Skip to main content

a silhouette of a person's head and shoulders, used as a default avatar

Tumbleweed – Review of the week 2024/48

Dear Tumbleweed users and hackers,

After hackweek, we see a bunch of nifty changes coming our way. I have not seen everything by far, but there is at least a replacement for openSUSE-welcome planned on the GNOME Desktop (a variant of GNOME Tour), Lubos has just announced a new migration tool and there will certainly be many more things popping up in the next few days/weeks. During the last week, we have managed to deliver six snapshots (1121, 1122, 1124, 1125, 1126, and 1127)

The most relevant changes delivered are:

  • Mesa 24.2.7 & 24.3.0
  • ICU 76.1
  • gpgme 1.24.0
  • GTK 4.16.6 & 4.16.7
  • LLVM 19.1.4
  • PHP 8.3.14
  • CMake 3.31.0
  • GNOME 47.2
  • KDE Plasma 6.2.4
  • Qt 5.15.16
  • Debugedit 5.1

Amongst the initially mentioned changes, we are currently also testing these updates in the Factory Staging areas:

  • Mozilla Firefox 133.0
  • LibreOffice 24.8.3.2
  • Python setuptools 75.6
  • systemd 257
  • SQLite 3.47.1
  • Linux kernel 6.12.1

a silhouette of a person's head and shoulders, used as a default avatar

Lanzado FreeCAD 1.0

Una de la eternas luchas del Software Libre es proporcionar una aplicación potente y verátil para el diseño 3D, es por ello que ver que el desarrollo de éste tipo de software sigue activo y que va evolucionando es una gran noticia. Me alegra compartir con vosotros que ha sido lanzado FreeCAD 1.0, una aplicación para el modelado 3D paramétrico en diseño mecánico y arquitectónico libre.

Lanzado FreeCAD 1.0

Aunque me consta que los profesionale del tema no comparten conmigo esta sensación, yo tengo una buena experiencia con FreeCAD aplicación. La utilicé en mis clases de tecnología para alumnado de 4º de ESO, convirtiéndose en una excelente forma de introducirse en el mundo de diseño 3D sin caer en software privado.

Lanzado FreeCAD 1.0

Aprovechando unos magníficos vídeos de Juan Gonzalez Gomez (aka ObiJuan) mi alumnado trabajó de forma autónoma, cada uno a su ritmo, mientras yo me dedicaba a solucionar los problemas que aparecen porque las interfaces van evolucionando.

Por esta razón, y porque creo que es necesario tener aplicaciones libres potentes en todas y cada una de las necesidades humanas, principalmente para no caer de forma esclava en una aplicación privativa, me elgra mucho anunciar que ha sido lanzado FreeCAD 1.0, hecho que marca un hito importante tras más de 20 años de desarrollo.

Algunas de las novedades principales incluyen:

  1. Workbench de ensamblajes integrado: Este nuevo módulo permite diseños basados en un enfoque de «bottom-up», pruebas de movimiento y vistas explosionadas de componentes, utilizando el solucionador Ondsel.
  2. Mejora en la gestión de nombres topológicos: Este avance resuelve un problema histórico, evitando que la eliminación de geometrías rompa modelos debido a referencias cruzadas.
  3. Sistema de materiales renovado: Ahora se pueden asignar propiedades de apariencia a los materiales, mejorando el realismo y la personalización en los modelos.
  4. Interfaz gráfica mejorada: Cambios como nuevas herramientas en el «Sketcher», un indicador de centro de rotación personalizable, y opciones para adaptar la disposición de los paneles hacen que la experiencia de usuario sea más fluida.
  5. Nuevas funcionalidades para diseño BIM: Se añadieron herramientas específicas para arquitectura e ingeniería civil, junto con mejor soporte para el formato IFC.
  6. Página de inicio basada en QTWidgets: Facilita el acceso a herramientas principales y proyectos recientes con un diseño más intuitivo.
Lanzado FreeCAD 1.0
Pieza modelada por r-frank mediante FreeCAD

