sslh: Remote Denial-of-Service Vulnerabilities
Table of Contents
- 1) Introduction
- 2) Overview of sslh
- 3) Security Issues
- 4) Other Findings and Remarks
- 5) Resilience of
sslhAgainst High Network Load Attacks - 6) Summary
- 7) Timeline
- 8) References
1) Introduction
sslh is a protocol demultiplexer that allows to provide
different types of services on the same network port. To achieve this, sslh
performs heuristic analysis of the initial network data arriving on a
connection, and forwards all further traffic to a matching service on the
local system. A typical use case is to serve both SSL and SSH connections
(hence the name) on port 443, to accommodate corporate firewall restrictions.
In April 2025 we conducted a review of sslh, mostly due to the fact that
it processes all kinds of network protocols and is implemented in the C
programming language, which is known to be prone to memory handling errors.
For this review we looked into release v2.2.1 of
sslh. Bugfixes for the issues described in this report can be found in
release v2.2.4.
The next section provides an overview of
the sslh implementation. Section 3)
describes two security relevant Denial-of-Service issues we discovered during
our review. Section 4) discusses some
non-security relevant findings and remarks we gathered during our review.
Section 5) looks into the general resilience
of sslh against high network load attacks. Section 6) provides a summary of our assessment of
sslh.
2) Overview of sslh
sslh implements so-called probes to determine the type of
service when a new TCP or UDP session is initiated. These probes inspect the
first few bytes of incoming data until a positive or a negative decision can
be made. Once a specific service type has been determined, all following
traffic will be forwarded to a dedicated service running on localhost, without
interpreting further data. sslh will only probe for those protocols that are
actively configured, no other probes will be
invoked without need.
sslh supports three different I/O models for handling network input. The
choice of what model to use is made at compile time, which is why there
can exist multiple sslh binaries, one for each I/O flavor. The following
models exist:
- a fork model implemented in
sslh-fork.c. In this model, a separate process is forked for each newly incoming TCP connection. The forked process obtains ownership of the TCP connection, handles related I/O, and exits when the connection ends. UDP protocols are not supported in this model. - a select model implemented in
sslh-select.c. In this model, file descriptors are monitored in a single process using theselect()system call. This model also supports UDP protocols: for this purpose, all data originating from the same source address are considered to be part of the same session. A dedicated socket is created for each new sessionsslhdetects. - an implementation based on libev implemented in
sslh-ev.c. This variant outsources the I/O management details to the third party library. This also supports UDP protocols in a similar way to the select model described earlier.
The different probes implemented in sslh were one of the focus areas during
our review. sslh runs with lowered privileges and systemd hardenings
enabled, thus privilege escalation attack vectors will only have limited
impact. An area that is still important in spite of these protections is
Denial-of-Service, which we looked into as well.
3) Security Issues
3.1) File Descriptor Exhaustion Triggers Segmentation Fault (CVE-2025-46807)
As part of our investigation of Denial-of-Service attack vectors, we looked
into what happens when a lot of connections are created towards sslh and, as
a result, file descriptors are exhausted. While the sslh-fork variant
manages file descriptor exhaustion quite well, the other two variants have
issues in this area. This especially affects UDP connections that need to be
tracked on application level, since there is no concept of a connection on
protocol level.
For each connection, sslh maintains a timeout after which the connection is
terminated if the type of service could not be determined. The sslh-select
implementation only checks UDP timeouts when there is network activity,
otherwise the file descriptors that are created for each UDP session stay
open. Due to this, an attacker can create enough sessions to exhaust the
1024 file descriptors supported by default by sslh, thereby making it
impossible for genuine clients to connect anymore.
Even worse, when the file descriptor limit is encountered, sslh crashes with
a segmentation fault, as it attempts to dereference
new_cnx, which is a NULL pointer in this case. Therefore,
this issue represents a simple remote Denial-of-Service attack vector. The
segmentation fault also happens when the admin configures the
udp_max_connections setting (or command line switch), as the NULL pointer
dereference is reached in this context as well.
To reproduce this, we tested the openvpn probe configured for UDP. On the
client side we created many connections where each connection only sends a
single 0x08 byte.
We did not check the sslh-ev implementation very thoroughly, because it
depends on the third party libev library. The behaviour is similar to the
sshl-select variant, though. UDP sockets are seemingly never closed again.
Bugfix
Upstream fixed this issue in commit ff8206f7c which is part
of the v2.2.4 release. While the segmentation fault
is fixed with this change, UDP sockets potentially still stay open for a
longer time until further traffic is processed by sslh, which triggers the
socket timeout logic.
3.2) Misaligned Memory Accesses in OpenVPN Protocol Probe (CVE-2025-46806)
In the UDP code path of is_openvpn_protocol(), if
clauses like this can be found:
if (ntohl(*(uint32_t*)(p + OVPN_HARD_RESET_PACKET_ID_OFFSET(OVPN_HMAC_128))) <= 5u)
This dereferences a uint32_t* that points to memory located 25 bytes after
the start of the heap allocated network buffer. On CPU architectures like ARM
this will cause a SIGBUS error, and thus represents a remote DoS attack vector.
We reproduced this issue on a x86_64 machine by compiling sslh with
-fsanitize=alignment. By sending a sequence of at least 29 0x08 bytes, the
following diagnostic is triggered:
probe.c:179:13: runtime error: load of misaligned address 0x7ffef1a5a499 for type 'uint32_t', which requires 4 byte alignment
0x7ffef1a5a499: note: pointer points here
08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08
^
probe.c:185:13: runtime error: load of misaligned address 0x7ffef1a5a49d for type 'uint32_t', which requires 4 byte alignment
0x7ffef1a5a49d: note: pointer points here
08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08
Bugfix
The usual fix for this problem in protocol parsing is to memcpy() the
integer data into a local stack variable instead of dereferencing the pointer
into the raw network data. This is what upstream did in commit
204305a88fb3 which is part of the
v2.2.4 release.
