes and incremental improvements following the 3.2.2 release.
xterm 407: New private modes for UTF-8 and character width reporting are introduced, and Unicode handling and window resizing functionality are improved.
gnome-remote-desktop 50.1: This minor update to the GNOME 50 release fixes a black-screen issue when using NVIDIA GPUs.
Key Package Updates
Linux kernel 6.19.11 - 7.0.2: The 7.0.2 update fixes an SMB client out-of-bounds read in smb2_ioctl_query_info, DACL validation in cifsacl, and directory separator handling in SMB1 UNIX mounts. F2FS receives multiple fixes including a use-after-free in f2fs_compress_write_end_io() and f2fs_write_end_io(), a memory leak in f2fs_rename(), and improved sanity checks. FUSE fixes several issues including rejection of oversized dirents in page cache, aborting on fatal signals during sync init, and ensuring device file initialization before cloning. A TOCTOU race in net/packet on mmap’d vnet_hdr in tpacket_snd() is corrected, and crypto fixes address async decrypt skipping hash verification in krb5enc and failed PSP command handling in the CCP driver. The 7.0.1 version sees KVM SEV receive several hardening fixes including locking all vCPUs when synchronizing VMSAs for SNP launch finish, disallowing LAUNCH_FINISH if vCPUs are actively being created, and protecting sev_mem_enc_register_region() with proper locking. Multiple use-after-free bugs are resolved across subsystems including bcache (crash in cached_dev.sb_bio), ocfs2 (fault handling with VM_FAULT_RETRY), the em28xx media driver, blk-cgroup writeback, and ALSA 6fire on USB disconnect. The 6.19.11 update brings several BPF fixes including reset of register ID for BPF_END value tracking, constant blinding for PROBE_MEM32 stores, undefined behavior in interpreter sdiv/smod for INT_MIN, and unsound scalar forking in maybe_fork_scalars(). CXL receives multiple corrections including a use-after-free of parent_port in cxl_detach_ep() and a leak in region construction. NVMe-PCI now caps queue creation to used queues, and platform support is expanded with several HP Omen and Victus laptops, OneXPlayer handheld variants, and Dell 14 Plus 2-in-1 keyboard support.
Mesa 26.0.4 & 26.0.5: The 26.0.4 out-of-schedule release combines bugfix updates and important raytracing fixes for an upcoming game. RADV corrects an invalid hitAttributeEXT value when using function-call RT pipelines, fixes a memory leak in radv_rt_nir_to_asm, and emits BOP events after every draw to work around a VRS bug on GFX12. RadeonSI fixes a missing ground texture and ANV (Intel) addresses flashing effects in Horizon Forbidden West. Nouveau fixes a segmentation fault in gm200_validate_sample_locations triggered by Firefox on GTX 1070 Ti, and NVK corrects barrier cache invalidation and viewport handling on Turing with FSR. The 26.0.5 follow-up is another bugfix release that refreshes the GL headers from libglvnd and disables Vulkan and Panfrost on armv6. Full release notes are available at the Mesa documentation site.
SQLite 3.53.0: A new Query Result Formatter library is introduced in this release for the popular embedded database, and ALTER TABLE is enhanced with additional capabilities. The jump from 3.51.3 also brings query planner refinements and incremental improvements that benefit any application linking against the system SQLite.
libxml2 2.15.3: A point release follow-up to the major 2.15 update. Multiple security fixes are included for type confusion, double-free, and use-after-free issues in the XML parser.
libpng16 1.6.57: A small but security-relevant point release that fixes a use-after-free in chunk setters tracked as CVE-2026-34757.
libjpeg-turbo 3.1.4.1: This update to the widely used JPEG codec includes multiple API hardening fixes and improved buffer handling, providing a more robust foundation for image-processing software across the system.
libarchive 3.8.7: A heap buffer overflow in CAB archive handling is fixed, along with a buffer overflow in the ISO9660 reader. As libarchive is used by package managers and archive tools across the distribution, this update is broadly relevant.
mozilla-nss 3.122.1: This release of the Network Security Services library brings 30+ bug fixes, including patches for multiple heap use-after-free, integer overflow, and ASN.1 parsing vulnerabilities that affect TLS handling in Firefox, Thunderbird, and other consumers.
pipewire 1.6.4: This audio and video pipeline server resolves segmentation faults, improves JACK compatibility, and corrects regressions in the RAOP (AirPlay) module.