Más información: Notas de lanzamiento den la Wiki de FreeCAD | LibreArts | Phoronix | betanews

La entrada Lanzado FreeCAD 1.0 se publicó primero en KDE Blog.

the avatar of openSUSE News

Upgrading to Leap Micro 6.1 Beta with opensuse-migration-tool

Leap Micro 6.1 Beta was released last Wednesday. Images can be found at get.opensuse.org As this is mostly a rebrand of SUSE Linux Enterprise Micro 6.1, unless some serious issues are found, users can expect a quick transition to RC and GA next week.

We’re introducing a new migration tool with Leap Micro 6.1 which should hopefully ease future upgrades to a Leap Micro releases, specifically new major versions. Let’s have a look at how to deploy it from git on older Leap Micro releases as well as how to install it on Leap Micro 6.1 Beta.

The main benefit for the user is that you don’t have to deal manually with any repository changes that might have been introduced in a new releases. This will hopefully lead to smoother and more straightforward upgrades. As of now the opensuse-migration-tool is still experimental.

Testing the tool with Leap Micro container from your Leap or Tumbleweed

We have to be running an older version of Leap Micro to be able to upgrade to 6.1.

Since we’re using distrobox in this example our host can be running Leap, Tumbleweed, Aeon. Distrobox will have access to your home directory, including the git checkout.

The key is to use –pre-release to have Leap Micro 6.1 as an available upgrade target.

$ git clone https://github.com/openSUSE/opensuse-migration-tool.git
$ cd opensuse-migration-tool
$ distrobox create --image registry.opensuse.org/opensuse/leap-micro/6.0/toolbox --name micro60
$ distrobox enter micro60 # from now on inside distrobox
$ zypper in bc jq curl dialog sed gawk
$ ./opensuse-migration-tool --pre-release --dry-run
$ sudo ./opensuse-migration-tool --pre-release # Chooose Leap Micro 6.1
$ cat /etc/os-release # should confirm that you've upgraded to 6.1

Enjoy your new Leap Micro 6.1 Beta container

If you trash your container, just type exit podman stop micro60 or docker stop micro60 followed by distrobox rm micro60. And you can start all over again.

Testing the tool on Leap Micro host or inside the VM

Here we have to use transactional-update shell as we’re working inside Leap Micro 6.0 or even 5.5 host or a VM. Just like in the previous case, the important piece is to try it from a Leap Micro release older than 6.1, as otherwise, the only migration target would be MicroOS.

Make sure to use –pre-release to have 6.1 Beta as a viable migration target.

$ sudo transactional-update shell # from now on inside shell
$ zypper in git bc jq curl dialog sed gawk 
$ git clone https://github.com/openSUSE/opensuse-migration-tool.git
$ cd opensuse-migration-tool
$ ./opensuse-migration-tool --pre-release --dry-run
$ sudo ./opensuse-migration-tool --pre-release  # Choose Leap Micro 6.1 as a target
$ reboot

*Enjoy Leap Micro 6.1 Beta

Don’t worry In case you mess up, we’re using transactional-update shell. You can always boot the previous snapshot.

Testing Leap Micro 6.1 to MicroOS upgrade migration

Since there is no newer point release than Leap Micro 6.1 Beta, the only migration/upgrade target would be MicroOS.

The point of this example is to show that the Leap Micro 6.1 repository already contains the opensuse-migration-tool Therefore there is no need to run it from a git checkout unless you want to tinker with it.

$ sudo transactional-update shell
$ zypper in opensuse-migration-tool # Will work only on Leap Micro 6.1
$ sudo opensuse-migration-tool --dry-run # to oversee what would change
$ sudo opensuse-migration-tool # MicroOS is expected to be the only migration option from Leap Micro 6.1 Beta

Don’t bother re-running the opensuse-migration-tool once you upgrade to MicroOS which is in fact openSUSE Tumbleweed. There is really nothing newer that you could migrate to, and you’ll get the message that openSUSE Tumbleweed is unsupported. This behavior is expected.