4) Other Findings and Remarks
4.1) Missing Consideration of Short Reads on TCP Streams
A couple of probes don’t consider short reads when dealing with the TCP
protocol. For example in is_openvpn_protocol() the
following code is found in the TCP code path:
if (len < 2)
return PROBE_AGAIN;
packet_len = ntohs(*(uint16_t*)p);
return packet_len == len - 2;
If less than two bytes have been received, then the function indicates
PROBE_AGAIN, which is fine. After the supposed message length has been
parsed into packet_len, the probe only succeeds if the complete message has
been received by now, otherwise the function returns 0 which equals
PROBE_NEXT.
Similar situations are found in
is_teamspeak_protocol() and
is_msrdp_protocol(). While it may be unlikely that such
short reads occur often with TCP, it is still formally incorrect and could
lead to false negative protocol detection in a number of cases.
Bugfix
Based on experience upstream believes that this is not an issue in practice currently, since no bug reports in this area have appeared. For this reason this is not a priority for upstream at the moment.
4.2) Likelihood of False Positive Probe Results
A couple of probe functions rely on very little protocol data to come to a
positive decision. For example is_tinc_protocol()
indicates a match if the packet starts with the string " 0". In
is_openvpn_protocol() any packet that stores the
packet length in the first two bytes in network byte order is considered a
match, which is probably the case for quite a few network protocols.
Security-wise this is not relevant, because the services these packets are
being forwarded to have to be able to deal with whatever data is sent to them,
even if it is destined for a different type of service. From a perspective of
correct probe implementation it could lead to unexpected behaviour in some
situations, however (especially when a lot of protocols are multiplexed over
the same sslh port). We suggested upstream to try and base probe decisions
on more reliable heuristics to avoid false positives.
Bugfix
Similar to section 4.1) upstream does not believe that this is a major issue for users at the moment, hence there are no immediate changes to the code base to address this.
4.3) Parsing of Potentially Undefined Data in is_syslog_protocol()
The following code is found in is_syslog_protocol():
res = sscanf(p, "<%d>", &i);
if (res == 1) return 1;
res = sscanf(p, "%d <%d>", &i, &j);
if (res == 2) return 1;
The sscanf() function does not know about the boundaries of the incoming
network data here. Very short reads like a 1 byte input will cause sscanf()
to operate on undefined data, found in the buffer allocated on the heap in
defer_write().
Bugfix
For a quick bugfix we suggested to explicitly zero terminate the buffer by
allocating an extra byte after the end of the payload. Running sscanf() to
parse integers found in untrusted data could be considered a bit on the
dangerous side, however, thus we suggested to generally try and change this
into more careful code.
Upstream fixed this in commit ad1f5d68e96, which is part of the v2.2.4 release. The bugfix is along the lines of our suggestion and also adds an additional sanity check for the integer which is parsed from the network data.
5) Resilience of sslh Against High Network Load Attacks
A general-purpose network service like sslh can be sensitive to resource
depletion attacks, such as the aforementioned file
descriptor exhaustion issue. The sslh-fork implementation spawns a
new process for each incoming TCP connection, which brings to mind the
possibility to consume excessive resources not only on a per-process scope,
but also on a system-wide scope. By creating a large amount of connections
towards sslh, a “fork bomb” effect could be
achieved. When a “fork bomb” is executed locally on Linux then this often
still causes an inaccessible system even today, when there are no strict
resource limits in place. Achieving something like this remotely would be a
major DoS attack vector.
sslh-fork implements a timeout for each connection, which is based on the
select() system call. If the probing phase does not come to a decision
before the timeout occurs, then the connection is closed again. By default
this timeout is set to five seconds. Since sslh-fork creates a new process
for each newly incoming connection, there is no limit of 1024 file descriptors
being opened by sslh. In theory an attacker could attempt to exceed the
system-wide file descriptor and/or process limit by creating an excessive
amount of connections.
The default timeout enforcement of five seconds means that the attack is quite
limited, however. During our tests we were not able to create more than about
5,000 concurrent sslh-fork processes. This creates quite a bit of system
load, but does not expose any critical system behaviour on an average machine.
Even though the current situation is acceptable, it could be considered to offer
an application level limit for the amount of parallel connections. For UDP
there exists a udp_max_connections setting already, but not for TCP.
Bugfix
In discussions with upstream it was agreed that proper protection from
such Denial-of-Service attacks is best achieved on the end of the
administrator, who can for example configure Linux cgroup constraints.
Upstream is still considering to add a tcp_max_connections setting to limit
the maximum amount of parallel TCP connections in the future.
6) Summary
Overall we believe sslh is in good shape. There is little attack surface, and
hardenings are in place by default. With the two remote DoS vectors 3.1) and
3.2) fixed, it should be safe to use sslh in
production. Users that are worried about more complex DoS attacks should
additionally consider customizing their setup to enforce resource consumption
limits on operating system level.
There is some danger of false positive or false negative probe outcomes as
outlined in sections 4.1) and 4.2). These seem not to have occurred a lot
in practice yet, and it is a trade-off towards simplicity and efficiency in
the current implementation of sslh.
7) Timeline
| 2025-04-25 | We privately reported the findings to the author of sslh by email, offering coordinated disclosure. |
| 2025-05-06 | We discussed details about the reported issues and possible CVE assignments. The issues were kept private for the time being. |
| 2025-05-08 | We assigned two CVEs from our pool for the issues and shared them with upstream. |
| 2025-05-25 | The upstream author informed us about bugfixes that have already been published in the sslh GitHub repository and about an upcoming release containing the fixes. |
| 2025-05-28 | Release v2.2.4 containing the fixes was published. |
| 2025-06-13 | We published this report. |
8) References
- sslh GitHub project
- SUSE Bugzilla review bug for sslh
-
sslhrelease v2.2.1 (reviewed version) -
sslhrelease v2.2.4 (fixed version)
Asia Summit Call For Host is Here
openSUSE.Asia Summit 2026: Call For Host
The openSUSE.Asia Summit is an annual conference that brings together openSUSE contributors and enthusiasts from across Asia. It serves as a valuable platform for face-to-face collaboration, knowledge sharing, and community building. The summit primarily highlights the openSUSE distribution, exploring its applications in both personal and enterprise environments, while also promoting the broader open source culture.