SSSD 2.13.0: The pam_sss_gss module can now read SIDs from the Kerberos ticket PAC and apply authentication indicators via the new pam_gssapi_indicators_apply option, supporting Active Directory’s Authentication Mechanism Assurance (AMA). Active Directory Foreign Security Principals (FSP) are now properly detected and ignored when reading nested group members. Support for the KDE Plasma Login Manager is added. New options include avoid_by_id_lookups for preferring name-based lookups, and interactive/interactive_prompt for customizing OAuth2 prompting behavior. Cache performance is optimized for large deployments.
mpc 1.4.1: This complex-number arithmetic library steps from 1.3.1 to 1.4.1 and adds new functions including mpc_exp10, mpc_exp2, and mpc_log2. Sign handling for imaginary parts is improved and pkg-config generation is included.
leancrypto 1.7.2: This cryptographic library jumps from 1.6.0 and adds post-quantum primitives ML-DSA, SLH-DSA, and ML-KEM along with an X.509 fix tracked as CVE-2026-34610.
SELinux Policy 20260410: This update contains a wide range of policy refinements. Missing Nextcloud file contexts are added, the openSUSE /var/lib/php8 path and /srv/www/htdocs Apache DocumentRoot are properly labeled. Cloud-init is now allowed to domtrans into ssh-keygen, and accountsd gains proper D-Bus communication with systemd-homed along with corrected file context labeling for /usr/share/accountsservice. OpenSSH receives a policy adjustment allowing sshd-session to send a generic signal to sshd-auth. Polkit support is updated for its agent helper. Additional permissions are granted for staff and sysadm users, including reading PID1 process state, connecting to systemd-logind and lvm over Unix stream sockets, mounting /proc, and gaining sandboxing features. Virtualization policies gain several adjustments for virtqemud and virtnetworkd, and a new local_login_allow_accountutils_fallback_mode boolean is introduced. The snapper sdbootutil plugin is allowed to read kernel modules. The embedded container-selinux is updated to v2.247.0.
texinfo 7.3: The documentation format package adds new title-page commands, flexible node headings, and cross-reference features. texi2any gains major HTML speedups, optional C implementation, improved diagnostics, and defaults updates. HTML, Info, LaTeX, XML, and info tool receive enhancements and cleanups. The updated deprecated @clickstyle and removed old patches.
XZ Utils 5.8.3: This update fixes a buffer overflow in lzma_index_append() and an invalid memory access in xz when using --files and --files0 options. Arabic man page translations are added.
GTK4 4.22.2: The headline change is native SVG rendering via the new GtkSvg renderer, which drops the librsvg dependency entirely for icon and image rendering. The new renderer supports animations, state names, and SVG filters, with filters now operating in linear RGB by default. The GStreamer media backend now supports gapless looping with GStreamer 1.28, and gtk4-rendernode-tool gains a new filter command for node manipulation. Several drag-and-drop fixes are included, notably restoring the DropTarget::leave signal emission when a drop finishes. Vulkan handling is improved with fixes for SWAPCHAIN_MAINTENANCE checks, pending offset resets on Wayland, and invalid reads. Symbolic icon fallback rendering is corrected, dmabuf support now handles fewer fds than planes, and drop shadow rendering no longer darkens transparent textures. For Tumbleweed users, this brings major rendering architecture improvements and broad stability fixes to GTK4 applications.
webkitgtk3 and webkitgtk4 2.52.1: Numerous security vulnerabilities are patched across both releases. Touch scrolling for small movements is smoother, and scrollend events are now correctly emitted after scroll animations. Async scrolling is improved when the main thread is busy by rendering scrollbars from the scrolling thread. The GPU process is disabled by default in this cycle. A build option to disable USE_GSTREAMER is added for configurations without multimedia support.
Security Updates
-
CVE-2026-25645: Addresses an issue in Python allowing a local attacker to pre-create malicious files that could be reused and loaded without validation.
-
CVE-2026-4519: Fixes a command-line option injection in Python’s
webbrowser.open()where leading dashes in URLs could be interpreted as browser command-line arguments. -
CVE-2025-13462: Addresses an issue where Python’s tarfile module can cause crafted archives to be misinterpreted.