Known issues

Bug 1233982 - Upgrade to 6.1 (netcfg) failed

This particular issue will for sure pop up in your distrobox-based experiments. Distrobox mounts over /etc/hostname with a bind mount and the upgrade of netcfg will fail on post-script. This is safe to ignore (type i in interactive zypper dup).

The migration tool tries to run non-interactively at first, and in case it fails it leaves problem resolution on the user by re-running zypper dup in interactive mode.

Contributing

If you’re interested in contributing feel free to send PR, report issues or features against openSUSE/opensuse-migration-tool Github repository

the avatar of openSUSE News

Tumbleweed Monthly Update - November 2024

This month, the rolling-release continues to shine as a well-oiled machine. November brings key updates for Mesa, gtk4, php8, postgresql17 and more. Alongside these key updates, important security fixes arrived for mozjs128, postgresql, Firefox, and OpenSC, which resolved several CVEs to help bolster your system’s resilience. The fresh design introduced last month, with its revamped logo and day/night-themed wallpapers, continues to enhance Tumbleweed’s aesthetic appeal while the updates this month improve functionality and security.

As always, remember to roll back using snapper if any issues arise.

Happy updating and tumble on!

For more details on the change logs for the month, visit the openSUSE Factory mailing list.

New Features and Enhancements

  • GTK4 4.16.6 and 4.16.7: The newest version reduces the size of error underlines in text rendering for better visual clarity. The 4.16.6 version provides fixes for a smoother user experience. Wayland color management is now opt-in, helping prevent compatibility issues with KWin. Users can experiment with this feature by setting GDK_DEBUG=color-mgmt. Improvements include preventing emoji selection when inserted in GtkText, setting default window icons from the application ID in GtkApplication and enhancing GtkFontChooser to make its dialog more adaptable.The release also includes updated translations.
  • postgresql 17.2: The package received two updates this month and resolves an ABI break affecting extensions that interact with ResultRelInfo and restores the functionality of ALTER {ROLE|DATABASE} SET role. Logical replication slots now handle restart_lsn correctly to avoid backward movement. The update prevents deletion of required WAL files during pg_rewind and fixes race conditions with shared statistics entries. Index statistics in contrib/bloom are now correctly counted. The update fixes an assertion failure in regular expression parsing caused by disconnected NFA sub-graphs.
  • gnutls 3.8.8: Improvements in this package were made in post-quantum cryptography and Online Certificate Status Protocol handling. Experimental support for X25519MLKEM768 and SecP256r1MLKEM768 key exchange algorithms in TLS 1.3 were added that align with the final ML-KEM standard. This update requires liboqs 0.11.0 or newer. Additionally, the library now validates all records in OCSP responses, ensuring the server certificate is checked against all available records instead of only the first. Improvements in handling malformed compress_certificate extensions bring stricter RFC 8879 compliance, replacing incorrect alerts with illegal_parameter and rejecting overlong extension data.
  • KDE Plasma 6.2.3:
    Bluedevil improves PIN entry behavior, while Breeze resolves a potential null pointer issue. Discover updates its backend for compatibility with fwupd 2.0.0 and corrects review visibility in the Application Page. KWin receives extensive updates, including fixes for crashes, colormap leaks, file descriptor handling, and HDR brightness management. Plasma Desktop fixes app tooltips, task manager icon alignment, emoji search, and optimizes activity management. Other components like KPipeWire, KSystemStats, and Powerdevil improve stream handling, sensor robustness, and brightness adjustments, respectively. Plasma Mobile simplifies and cleans up the Action Drawer and enhances app list navigation and search functionality. Plasma Audio Volume Control ensures accurate device name updates, while Plasma Workspace adjusts logout screen behavior, theme defaults, and mobile user interface fixes.
  • KDE Gear 24.08.3: Elisa fixes missing icons on certain platforms. K3b corrects file pattern parsing for ripped files and removes deprecated MusicBrainz code. KAccounts-Integration improves logging, fixes dangling references, and handles missing files gracefully. Kate addresses session group saving, export order for SQL and builds on openSUSE with updated dependencies. Kdenlive resolves multiple crashes and improves project handling, proxy generation, and timeline management. KIO-Extras adds WebP thumbnail support. Kitinerary expands ticket extraction support for multiple transport services and improves handling of Renfe and Agoda formats. Konsole fixes issues with OSC color commands.
  • KDE Frameworks 6.8.0: Baloo now excludes model/obj and text/rust from indexing. Breeze Icons adds support for text/x-typst mimetype icons and unifies index themes for better consistency. Extra CMake Modules gain Python bindings and improved static Qt6 support. KIO sees improvements in http handling, resizing in KFilePlacesView, and overall UX enhancements. Kirigami resolves various issues with icons, themes, and overlays, improving usability. KTextEditor enhances session restore, template handling, and introduces comprehensive swap file tests. Solid restores media change handling for audio CDs and adopts libmount on Linux for better functionality. This release also includes numerous bug fixes, CI improvements for static builds, enhanced Qt 6 compatibility, and updated translations.
  • gnome-control-center 47.2: GNOME users see accessibility improvements by removing excessive “screen” labels. The appearance settings fix accidental resets of accent colors. Lemory leak are addressed in the Apps section, while Color ensures profiles are connected before use. Printers fix an incorrect tooltip in the “Add Printer” button. Updated translations are included.
  • ruby3.3 3.3.6: This update includes the merging of JSON 2.7.2 and reline 0.5.10, along with an upgrade to REXML 3.3.9. The release resolves significant bugs, such as improper object freeing when using Data_Make_Struct, broken IO#close functionality under Fiber scheduling, and errors with multibyte path names on Windows. Additional fixes address issues with Float handling ASCII-incompatible strings, memory management in IO::Buffer operations, and discrepancies in instance_method behavior across Ruby versions. This version also corrects corrupt RUBY_DESCRIPTION metadata when specific flags are used and improves hash key retrieval after Process.warmup.