As part of its mission to promote openSUSE across Asia, the openSUSE.Asia Summit Organizing Committee invites local communities to take on the exciting challenge of hosting the 2026 summit. The committee is committed to supporting you every step of the way to ensure a successful and impactful event.
Important Dates
- August 1: Deadline for application
- August 30: Presentation at openSUSE.Asia Summit 2025
- October 31: Announcement of the following host
We will invite you to join our regular online meetings, giving you the opportunity to observe and learn the process of organizing the event. Additionally, you will be expected to present your proposal at the upcoming summit in Faridabad, India. The submitted proposals will be reviewed by the organizing committee. During this process, the committee may reach out with additional questions or requests for further information.
How to Submit?
Please email your proposal to both summit@lists.opensuse.org and opensuseasia-summit@googlegroups.com. Because the former address does not allow attachments, you need to upload your proposal somewhere and share the link to it.
The proposal should contain:
- Venue
- How to reach your city and venue
-
Budget Estimation
- Conference Venue
- T-shirt
- Tea break, Lunch, Dinner, Conference Tour, etc.
- Introduction to your community who will organize the summit
- Introduction to your community that will organize the summit
Please refer to openSUSE.Asia Summit Tips for Organizers before writing your proposal.
We are looking forward to hearing from you soon!
Log Detective: Google Summer of Code 2025
I'm glad to say that I'll participate again in the GSoC, as mentor. This year we will try to improve the RPM packaging workflow using AI, as part of the openSUSE project.
So this summer I'll be mentoring an intern that will research how to integrate Log Detective with openSUSE tooling to improve the packager workflow to maintain rpm packages.
Log Detective
Log Detective is an initiative created by the Fedora project, with the goal of
"Train an AI model to understand RPM build logs and explain the failure in simple words, with recommendations how to fix it. You won't need to open the logs at all."
As a project that was promoted by Fedora, it's highly integrated with the build tools around this distribution and RPM packages. But RPM packages are used in a lot of different distributions, so this "expert" LLM will be helpful for everyone doing RPM, and everyone doing RPM, should contribute to it.
This is open source, so if, at openSUSE, we want to have something similar to improve the OBS, we don't need to reimplement it, we can collaborate. And that's the idea of this GSoC project.
We want to use Log Detective, but also collaborate with failures from openSUSE to improve the training and the AI, and this should benefit openSUSE but also will benefit Fedora and all other RPM based distributions.
The intern
The selected intern is Aazam Thakur. He studies at University of Mumbai, India. He has experience in using SUSE as he has previously worked on SLES 15.6 during his previous summer mentorship at OpenMainFrame Project for RPM packaging.
I'm sure that he will be able to achieve great things during these three months. The project looks very promising and it's one of the things where AI and LLM will shine, because digging into logs is always something difficult and if we train a LLM with a lot of data it can be really useful to categorize failures and give a short description of what's happening.
SELinux: finding an elegant solution for emulated Windows gaming on Tumbleweed
Table of Contents
- 1) Overview
- 2) Introduction to SELinux
- 3) The problem with emulating Windows games
- 4) Finding an elegant solution
- 5) Closing Remarks
- 6) References
1) Overview
OpenSUSE Tumbleweed recently switched to using SELinux by default. While generally well received, this change caused problems in particular when playing Windows games through Proton or Wine. This post will provide context and introduce the solution the openSUSE SELinux team came up with.
Section 2 gives an overview of SELinux and introduces the primitives necessary to understand the issue and solution. Section 3 takes a closer look at the root cause of the problem and the manual steps needed to work around the issue in the past. Section 4 discusses the requirements for a better solution and how it was implemented in the end. Section 5 closes with information on how to report SELinux bugs and how to reach the openSUSE SELinux team.
2) Introduction to SELinux
OpenSUSE Tumbleweed switched to SELinux as the default Mandatory Access Control mechanism for new installations in February 2025.
The central reason for the change was that we consider SELinux the more encompassing solution: security problems with a program do not pose a threat to the whole system, rather a system compromise can be confined to the affected program or daemon.
SELinux provides a powerful and detailed language to describe expected application behaviour. Allowing to confine a process, referred to as a SELinux domain, by limiting access to required system resources and describing the interaction with other domains. A large catalog of domains is already available via the upstream SELinux policy.
SELinux booleans
Common behaviour of a piece of software might be allowed by default for the domain, but very specific scenarios might be prohibited, especially when negatively impacting security. SELinux booleans provide a way for the user to enable such optional functionality in the SELinux policy.
To give an example: the Apache HTTP daemon is used to serve web pages. In
certain situations it might be needed that these webpages are stored in the user’s
home directory, but as a default it is not advisable that a network facing daemon
has access to the home directories. To address these different usage scenarios
a boolean called httpd_enable_homedirs exists. The user can turn on the boolean
if the HTTP daemon needs to access the home directories of users to serve web pages.
3) The problem with emulating Windows games
Playing Windows games on Linux with SELinux enabled did not work without manual intervention by the user.
This is related to the way Windows libraries have been developed and are used by emulation software.
To allow the software for emulating Windows games to work, for example Steam with Proton or
Lutris with Wine, a boolean called selinuxuser_execmod needs to be enabled:
sudo setsebool -P selinuxuser_execmod 1
But enabling this boolean has consequences for the general security of the system.
The user_selinux manpage states for selinuxuser_execmod:
If you want to allow all unconfined executables to use libraries requiring text relocation that are not labeled textrel_shlib_t, you must turn on the selinuxuser_execmod boolean.
But why exactly is the boolean problematic and required a manual change before? Executable stack is used by hackers as a building block in their exploitation techniques. A lot of research went into finding mitigation strategies to make it harder for malicious actors to run successful exploits. One central measure was Executable-space protection, and Text relocation touches a part of that mitigation. If the boolean is enabled it allows modification of the executable code portions of the affected libraries, and could result in successful exploitation of the processes using these libraries.
4) Finding an elegant solution
OpenSUSE Tumbleweed is a general-purpose Linux distribution, targeting a multitude of use cases, be it as a server, running on embedded devices, as container host or as a desktop system. Some Tumbleweed users require their desktop system to run emulations software for Windows games.