-
CVE-2026-4224: Resolves a stack overflow that could lead to a crash.
python-cryptography 46.0.7:
- CVE-2026-39892: Fixes a buffer overflow that can occurr when a non-contiguous buffer was passed to APIs accepting Python buffers.
w3m 0.5.6:
-
CVE-2023-38252: Fixes an out-of-bounds read that could allow a crafted HTML file to cause a denial of service.
-
CVE-2023-38253: Fixes an out-of-bounds read that could allow a crafted HTML file to cause a denial of service.
webkitgtk3 and webkitgtk4 2.52.1:
-
CVE-2025-43213: Fixes an issue where processing maliciously crafted web content could lead to an unexpected crash.
-
CVE-2025-43214: Addresses a flaw where processing maliciously crafted web content could cause an unexpected crash.
-
CVE-2025-43457: Resolves a vulnerability where processing maliciously crafted web content could lead to an unexpected crash.
-
CVE-2025-43511: Fixes an issue where processing maliciously crafted web content could lead to memory corruption.
-
CVE-2025-46299: Addresses a flaw in WebKit where processing maliciously crafted web content could lead to unexpected behavior.
-
CVE-2026-20608: Resolves a vulnerability where processing maliciously crafted web content could lead to memory corruption.
-
CVE-2026-20635: Fixes a WebKit flaw where processing maliciously crafted web content could cause an unexpected crash.
-
CVE-2026-20636: Addresses an issue where processing maliciously crafted web content could lead to memory corruption.
-
CVE-2026-20644: Resolves a WebKit vulnerability where processing maliciously crafted web content could lead to an unexpected crash.
-
CVE-2026-20652: Fixes an issue where processing maliciously crafted web content could cause memory corruption.
-
CVE-2026-20676: Addresses a WebKit flaw where processing maliciously crafted web content could lead to unexpected behavior or a crash.
-
CVE-2026-20643: Resolves a cross-origin issue in the Navigation API where processing maliciously crafted web content could bypass the Same Origin Policy.
-
CVE-2026-20664: Fixes a WebKit memory handling flaw where processing maliciously crafted web content could cause an unexpected process crash.
-
CVE-2026-20665: Addresses an issue where processing maliciously crafted web content could prevent Content Security Policy from being enforced.
-
CVE-2026-20691: Resolves an authorization flaw where a maliciously crafted webpage could be used to fingerprint the user.
-
CVE-2026-28857: Fixes a WebKit memory handling issue where processing maliciously crafted web content could cause an unexpected process crash.
-
CVE-2026-28859: Addresses a flaw where a malicious website could process restricted web content outside the sandbox.
-
CVE-2026-28861: Resolves a logic issue where a malicious website could access script message handlers intended for other origins.
-
CVE-2026-28871: Fixes a logic flaw where visiting a maliciously crafted website could lead to a cross-site scripting attack.
libcap 2.78:
- CVE-2026-4878: Addresses a race condition that could lead to local privilege escalation.
OpenJDK 25 25.0.3:
-
CVE-2026-22007: Fixes an information disclosure vulnerability in the Security component of Java SE that could allow a local attacker to read a subset of accessible data.
-
CVE-2026-22008: Addresses a flaw in the Libraries component of Java SE that could allow an unauthenticated network attacker to modify some accessible data.
-
CVE-2026-22013: Resolves an information disclosure vulnerability in the JGSS component of Java SE that could expose critical data to an unauthenticated network attacker.
-
CVE-2026-22016: Fixes an information disclosure flaw in the JAXP component of Java SE that could allow an unauthenticated attacker to access critical data via network protocols.
-
CVE-2026-22018: Addresses a denial-of-service vulnerability in the Libraries component of Java SE that could be triggered by an unauthenticated network attacker.
-
CVE-2026-22021: Resolves a denial-of-service flaw in the JSSE component of Java SE exploitable via HTTPS by an unauthenticated attacker.
-
CVE-2026-23865: Fixes a vulnerability in the bundled FreeType library that could allow memory corruption when processing crafted font data.
-
CVE-2026-34268: A patch was added for an information disclosure issue in the Security component of Java SE that could allow a local attacker to read a subset of accessible data.