Key Package Updates

  • Mesa 24.3.0: The package introduces a new stable release with updates enhancing its graphical capabilities and addressing security and build issues. The update refreshes patches for various vulnerabilities, including CVE-2023-45913, CVE-2023-45919, and CVE-2023-45922, while incorporating fixes for Python 3.6 build compatibility and other adjustments. Deprecated options like -Ddri3=enabled and -Ddri-search-path have been removed to streamline the build configuration. Vulkan 1.3 is now supported on Raspberry Pi 4 and 5 via v3dv, while the NVK driver adds support for important extensions like VK_EXT_descriptor_buffer, VK_KHR_dynamic_rendering_local_read, and VK_KHR_pipeline_binary. RADV sees new features and Shader support is significantly enhanced. Full details can be accessed in the release notes.
  • kernel-source 6.11.8: Key updates for the Linux Kernel address issues like dangling pointers in virtual socket and hyper-v socket initialization, improved support for AMD audio on certain laptops, and fixes for display rendering and timeout handling in Intel and AMD graphics drivers. The update resolves several memory management, file system and USB-related bugs, which includes USB Type-C and serial device handling. Fixes were made to Thunderbolt connections, media device parsing, and the management of system clocks and platformance features for AMD processors. Updates to the Btrfs file system enhance subvolume flag management and quota handling.
  • GStreamer 1.24.9: Fixes include better timestamp handling in flvmux, RTPManager keyframe management and enhanced SRT and V4L2 support. Updates optimize aggregator, playbin3, and qtdemux, with broader format and library compatibility.
  • gpgme 1.24.0: This package brings several significant enhancements and fixes, including extended decryption and verification commands that now support direct file output. Encryption and signing commands also allow input data to be read from files. Additional features include improved handling of designated revocation keys, new context flags for advanced operations like importing options and processing all signatures and the introduction of an easier method to change owner trust and enable or disable keys. The Qt library now supports simultaneous builds for Qt 5 and Qt 6, enabling file-based operations for encryption and signing while offering better integration for importing options and appending detached signatures.
  • gtk4 4.16.3: This update enhances how default cursor themes are handled by searching within XDG directories to ensure better compatibility with Wayland environments. The default cursor size now matches the gsettings schema and provides a more consistent user experience. The fallback process for portal settings was refined as settings_portal is cleared when switching to fallback without portal settings. This release also includes updated translations.
  • php8 8.3.14: Fixes include addressing segmentation faults in DOM, GD, and FFI, memory leak in Reflection and OpenSSL, and use-after-free vulnerabilities in SPL and sockets. The update also resolves overflows in multiple modules, such as mbstring, streams and GMP for more stable and secure handling of edge cases. Notable security improvements include patches for out-of-bounds writes in LDAP CVE-2024-8932, heap buffer over-reads in MySQLnd CVE-2024-8929, and CRLF injection vulnerabilities in streams CVE-2024-11234.
  • ibus 1.5.31: This includes enhanced CI support for both generic setups and Wayland environments, as well as updates to compose keys based on the latest Xorg and GTK standards. The release transitions to using localectl for XKB configuration retrieval in Wayland, enhancing integration. Security improvements include a change to the IBus unique name, while updates to XKB engines and Unicode categories ensure broader compatibility. This version resolves various issues, including problems with X11 applications and games, Emoji handling, Flatpak integration, and preedit behavior in specific input methods like m17n:sa:itrans.