In general we try to take a Secure by Default approach when we take decisions affecting
security. For openSUSE Tumbleweed we decided to disable selinuxuser_execmod
by default, because we think it provides a risk to the security of the system if all
unconfined executables can use libraries with text relocation.
In software security we usually want to make it as hard as possible for malicious actors to exploit a target. Accomplishing this feat is not easy, because some attack scenarios rely on normal system behavior that can be used or exploited by attackers. An approach to mitigate this in defensive software security is a concept known as Defense in Depth, where different protective mechanisms are used to provide a layered defense, making a successful exploit as hard as possible.
A central requirement for a solution was not to cause a negative impact on the security of
other use cases, which do not require emulation of Windows games. Enabling selinuxuser_execmod
by default for all Tumbleweed installations was no option. It would take away a protection mechanism
and therefor weaken the Defense in Depth approach.
Manually setting the boolean was needed to get the emulation layer
for Windows to function properly. To arrive at that solution the user needed a
certain level of familiarity with the administration of SELinux. A transparent, but selective solution,
that would need no intervention from the user would be ideal to implement.
Implementation
We decided to introduce a new dependency to packaged gaming software in openSUSE Tumbleweed.
If a user installs the RPM version of Lutris or Steam, then the RPM selinux-policy-targeted-gaming
will now be installed as well, enabling the boolean on the user system automatically.
This solution improves usability for the users who install gaming software
and does not compromise the security of other use cases of the distribution.
A user preferring the Flatpak versions of Steam or Lutris can manually install the new package:
sudo zypper in selinux-policy-targeted-gaming
As we do not control the Flatpak applications, we can not add any dependencies to them. As an alternative the user can also still set the boolean manually.
5) Closing Remarks
The openSUSE SELinux team is committed to keeping openSUSE users safe with SELinux, and to fixing problems that SELinux may cause to the community. To facilitate changes with SELinux we rely on users to work with us and provide feedback, so that we understand what the current problematic areas are. If you encounter problems with SELinux feel free to open a bug or reach out over the mailing list.
6) References
Tackling performance issues caused by load from bots
In recent months, I observed an increase in performance issues with partial short outages, particularly of web applications performing expensive operations such as database or shell queries. The origin was always easy to map to an amount of requests larger than what some backend applications are able to handle. Whilst part of the requests do originate from legitimate users, a large amount is found to originate from obscure sources - particularly AI related crawlers seem to dominate. Whereas traditional search engine crawlers, which we do encourage to scan our websites to allow for more users to find them, scan with few requests spread over a long time frame, these new crawlers tend to issue thousands of requests, sometimes in less than a day. With multiple companies pursuing the same practices, this quickly adds up to requests and subsequently load which is not sensible to scale for, particularly given the lack of obvious benefit for the general public.
Over time I implemented various measures to reduce the amount of undesired requests based on the observed patterns, whilst aiming to maintain a stable experience for legitimate requests. These measures include rate limiting (with more fine grained limits for particularly "expensive" sites and paths), wide blocking of source networks from cloud providers and AI related companies, blocking of user agent patterns and blocking of "dumb" requests (for example, we stopped routing requests targeting various script file types to backends which do not speak the matching language). Monitoring did show these measures to help with reducing the immediate request load, however new patterns quickly emerged. A new phenomena are large amounts of requests spread over a large amount of different source networks. Especially with source networks identifying as serving residential traffic, blocking is not possible without risking the lockout of legitimate users. A new method needed to be found.
Of course, we are not the only organization affected by this. The recent influx of AI related crawlers impacting web services caused various operators to implement additional protections, and the most visible one to users are challenge websites, making the user land on an intermediate page before being redirected to the desired location. Whilst these come in various forms, I mostly observe ones asking for a captcha and ones computing a proof-of-work task in the client. The latter came particular popular with the release of Anubis [0], an open source software making it easy for operators to equip their website with a proof-of-work challenge protection. Anubis reached a certain level of fame by big websites deploying it and tech related news outlets talking about it. Most naturally, I looked into Anubis as a solution for our situation as well. The proof-of-work concept was particularly interesting, as automated challenges are less annoying to users and have less accessibility concerns than manual captcha based ones.
As for Anbuis, it acts as a reverse proxy and serves a pre-defined challenge website. It also ships with excludes for known-good search engine crawlers.
In our setup, which consists of internet-facing HAProxy servers routing traffic to backend application/web servers, this would introduce another proxy traffic would flow through. Upon discussion with @darix, we figured it would be beneficial to instead utilize SPOE, the HAProxy Stream Process Ofloading Engine, to "ask" Anubis to challenge problematic clients, but then to pass the result back to HAProxy to directly route the traffic as before. Following the upstream discussion we initiated, I prepared a patch for this [1] - as I was idling for a while before opening a PR, someone else picked up the work and improved upon it, bringing the implementation to a usable shape [2] - however, it has not yet been completed and merged by the time of writing. More importantly, also as part of the upstream discussion, a user suggested to swap out the Go library I used for the SPOP implementation in Anubis with a more performant one [3] - haproxy-go [4]. The same comment [3] lead me to discover the same user having developed a software similar to Anubis, which already implements the suggested library and specifically targets HAProxy native deployments: Berghain [5]. Whilst the user experience is similar to Anubis - one gets served a challenge website to complete an automated proof-of-work computation before being redirected to the desired location, the background implementation is different. It operates tightly integrated with HAProxy by utilizing the SPOE - first to construct a challenge for clients (that is, if a client is intended to be challenged, which is decided using standard HAProxy ACLs), then to verify the challenge response, which is stored in a cookie on the client. The challenge page (which is a combination of HTML, CSS, JS) itself is served directly by HAProxy from memory.
This seemed like what we were looking for:
- no additional reverse proxy, preservance of existing HAProxy based routing
- decision which clients to challenge using HAProxy ACLs, which we already use in our setup and can easily extend upon
- can be configured to not impact web service availability if the challenge service is offline
- easy branding using HTML + SCSS (Anubis in its default build does not allow for any branding - however they seem to have a version for paying customers and open source projects which allows to swap the imagery)
The project seemed to be in an early stage, with not much activity as compared to Anubis, however initial testing seemed promising. After opening an issue with a minor flaw, the upstream maintainer messaged me - as it turns out, they have similar ideas and are very nice to chat with. Over the last days, various improvements landed in Berghain - I contributed some patches [6], which were pleasantly reviewed and integrated, and the upstream maintainer helped as well, with answering questions in chat and solving bugs [7].