-
CVE-2026-34282: Addresses a denial-of-service vulnerability in the Networking component of Java SE that could allow an unauthenticated attacker to cause a complete crash or hang.
Flatpak 1.16.6:
-
CVE-2026-34078: Fixes a sandbox escape where the portal accepted app-controlled symlinks in sandbox-expose paths, allowing arbitrary host file access and code execution in the host context.
-
CVE-2026-34079: Addresses a path traversal flaw that could allow an app to delete arbitrary files on the host.
libinput 1.31.1:
-
CVE-2026-35093: Fixes a code injection flaw where a local attacker could place a crafted Lua bytecode file in system or user configuration directories to bypass security restrictions and execute code with the privileges of the affected program.
-
CVE-2026-35094: Addresses a dangling pointer that could leak memory contents to system logs.
opensc 0.27.1:
-
CVE-2025-49010: Fixes a stack buffer overflow that could cause memory corruption.
-
CVE-2025-66215: Fixes a stack buffer overflow that could cause memory corruption. .
-
CVE-2025-66038: Addresses an out-of-bounds read that could lead to memory corruption during smart card processing.
-
CVE-2025-66037: Addresses an out-of-bounds heap read that could lead to denial of service.
-
CVE-2025-13763: Fixes several uses of potentially uninitialized memory in OpenSC detected by fuzzers.
XZ Utils 5.8.3:
- CVE-2026-34743: Fixes a heap buffer overflow in XZ Utils where decoding an empty Index left lzma_index in a state that caused undersized allocation in a subsequent lzma_index_append() call.
389ds 3.1.4+e2562f589:
- CVE-2025-14905: Fixes a heap buffer overflow caused by incorrect buffer size calculation that could potentially lead to denial of service or remote code execution.
openexr 3.4.9:
-
CVE-2026-34589: Fixes a heap out-of-bounds write that could lead to memory corruption.
-
CVE-2026-34588: Addresses a signed 32-bit overflow leading to out-of-bounds read/write.
-
CVE-2026-34380: Resolves a signed integer overflow that could allow bounds-check bypass during PXR24 decompression.
-
CVE-2026-34379: Fixes a misaligned write leading to undefined behavior.
-
CVE-2026-34378: Addresses a signed integer overflow in generic_unpack() when parsing EXR files with crafted negative dataWindow.min.x values.
-
CVE-2026-34543: Resolves a heap information disclosure that could cause uninitialized heap memory to leak into output pixel data.
-
CVE-2026-34544: Fixes a signed integer overflow that could lead to an out-of-bounds write and memory corruption.
evolution-data-server 3.60.0:
CVE-2026-2604: The advisory for this vulnerability indicates it involves an insecure local cache file removal.
SSSD 2.13.0:
- CVE-2026-6245: Fixes an out-of-bounds read in the PAM passkey responder.
glib2 2.88.0:
-
CVE-2026-23868: Fixes a vulnerability caused by a shallow copy that may lead to memory corruption.
-
CVE-2026-32776: Fixes a NULL pointer dereference when processing empty external parameter entity content.
-
CVE-2026-32777: Addresses an issue that could result in an infinite loop while parsing DTD content, potentially leading to a denial of service.
-
CVE-2026-32778: Resolves a NULL pointer dereference following an earlier out-of-memory condition.
sudo:
- CVE-2026-35535: Fixes a privilege escalation in sudo where a failed setuid, setgid, or setgroups call during the privilege drop was not treated as a fatal error.
CUPS 2.4.17:
-
CVE-2026-27447: Fixes a case-sensitivity vulnerability in user/group handling that could allow access bypass.
-
CVE-2026-34978: Addresses a directory traversal flaw in the RSS notifier.
-
CVE-2026-34979: Resolves insufficient memory allocation for job options that could lead to buffer issues.
-
CVE-2026-34980: Fixes incomplete control character filtering in option values.
-
CVE-2026-34990: Addresses missing certificate validation over loopback connections.
-
CVE-2026-39314: Resolves a job password range check flaw.