Bug Fixes and Security Updates

Several key security vulnerabilities were addressed this month:

  • Firefox 132:
  • CVE-2024-10458: Permission leak via embed or object elements.
    • CVE-2024-10459: Use-after-free in layout with accessibility, potentially leading to an exploitable crash.
    • CVE-2024-10460: Confusing display of origin for external protocol handler prompt.
    • CVE-2024-10461: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response.
    • CVE-2024-10462: Origin of permission prompt could be spoofed by a long URL.
    • CVE-2024-10463: Cross-origin video frame leak in some conditions.
    • CVE-2024-10468: Race conditions in IndexedDB could cause memory corruption and a potentially exploitable crash.
    • CVE-2024-10464: History interface could cause a Denial of Service condition.
    • CVE-2024-10465: Clipboard “paste” button persisted across tabs, allowing a potential spoofing attack.
    • CVE-2024-10466: DOM push subscription message could hang Firefox, causing it to become unresponsive.
    • CVE-2024-10467: Memory safety bugs fixed, potentially exploitable to run arbitrary code.
  • php8 8.3.14:
    • CVE-2024-8932: An out-of-bounds access in the LDAP extension’s ldap_escape function.
    • CVE-2024-8929: A heap buffer over-read in MySQLnd that could leak partial heap content.
    • CVE-2024-11233: An issue in the Streams component allowing potential CRLF injection via proxy configurations.
    • CVE-2024-11234: A vulnerability in the Streams component related to CRLF injection.
    • CVE-2024-11236: Integer overflows in PDO DBLIB and PDO Firebird quoters, leading to out-of-bounds writes.
  • opensc 0.26.0:
    • CVE-2024-45615: Uninitialized values in libopensc and pkcs15init could lead to undefined behavior.
    • CVE-2024-45616: Incorrect checks or usage of APDU response values in libopensc may result in uninitialized values.
    • CVE-2024-45617: Missing or incorrect return value checks in libopensc can cause uninitialized values.
    • CVE-2024-45618: Similar issues in pkcs15init due to improper return value handling.
    • CVE-2024-45619**: Improper handling of buffer or file lengths in libopensc.
    • CVE-2024-45620**: Similar buffer or file length handling issues in pkcs15init.
    • CVE-2024-8443**: A heap buffer overflow in the OpenPGP driver during key generation.
  • libsoup:
    • CVE-2024-52531: A buffer overflow in soup_header_parse_param_list_strict could occur during UTF-8 conversion in applications using libsoup versions prior to 3.6.1. This issue cannot be triggered by input received over the network.
    • CVE-2024-52532: An infinite loop and excessive memory consumption were possible when reading certain patterns of WebSocket data from clients in libsoup versions before 3.6.1.
  • mozjs128 128.4.0:
    • CVE-2024-10458: Permission leak via embed or object elements.
    • CVE-2024-10459: Use-after-free in layout with accessibility.
    • CVE-2024-10460: Confusing display of origin for external protocol handler prompt.
    • CVE-2024-10461: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response.
    • CVE-2024-10462: Origin of permission prompt could be spoofed by long URL.
    • CVE-2024-10463: Cross-origin video frame leak.