For branding, I made a fork [8] in which the sources of the web page are modified. An upstream discussion to decouple this, allowing theming to reside separately, was started [9], but ideas on achieving this are still pending. As the web sources are deemed to not change as often, the maintenance effort should not be too bad for the time being - I rebase our branch with the upstream one when there are changes, and add the customizations as a patch in our package [10].
With this, all seems to be set for deployment. However, there were some challenges (pun intended) which had to be considered:
- users should not be unnecessarily "annoyed"
=> cover websites and paths only selectively when there is need for additional protection due to excess application load - the challenge requires JavaScript, don't unnecessarily harm users which do not have JavaScript enabled, and, most importantly, don't break legitimate command line tooling and scripts
=> cover only websites and paths which would require JavaScript anyways (i.e. no API paths) - if the configured validity period expires while the user is filling out a form, accidental form resubmission might be triggered
=> cover only GET requests - legitimate search engine crawlers should not be inhibited
=> adapt lists of user agent + source network combinations from Anubis
These points were easily solved using HAProxy ACLs. Of course, the exemptions also leave more room for malicious actors to work around the protection. Whilst this is a concern, most bots are found to be "dumb", hence the enablement can be expected to significantly help with the current situation even with the constraints at hand. Over time, solutions allowing for tighter limitations might be investigated and developed. Particularly interesting was a discussion with the maintainer of Berghain which brought up some ideas to challenge clients without JavaScript, however there is no concrete plan for this yet.
With all that being said, the protection has now been deployed and enabled for two services [11] - including progress.opensuse.org, where you are reading this article right now. Enablement for more services will follow over time as needed, when needed.
With all the considerations which went into this implementation, I hope for the impact on legitimate users to be minimal. If you notice any undesired breakage as a result of this nonetheless, please do open an issue in our tracker [12] explaining the circumstances, and I will try to work out a solution.
[0] https://anubis.techaro.lol
[1] https://github.com/TecharoHQ/anubis/issues/236#issuecomment-2784919382
[2] https://github.com/TecharoHQ/anubis/pull/460
[3] https://github.com/TecharoHQ/anubis/issues/236#issuecomment-2801861198
[4] https://github.com/DropMorePackets/haproxy-go
[5] https://github.com/DropMorePackets/berghain
[6] https://github.com/DropMorePackets/berghain/issues?q=author%3Atacerus
[7] https://github.com/DropMorePackets/berghain/commit/6080b227008a759c267a973202cf2b4edff38e31, https://github.com/DropMorePackets/haproxy-go/commit/c1707895ddabaa9c11d4e0b99e2cba040a0a3330
[8] https://github.com/openSUSE/berghain
[9] https://github.com/DropMorePackets/berghain/issues/26
[10] https://build.opensuse.org/package/show/openSUSE:infrastructure/berghain
[11] https://progress.opensuse.org/projects/opensuse-admin/repository/salt/revisions/3257c222f1c92c96c1d3caaeb7c14604fefad54a
[12] https://progress.opensuse.org/projects/opensuse-admin/issues (in case of issues with using the tracker directly, create a ticket via admin@o.o)
Edit after 1 day:
it was suggested to attach some graphs showing how the load went down after this deployment - here are the graphs behind progress.o.o as an example (times in the graphs are in CEST):


Improvements To RPM Lint Results and Reviewing Submit Requests
Speakers Set Course for openSUSE Conference
The openSUSE Conference 2025 in Nuremberg from June 26 - 28 is shaping up to be a great gathering for the open source software community.
There are three packed days of presentations, workshops and discussion along with three keynotes.
This year’s conference features SUSE CEO Dirk-Peter van Leeuwen who will recognize the openSUSE community’s 20-year journey. Peer Heinlein, who founded the Heinlein Group, which includes companies like Heinlein Support, mailbox.org, OpenTalk, and OpenCloud, will provide another keynote on the same day and his talk will focus on the risks users face when using proprietary software. Another keynote from Tropic Square’s CEO Jan Pleskač will spotlight the growing need to extend open source hardware.
The conference is offering a broad look at where openSUSE is heading and what challenges are emerging for the project’s development and how the open-source communities can resolve them.
There are several sessions drawing attention like “Public Money? Public Code!” and a series of presentations addressing Cyber Resilience Act (CRA) and Network and Information Security 2 Directive (NIS2) readiness. These sessions explored how European cybersecurity regulations are impacting small to medium open-source vendors and what steps are needed to align with the evolving legal landscape.
On the technical side, integration and automation sessions continue. One talk demonstrated how Uyuni can be tightly woven into existing infrastructure management tools like Ansible and Terraform. Another session unveiled a tool called container-snap, a prototype designed to bring atomic OS updates through OCI images, which helps eliminate the risk of broken upgrades.
The Leap 16.0 Beta will have a dedicated session, and the future of SUSE Linux Enterprise will be discussed in a talk titled “From ALP to SLES16”.
Workshops on LLMs will show how to run large language models locally and turn them into functional agents and a popular penguin AI project called Kowalski should capture some attention at the conference.
Underlying many talks is a shared urgency around user empowerment. The “End of 10 Install Workshop” sessions are aimed at encouraging users to install openSUSE on aging or repurposed hardware based on Microsoft’s end-of-life date for Windows 10.
The full schedule of the openSUSE Conference 2025 is available at events.opensuse.org.
Deprecating Java-based drivers from syslog-ng: Is HDFS next?
While most Java-based drivers have been deprecated in syslog-ng years ago, we have recently removed all of them in preparation to syslog-ng 4.9.0. Right now, the only Java-based driver remaining is HDFS, so we want to ask the syslog-ng community if the HDFS destination is still needed for them.