-
CVE-2026-39316: Fixes a scheduler subscription bug that could be abused to disrupt printing.
mozilla-nss 3.122.1:
- This release rolls up more than 30 fixes across the Network Security Services library, including patches for multiple heap use-after-free, integer overflow, and ASN.1 parsing vulnerabilities affecting TLS handling.
ruby4.0 4.0.3:
-
CVE-2026-41316: Fixes a vulnerability in the ERB component affecting
Marshal.loadoperations with untrusted data.
python-lxml 6.1.0:
-
CVE-2026-41066: Fixes an external entity injection (XXE) vulnerability in
iterparse()that could allow disclosure of local files or server-side request forgery.
- CVE-2026-4367: Addresses an out-of-bounds read when parsing crafted XPM image files that could lead to information disclosure or a crash.
- CVE-2026-6507: Fixes an out-of-bounds write in DHCP BOOTREPLY processing that could be triggered by a malicious DHCP server response.
libpng16 1.6.57:
- CVE-2026-34757: Fixes a use-after-free in chunk setters that could lead to memory corruption.
libarchive 3.8.7:
- Fixes a heap buffer overflow in CAB archive handling and a buffer overflow in the ISO9660 reader. Both flaws could be triggered by crafted archive files and are relevant given libarchive’s broad use across packaging and extraction tools.
libxml2 2.15.3:
- This release rolls up multiple security fixes including a type confusion issue, a double-free, and a use-after-free in the XML parser.
ImageMagick 7.1.2.19:
- CVE-2026-33905: Fixes a flaw that could be triggered by crafted images and lead to a crash or memory corruption.
-
CVE-2026-33535: Addresses an out-of-bounds write in X11 display interaction that could lead to a crash or potential code execution.
-
CVE-2026-26284: Fixes a heap overflow that could be triggered while processing crafted images.
leancrypto 1.7.2:
- CVE-2026-34610: Fixes an X.509 parsing flaw that could lead to certificate validation bypass.
openldap2 2.6.13:
- Addresses a heap buffer overflow in
parse_whspand a potential NULL pointer dereference, both of which could be triggered by malformed input to the LDAP server.
Users are advised to update to the latest versions to mitigate these vulnerabilities.
Conclusion
April 2026 was a busy month for openSUSE Tumbleweed with two of the largest desktop releases of the year landing back to back: GNOME 50 and KDE Gear 26.04.0. GTK4 4.22 introduced the new native GtkSvg renderer and dropped the librsvg dependency for icon rendering, while LibreOffice 26.2 brought a fresh major office suite. Developers received major version bumps across PHP 8.5, SQLite 3.53, iproute2 7.0, nano 9.0, and the iw wireless tool. Security continued to be a heavy theme with WebKitGTK, CUPS, Python, Flatpak, sudo, and OpenEXR all receiving multiple CVE fixes alongside a steady cadence of cryptographic library hardening from mozilla-nss, libgcrypt, and leancrypto.
Slowroll Arrivals
Please note that these updates also apply to Slowroll and arrive between an average of 5 to 10 days after being released in Tumbleweed snapshot. This monthly approach has been consistent for many months, ensuring stability and timely enhancements for users. Updated packages for Slowroll are regularly published in emails on openSUSE Factory mailing list.
Contributing to openSUSE Tumbleweed
Stay updated with the latest snapshots by subscribing to the openSUSE Factory mailing list. For those Tumbleweed users who want to contribute or want to engage with detailed technological discussions, subscribe to the openSUSE Factory mailing list . The openSUSE team encourages users to continue participating through bug reports, feature suggestions and discussions.
Your contributions and feedback make openSUSE Tumbleweed better with every update. Whether reporting bugs, suggesting features, or participating in community discussions, your involvement is highly valued.
Tux Manager the Linux Clone of Windows Task Manager
Invest in your identity
I have 30 years of documented history on the web and in my personal recordings. That defines very well who I am, what I do, how I see the world, and how people see me. I worked on that. Sometimes consciously, sometimes as a side effect of my job, my side projects, my community work. Now that AI agents make it easy to use this kind of material, I have a base to anchor them, to build on what I did before and accelerate what I do, still staying me.
If you are starting now, you won't have this body of material to anchor your agents. So do spend some time building this corpus of what is genuinely you. Don't let an AI generate what you are. Write yourself, publish, think through your thoughts, give presentations. Small things are fine. They will accumulate over time.