Read more at https://www.syslog-ng.com/community/b/blog/posts/deprecating-java-based-drivers-from-syslog-ng-is-hdfs-next

syslog-ng logo
Tumbleweed Monthly Update - May 2025
May ended with a large update for openSUSE’s rolling release. While that snapshot addressed several Common Vulnerabilities and Exposures, more security fixes were introduced throughout the month.
May introduced qemu 10.0 with improved virtualization performance, KDE Plasma 6.3.5 with polished usability fixes, and GStreamer 1.26.1 with smoother media playback across desktop and embedded devices. Security took center stage with OpenSSL 3.5.0’s post-quantum cryptography support and kernel updates, which addresses speculative execution vulnerabilities. Whether you’re a developer, sysadmin, or daily desktop user, May’s snapshots deliver meaningful enhancements for a trusted Tumbleweed experience.
As always, be sure to roll back using snapper if any issues arise.
For more details on the change logs for the month, visit the openSUSE Factory mailing list.
New Features and Enhancements
qemu 10.0: This is a major leap forward for virtualization on openSUSE Tumbleweed and will benefit desktop users, developers and server admins alike. This update allows for better I/O performance for virtual machines by spreading work across multiple threads though the added multiqueue support to virtio-scsi. The Intel GPU passthrough (VFIO) is now better supported and helps users build more capable desktop virtual machines or development environments with hardware acceleration. Developers and embedded enthusiasts will be happy to know the update now supports new arm, LoongArch, RISC-V, HPPA boards and CPU features. Notable improvements include ARM’s EL2 timer emulation and support for new RISC-V extensions like smrnmi and supm. The QEMU Machine Protocol (QMP) documentation has been revamped for easier automation and scripting. This version also fixes build issues with GCC 15 and improves test reliability for openSUSE packaging. Be sure to check the deprecated features, especially for those running 32-bit hosts.
KDE Plasma 6.3.5: Plasma’s KWin window manager has bug fixes targeting crashes, rendering issues, HDR brightness control, tablet input reliability, and smoother screen dimming behavior. Discover improves how update information displays. The “Still Looking” indicator bug has been resolved for a smoother package search experience. Notification bubbles are now better padded and positioned. The weather widget now respects default units, the notes applet won’t misbehave with layout sizes, and task manager grouping visuals are more predictable. Dolphin won’t accidentally misplace interface elements, Plasma Vaults avoid build errors, and color scheme integrations in apps and applets use the correct styling for a more cohesive look.
GStreamer 1.26.1: This release improves media playback reliability, especially for streaming, subtitles, and camera input. If you use apps like GNOME Videos, OBS, or PipeWire-based systems, this update means fewer crashes and smoother performance. Notable fixes improve subtitle handling in H.264/H.265, A/V sync for V4L2 decoding, stability in WebRTC calls, better Matroska and MP4 support, and more accurate frame-rate detection. Developers also get better plugin loading on Windows and improved compatibility with newer Python and GObject versions. This update boosts multimedia experience across desktops, browsers, and embedded devices.
gimp 3.0.4: The update resolves a clipboard bug that caused pasted content to appear padded and ensures smoother behavior when monitors are disconnected or changed; this speeds up startup for users with large font libraries. Non-destructive filter workflows see improvements with better undo tracking and fewer visual artifacts. KDE Wayland users benefit from corrected icon rendering, and .ICO file support is fixed with a patch for the ZDI-CAN-26752 bug. Two now-upstreamed patches were dropped, keeping the package clean and current.
gnome-music 48.0: This update brings better compatibility with modern Python environments by dropping legacy specific workarounds and improving GLib integration. While not a feature-heavy update, it fixes backend issues related to introspection and ensures smoother startup and stability on current openSUSE Tumbleweed systems.
OpenSSL 3.5.0: This major update strengthens cryptographic security and modernizes TLS support for openSUSE Tumbleweed users. The default encryption for tools like req, cms, and smime now uses the stronger aes-256-cbc cipher instead of the outdated 3DES. TLS configuration is improved with support for post-quantum cryptography (PQC) key exchange methods like ML-KEM, which gives users a future-proof option that’s also faster than older methods. The release introduces QUIC server support (used in HTTP/3), which matters for developers building low-latency or streaming applications. Day-to-day, this improves system-wide crypto performance, enhances compatibility with modern web protocols, and strengthens encryption defaults. Users of secure tools like cURL, Git, or anything using OpenSSL-backed TLS benefit from better security and reduced CPU load on newer hardware.
KDE Gear 25.04.1: This update brings a focused wave of polish and stability, smoothing out workflows across key apps like Dolphin, Kdenlive and KDE Connect. File management is cleaner with improved theming and context menus in Dolphin, while Kdenlive benefits from a long list of crash fixes, layout refinements, and a less aggressive autosave. KDE Connect also fixes media crashes and improves navigation.
KDE Frameworks 6.14.0: This release improves system integration, accessibility, and app behavior across the KDE stack. Developers benefit from safer file handling in KArchive, drag-and-drop enhancements in KIO, improved high-contrast theme support in KColorScheme, and smoother Wayland clipboard operations in KGuiAddons. Kirigami receives layout fixes and scrolling improvements, while KWallet introduced support for KeePassXC password manager as a backend. Syntax highlighting gains new language definitions, including ACPI and RISC-V updates.
Key Package Updates
GTK4 4.18.5: This release improves overall desktop stability and responsiveness for Tumbleweed users. It resolves several crashes and bugs that could affect file chooser dialogs, accessibility tools, and input methods like XCompose, which provide important fixes for anyone using multilingual input or screen readers. A major performance issue related to Cairo blur rendering has been addressed, which benefits applications using shadows, transitions, or transparency. This update also smooths out behavior in apps like Epiphany and those built with gtkmm. The changes result in fewer surprises and smoother experiences across GNOME apps and custom GTK-based tools.
kernel-source 6.14.6 and 6.14.5: The 6.14.6 update includes protections against CVE-2024-28956, a newly identified speculative execution vulnerability affecting modern Intel CPUs. It introduces the ITS (Indirect Target Selection) mitigation mechanism and ensures safer handling of return and branch instructions during context switches. Several branch predictor hardening improvements were added and are important for embedded devices and containers using ARM64 hardware. A long-standing bug with some HP laptop mute LEDs is also resolved. The 6.14.5 release brings another round of bug fixes and driver updates that enhance system stability and compatibility on the rolling release. This update resolves edge-case crashes, memory leaks, and device compatibility issues across key subsystems like networking (MLX5, ENETC), Bluetooth, and CPU frequency scaling. Graphics users benefit from Intel Xe driver tuning and DRM fixes that improve performance and power management, while media hardware support continues to expand with updates for newer camera sensors. Filesystem integrity also improves with Btrfs and ceph fixes, which helps prevent data corruption in low-level edge scenarios.
curl 8.14.0: This release addresses two vulnerabilities affecting QUIC certificate verification with wolfSSL have been patched, ensuring proper validation and pinning (CVE-2025-4947, CVE-2025-5025). The release also adds support for OpenSSL + ngtcp2 QUIC combinations and introduces new TLS options like CURLOPT_SSL_SIGNATURE_ALGORITHMS. MQTT connections now send pings at upkeep intervals, and users can disable auto-pong replies for WebSockets. This update reinforces both curl’s stability and its evolving network protocol support.
AppStream 1.0.5: This brings improvements that help software centers and package managers like GNOME Software or Discover show richer and more accurate metadata to users. This update enhances how screenshots, icons and descriptions are validated and interpreted, helping app developers ensure their software listings look polished and follow consistent standards. Tumbleweed users should see better visual consistency in software listings, fewer glitches in app stores, and improved metadata quality across repositories.
fwupd 2.0.9: This library improves firmware update reliability and broadens hardware compatibility is a meaningful upgrade for users who rely on secure and seamless firmware management in openSUSE rolling release. Key improvements include better support for updating the UEFI Key Exchange Key (KEK) and signature database (db), now allowing multiple certificates to be installed at once, which are essential for maintaining secure boot integrity. For developers or advanced users, the fwupdtool now includes more verbose JSON output and better Redfish handling, while hidden or backup devices are properly excluded from updates. These changes boost system stability, expand device coverage, and make managing firmware updates more dependable across desktops and servers.
gpg2 2.5.6: This version fixes a regression introduced in the previous version that misclassified signatures from revoked or expired keys as “missing,” which confused users reviewing signed files or emails. Another important fix prevents potential crashes (double free) when running in no signature cache mode. Some new features include support for left-anchored substring filters (helpful when scripting key listings), the --quick-tsign-key command for efficiently creating trust signatures, and a new User-Id option during key generation to streamline custom workflows. There’s also better smart card support, with improvements to certificate selection and card detection, especially for P15 cards.
sqlite 3.49.2: This software package addresses a rare memory error triggered by the NOT NULL optimization introduced in version 3.40.0, which ensures safer query execution. Fixes were also applied to DISTINCT queries using views and edge cases involving UNIQUE constraints with IN operators, which are issues that could lead to incorrect query results in complex schemas. Users relying on the generate_series() function will see better stability, and minor build improvements enhance portability.
thunar 4.20.3: The file manager now receives a warning before permanently deleting files, adding a crucial layer of protection. The file manager handles user-defined custom actions (UCAs) more reliably, especially when submenus are involved, thanks to fixes for several memory leaks and submenu bugs. On Wayland, popup menus now behave correctly and no longer stay open unexpectedly. The update also fixes crashes related to the list view and properties dialog, improves file handling on exFAT file systems, and enhances statusbar updates during searches.
PipeWire 1.4.4: This update restores compatibility with older 1.2-style MIDI and addresses regressions that impacted tools like mpv. The update also enhances integration with libcamera, ensuring smoother video and multimedia processing in GStreamer. Users working with MIDI devices benefit from improved UMP and ALSA sequencer support, including better handling of SysEx and program changes. NetJACK2 networking is now more reliable with refined driver/manager roles and error management.
Bug Fixes and Security Updates
Several key security vulnerabilities were addressed this month. Common Vulnerabilities and Exposures this month are:
Security Updates
- CVE-2025-32914: An out-of-bounds read vulnerability allows malicious HTTP clients to trigger memory access errors, potentially leading to crashes.
- CVE-2025-32907: Fixed excessive memory use from repeated HTTP range requests causing partial resource exhaustion.
- CVE-2025-46421: Fixed leak of Authorization headers on HTTP redirects, preventing credential exposure to third-party hosts.
-
CVE-2025-4969: Buffer overflow in curl’s
dynbufAPI could lead to data corruption or crash. -
CVE-2025-4476: In curl, improperly handled credentials in
setoptmay leak across requests. -
CVE-2025-4948:
CURLOPT_SSL_VERIFYPEERbypass possible in curl when reusing connections with wolfSSL.
-
CVE-2025-23394: Fixed potential privilege escalation in
cyradmdue to improper shell escaping when invoking subshell commands.
Mozilla Firefox 138.0:
- CVE-2025-2817: Fixed privilege escalation in Firefox Updater allowing SYSTEM-level operations.
- CVE-2025-4082: Fixed memory corruption in WebGL shader attributes on macOS.
-
CVE-2025-4083: Fixed process isolation bypass via
javascript:links in cross-origin frames. - CVE-2025-4085: Resolved potential information leakage and privilege escalation via UITour actor.
- CVE-2025-4086: Obscured file extension in download prompt via crafted filenames.
- CVE-2025-4087: Fixed unsafe attribute access during XPath parsing.
- CVE-2025-4088: Prevented CSRF via Storage Access API redirects.
- CVE-2025-4089: Fixed local code execution risk in “copy as cURL” developer tool.
- CVE-2025-4090: Fixed library path leakage in Firefox for Android via log output.
- CVE-2025-4091: Memory safety bugs fixed in Firefox 138, Thunderbird 138, and ESR versions.
- CVE-2025-4092: Additional memory safety fixes in Firefox 138 and Thunderbird 138. More fixes made for version 138.0.1 and 138.0.4
curl 8.14.0:
- CVE-2025-4947: Fixed an improper Certificate Validation in libcurl (QUIC with IP Address).