Of course, tools will shape part of your identity. I used to do my presentations with xfig, printed on overhead projector slides. This was painful, but it shaped quite a bit how I worked and how the result looked. So it is part of my identity. The technical constraints did influence how I spoke, how I presented. It also shaped what I presented, because there was a bias toward what I could show with the tools available to me.
This won't be different with AI. It will shape who you are. But be aware, and make sure that there is a signal from the human in there. It's ok if it's imperfect, if it's a bit weird. It's ok if it's different. But make sure it's yours.
Shape that signal. That's you. That's your identity.
Linux Saloon 199 | Ubuntu 26.04
SUSE responds to the copy.fail vulnerability
Copy Fail (tracked as CVE-2026-31431) is a critical vulnerability in the Linux kernel that allows a local non-root user to gain full root access to the system. It is considered extremely dangerous because it is a pure logic error – unlike other known holes like Dirty Pipe or Dirty COW, it does not require complex […]
The post SUSE responds to the copy.fail vulnerability appeared first on SUSE Communities.
openSUSE Asia Summit 2026 Call for Speakers
We are excited to announce that the Call for Speakers for openSUSE.Asia Summit 2026 is now open! This year, the Summit will take place on October 3–4, 2026, at the Teaching Industry Learning Center (TILC), Vocational School, Universitas Gadjah Mada (UGM), Yogyakarta, Indonesia. For more details, stay tuned to our official channels and news portal.
The openSUSE.Asia committee invites speakers from all backgrounds to share their knowledge, experience, and passion for openSUSE and open source. Speakers may also apply for support from the openSUSE Travel Support Program (TSP). We encourage everyone, near or far, to submit their proposals and join us in Yogyakarta!
Topics
The examples of the topics (not limited to) are as the following:
- openSUSE (e.g., Leap, Tumbleweed, Micro OS, Open Build Services, openQA, YaST)
- Desktop environments and applications (e.g., GNOME, KDE, XFCE)
- Office suite, graphic art, multimedia (e.g., LibreOffice, Calligra, GIMP, Inkscape)
- Multilingualization support (e.g., input methods, translation)
- Cloud, Virtualization, Container, and Container Orchestration (e.g., Kubernetes, Rancher)
- Package supply-chain security, vulnerability management
- Embedded and IoT
- Other applications running on openSUSE
Topics that are not related to a specific technology are also welcome. For example:
- An overview of FLOSS technologies
- Development, Quality Assurance, Translation
- Tips & Tricks, Experience stories (success or fail), Best practice
- Marketing and community management
- Education
Types of sessions
We are inviting proposals for these two types of sessions.
- Long talks with presentation (45 min. + Q&A)
- Short talks with presentation (30 min. + Q&A)
Lighting talk sessions (5 min.) will be announced later.
Schedule
- Proposal submission deadline: 1 July, 2026
- Notification to speakers: 21 July, 2026
How to submit your proposal document
Please submit your proposal at events.opensuse.org. If you do not have a SUSE community account, please sign up before submitting your proposal.
- You must follow the openSUSE Conference Code of Conduct.
- Your proposal should be written in English, between 130 and 250 words, and have a clear, relevant title.
- Please check for spelling and grammar before submitting, using tools like LibreOffice, Google Docs, or Grammarly.
- See our guide for tips on writing a great proposal.
- If you need help, contact committee members in your country or region.
Requirements for your presentation
- You may present in English or Bahasa Indonesia, but all documents and slides must be in English.
- Speakers must be present at the venue; prerecorded videos and remote presentations are not allowed.
SELinux: Policy Packaging Migration to support Snapshots and Rollbacks
Table of Contents
- 0) TL;DR
- 1) Introduction
- 2) Issues with current SELinux policy packaging
- 3) Solution: migration from /var to /etc
- 4) Troubleshooting
- 5) Closing Remarks
- 6) References
0) TL;DR
- The SELinux policy packaging had long-standing issues on systems using BTRFS
snapshots: files under
/var/lib/selinuxwere not covered by snapshots and could not be rolled back. - These files have now been migrated to
/etc/selinux, which allows the SELinux policy to be fully covered by snapshots. - The migration applies to openSUSE Tumbleweed and MicroOS systems using SELinux.