- CVE-2025-5025): Addressed a missing Certificate Pinning in libcurl (QUIC with wolfSSL).
-
CVE-2025-3416: A use-after-free vulnerability in OpenSSL’s handling of the
propertiesargument in certain functions could lead to undefined behavior or incorrect property parsing, potentially causing OpenSSL to treat the input as an empty string.
gpg2 2.5.6:
- CVE-2025-30258: Fixed a verification denial-of-service (DoS) vulnerability in GnuPG versions prior to 2.5.5.
kernel-source 6.14.6:
- CVE-2024-28956: Addressed multiple vulnerabilities related to Indirect Target Selection (ITS) on x86, including improper branch prediction behavior and missing mitigations for RSB stuffing.
**iputils:
-
CVE-2025-47268: Fixed an integer overflow in
pingthat could lead to a denial of service when handling crafted ICMP Echo Reply packets.
open-vm-tools 12.5.2:
- CVE-2025-22247: Resolved an insecure file handling flaw that allowed local attackers on a guest VM to tamper with files, potentially leading to privilege escalation.
nbdkit 1.42.3:
- CVE-2025-47712: Addressed a vulnerability allowing low-privileged users to cause partial denial-of-service via resource exhaustion.
- CVE-2025-47711: Fixed improper input handling that could allow denial-of-service through resource exhaustion or instability.
- CVE-2024-7383: Fixed an issue where TLS connections failed to properly verify NBD server certificates, allowing potential man-in-the-middle attacks.
webkit2gtk3 2.48.2:
- CVE-2025-24223: Fixed a memory corruption issue in WebKit when processing maliciously crafted web content.
- CVE-2025-31204: Resolved a memory corruption vulnerability in WebKit triggered by malicious web content.
- CVE-2025-31205: Addressed a cross-origin data exfiltration flaw in WebKit due to improper security checks.
- CVE-2025-31215: Resolved a vulnerability in WebKit where processing malicious web content could cause unexpected process crashes.
- CVE-2025-4382: Fixed an issue where GRUB’s TPM-based auto-decryption could leave LUKS disks decrypted in memory after a filesystem failure. An attacker with physical access could exploit this to access unencrypted data by forcing GRUB into rescue mode.
mozjs128 128.10.1:
- CVE-2025-4920: Fixed an out-of-bounds access when resolving Promise objects in Firefox.
- CVE-2025-4921: Fixed an out-of-bounds access during optimization of linear sums in Firefox.
-
CVE-2025-4575: Fixed an issue in OpenSSL 3.5 where the
-addrejectoption inopenssl x509mistakenly marked certificates as trusted instead of rejected.
postgresql17 17.5:
- CVE-2025-4207: Fixed a buffer over-read vulnerability in PostgreSQL’s GB18030 encoding check, which could result in denial-of-service.
- CVE-2025-4516: Fixed a use-after-free vulnerability in CPython that could lead to memory corruption.
Users are advised to update to the latest versions to mitigate these vulnerabilities.
Conclusion
May’s Tumbleweed updates highlight the strength of Tumbleweed to bring together performance improvements, UI polish and critical security updates. QEMU 10 expands hardware support and accelerates virtual machines, while OpenSSL 3.5 modernizes encryption defaults, which deliver noticeable improvements for everyday Linux use. The introduction this month of post-quantum cryptography (PQC) in OpenSSL 3.5 is a major advancement. KDE Gear 25.04.1 brought stability to essential apps like Dolphin and Kdenlive, ensuring workflows remain smooth and intuitive. Thunar also saw meaningful improvements, including safer file deletion and better Wayland behavior. Multimedia users saw benefits from GStreamer and GTK enhancements. AppStream 1.0.5 enhanced how package managers and software centers display app metadata, resulting in cleaner, more informative listings. Updates to SQLite 3.49.2 and gpg2 2.5.6 resolved edge-case bugs that could affect scripts, key management, or database reliability. These rolling release updates make a difference and show that Tumbleweed continues to deliver consistent new software updates every month for developers and power users.
Slowroll Arrivals
Please note that these updates also apply to Slowroll and arrive between an average of 5 to 10 days after being released in Tumbleweed snapshot. This monthly approach has been consistent for many months, ensuring stability and timely enhancements for users. Updated packages for Slowroll are regularly published in emails on openSUSE Factory mailing list.
Contributing to openSUSE Tumbleweed
Stay updated with the latest snapshots by subscribing to the openSUSE Factory mailing list. For those Tumbleweed users who want to contribute or want to engage with detailed technological discussions, subscribe to the openSUSE Factory mailing list . The openSUSE team encourages users to continue participating through bug reports, feature suggestions and discussions.
Your contributions and feedback make openSUSE Tumbleweed better with every update. Whether reporting bugs, suggesting features, or participating in community discussions, your involvement is highly valued.
Tumbleweed – Review of the weeks 2025/21 & 22
Dear Tumbleweed users and hackers,
I’m again spanning the review over two weeks. During Week 2025/21, there was a large downtime on OBS/openQA due to some storage failures. This took longer than anticipated, so we delayed checking in for new snapshots. All submissions created during that time were handled, albeit more slowly than usual.
This week looked better from an infra pov, but with a holiday on Thursday, things still went slow. In summary, we have published two snapshots (0515 and 0522) during this week, with 0527 currently being in QA (delayed due to Mesa vs wine issues detected during build) – but even with that out of the way, we can already say that snapshot won’t be published (nvidia firmware package issues, see https://bugzilla.opensuse.org/show_bug.cgi?id=1243843)
Let’s look at the bright side and see what the two published snapshots brought to your computers:
- SDL 3.2.14
- Ruby 3.4.4
- SQLite 3.49.2
- libguestfs 1.55.11
- python setuptools 78.1.1
- XEN 4.20.0_12
Things that are planned to be released with the next snapshots to come:
- Mesa 25.1.1
- Mozilla Firafox 138.0.4
- GNOME 48.2
- fwupd 2.0.10
- GIMP 3.0.4
- Linux glibc devel 6.15
- LLVM 20.1.5
- Pipewire 1.4.3
- PostgreSQL 17.5
- Linux kernel 6.15