- The migration is transparent to the user and automatic on default setups. If you have a non-standard filesystem setup, or if you observe issues, read the full post below.
1) Introduction
SELinux has been the Mandatory Access Control mechanism on openSUSE distributions such as MicroOS and Leap Micro since 2022, and most recently openSUSE Tumbleweed switched the default MAC to SELinux in February 2025.
The files installed on a system by the SELinux policy package have traditionally
been split between /var/lib/selinux, /usr/share/selinux and /etc/selinux
on most Linux distributions, including openSUSE. The separation across these
directory trees conflicts with the modern Linux concept of atomic/image-based
updates, which in openSUSE has been implemented as a snapshot and rollback
mechanism based on BTRFS. This mechanism only snapshots
the /usr and /etc trees, intended for packages and configuration
respectively. Other directory trees are meant for user files or, as in the case
of /var, for mutable system state files, and as such are not covered by
snapshots.
Installing SELinux policy files under /var violates this requirement, and can
result in inconsistency in case of rollbacks: policy files under /etc and
/usr would be rolled back, but files under /var would not be touched.
To resolve this issue, we have migrated SELinux policy files under /var to
/etc. The migration is automatic and does not require any user interaction in
standard setups. This blog post explains the issue in more detail, documents the
steps taken to migrate the files, and describes known issues and how to resolve
them.
2) Issues with current SELinux policy packaging
Atomic/image-based update systems have become increasingly relevant in recent years. In openSUSE, this concept has been realised as both fully transactional systems (e.g. MicroOS, Leap Micro) and as regular distributions with automatic snapshots and the possibility to rollback broken updates (e.g. Tumbleweed). In both of these cases, the traditional SELinux policy packaging causes some issues.
In case of a rollback of an update containing a change to the SELinux policy, if
there is a mismatch between what was rolled back (/usr/share/selinux and
/etc/selinux) and what could not (/var/lib/selinux), this could lead to
policy build issues, external module installation issues, and could bring the
SELinux policy and the whole system into a state which is difficult to recover
from automatically.
In practice, these issues are very rare, since they require a particular set of circumstances:
- installing a policy update which contains backwards-incompatible changes (e.g. adding or removing SELinux types, attributes, modules …)
- rolling back this update
- performing some action which requires the SELinux policy items affected by the rollback, such as rebuilding the policy or an affected external policy module (either manually or e.g. via RPM package installation).
As a matter of policy, these kinds of backwards-incompatible policy updates are never performed on distributions such as Leap Micro (except possibly during migration between major distribution versions), thus preventing the issue. On Tumbleweed and MicroOS these updates can happen, albeit rarely, and when combined with the probability of a rollback and the further triggering actions they become exceedingly rare.
Manually reinstalling the SELinux policy package (and any affected external policy modules) is sufficient to fix the issues, but this is still an undesirable characteristic of this legacy packaging structure.
3) Solution: migration from /var to /etc
To permanently address the aforementioned issues, we decided to migrate SELinux
policy files under /var/lib/selinux to /etc/selinux. As mentioned, this
location was already used for other SELinux policy files, and is covered by the
snapshot and rollback mechanism.
The migration was tracked in bsc#1221342. After a long period of automated and manual testing over the past few months, the migration will be performed in an upcoming Tumbleweed snapshot.
Some of the challenges encountered during the implementation of the migration process were:
- different rollback and update behaviour on classical and transactional systems (also transactional-update before version 5 used overlayfs for /etc)
- preserving existing local modifications to the SELinux configuration
- migrating custom modules (installed by packages or manually created by the user)
- packaging changes or rebuilds of some packages to properly reflect location changes, including RPM SELinux macros
- cleanup of
/var/lib/selinuxonce no snapshot is using the old path - installation on a fresh system, without migrating an existing system
- observability of discrepancies between migrated modules in
/etc/selinuxand last pre-migration state in/var/lib/selinux
The migration process is automatic and in most situations will not be visible
to the user, except for information printed in the zypper output during the
update. The process takes care not only of the migration of policy
modules provided by the system SELinux policy (e.g. selinux-policy-targeted),
but also of custom modules installed by other packages (see below) and local
modifications to SELinux configuration (booleans, users, ports, …).
To allow the migration to be fully reverted, the process temporarily preserves
the “old” /var/lib/selinux/ directory tree even after the migration. Once no
snapshots are found which still refer to /var/lib/selinux, the whole directory
tree is safely deleted.
Most of the steps are done during package update, except for the final cleanup step which is performed on the system after the migration has been completed. During package update, the migration process will:
- print information about the migration process and inform the user if the
system satisfies the migration requirements (root BTRFS subvolume present) or
if a non-standard setup was detected (e.g.
/etcon different BTRFS subvolume or no BTRFS at all), and what to do in this case. - check if the system has already been migrated and skip migration in this case
(using marker files in
/etc/selinux/selinux_modules_migrated-*) - backup the old location (
/var/lib/selinux) to preserve state (marker filesselinux_modules_pending-*andtemp_selinux_modules_dir_created) - install package (modules) into the new location (
/etc/selinux) - copy local changes and custom modules (
*.localfiles,200,400anddisabledfolders) from the old location to the new location, show diff in case of missing custom modules from/etc/selinux(marker fileselinux_modules_migrated-*) - install cleanup systemd service (
cleanoldsepoldir.service) and script(/usr/libexec/selinux/cleanoldsepoldir.sh) to remove the old/var/lib/selinuxlocation once no snapshot is using it
After package update:
- at boot, the
cleanoldsepoldirservice checks if any snapshot still requires/var/lib/selinux. If not, it removes the directory, and creates marker filevar_lib_selinux_deletedto stop thecleanoldsepoldirservice from running again. - the cleanup script also allows the user to check if there are some custom SELinux modules missing in the new location, and has some heuristics to find the RPM packages of non-migrated modules to reinstall them
$ /usr/libexec/selinux/cleanoldsepoldir.sh -h
This script checks if it is safe to remove the old /var/lib/selinux directory.
Usage:
/usr/libexec/selinux/cleanoldsepoldir.sh (Checks snapshots and deletes /var/lib/selinux if safe)
/usr/libexec/selinux/cleanoldsepoldir.sh --check-custom-selinux-modules (Checks for unmigrated custom modules)
/usr/libexec/selinux/cleanoldsepoldir.sh -h|--help (Displays this help message)
Packages involved in the migration
These packages contain the SELinux policy packaging and were the main object of the migration:
-
libsemanage-conf(store-root set to/etc/selinux/semanage.conf) -
selinux-policy(servicecleanoldsepoldir.serviceand scriptcleanoldsepoldir.sh) -
selinux-policy-*(actual migration and marker files in/etc/selinux)
All packages which set SELinux booleans were rebuilt:
selinux-policy-targeted-gamingselinux-policy-sapenablementcontainer-selinuxlibvirt
Packages which ship custom SELinux modules were also fixed and rebuilt:
cockpit-ws-selinuxdrbd-selinuxgoogle-guest-oslogin-selinuxswtpm-selinuxtigervnc-selinuxtpm2.0-abrmd-selinux
We tried to identify all packages affected by this migration, but if you should find other packages in Tumbleweed which need to be migrated, please report a bug.
4) Troubleshooting
- If you have a non-standard filesystem setup (e.g. using custom BTRFS
subvolumes, not using BTRFS at all, …) the migration may not work for you
fully. You can find out if the migration was successful by checking for the
presence of the directory
/etc/selinux/selinux_modules_migrated-*corresponding to your installed policy (e.g./etc/selinux/selinux_modules_migrated-targeted). If the directory exists, the migration has been successful. If not, please open a bug. - If you observe any issues resembling those described in Section
2, you can resolve them by
reinstalling the
selinux-policy*package and any affected external modules:$ sudo zypper in -f selinux-policy selinux-policy-targeted - After the migration, only the last state of
/var/lib/selinuxis preserved, which means that some older snapshots may still be inconsistent with it. If rolling back to one of these older snapshots is necessary, you can fix the issues after rolling back by reinstalling the policy and any affected external modules as detailed above.
5) Closing Remarks
The openSUSE SELinux team is committed to keeping openSUSE users safe with SELinux, and to fixing problems that SELinux may cause to the community. To facilitate changes with SELinux we rely on users to work with us and provide feedback, so that we understand what the current problematic areas are. If you encounter problems with SELinux feel free to open a bug or reach out over the mailing list.
6) References