    • CVE-2024-10464: History interface could cause a Denial of Service condition.
    • CVE-2024-10465: Clipboard “paste” button persisted across tabs.
    • CVE-2024-10466: DOM push subscription message could hang Firefox.
    • CVE-2024-10467: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4
  • postgresql17 17.1:
    • CVE-2024-10976: Incomplete tracking of tables with row-level security could allow reused queries to access unintended rows.
    • CVE-2024-10977: Error messages during SSL or GSS protocol negotiation could be spoofed by a man-in-the-middle.
    • CVE-2024-10978: Incorrect privilege assignment could allow less-privileged users to view or modify unintended rows.
    • CVE-2024-10979: In PL/Perl, unprivileged database users could alter sensitive process environment variables, potentially leading to arbitrary code execution.
  • libssh2_org 1.11.1:
    • CVE-2023-48795: A vulnerability that could cause mishandled handshake and sequence numbers, allowing attackers to bypass integrity checks and downgrade security features in certain OpenSSH extensions.
  • Xen 4.19.0_06:
    • CVE-2024-45818: Fixed a deadlock in x86 HVM standard VGA handling.
    • CVE-2024-45819: Only x86 systems running PVH guests are affected; HVM and PV guests are not vulnerable. The libxl toolstack may leak data to PVH guests via ACPI tables.
  • python-tornado6 6.4.2:
    • CVE-2024-52804: The algorithm used for parsing HTTP cookies in Tornado versions prior to 6.4.2 sometimes has quadratic complexity, leading to excessive CPU consumption when parsing maliciously-crafted cookie headers. This parsing occurs in the event loop thread and may block the processing of other requests. Version 6.4.2 fixes the issue

Conclusion

November 2024 was another stellar month for Tumbleweed as it showcased its commitment to delivering the newest software with an impressive array of updates. Notable updates to Mesa, GTK4, KDE Plasma, PostgreSQL and more provide rolling release users with the latest in open-source technology for a secure and robust system. Keep rolling forward, and don’t forget to check out the detailed changelogs and discussions on the openSUSE Factory mailing list. Here’s to another month of seamless updates—happy tumbling!

Slowroll Arrivals

Please note that these updates also apply to Slowroll and arrive between an average of 5 to 10 days after being released in Tumbleweed snapshot. This monthly approach has been consistent for many months, ensuring stability and timely enhancements for users.

Contributing to openSUSE Tumbleweed

Stay updated with the latest snapshots by subscribing to the openSUSE Factory mailing list. For those Tumbleweed users who want to contribute or want to engage with detailed technological discussions, subscribe to the openSUSE Factory mailing list . The openSUSE team encourages users to continue participating through bug reports, feature suggestions and discussions.

Your contributions and feedback make openSUSE Tumbleweed better with every update. Whether reporting bugs, suggesting features, or participating in community discussions, your involvement is highly valued.

a silhouette of a person's head and shoulders, used as a default avatar

stalld: unpatched fixed temporary file use and other issues

Table of Contents

1) Introduction

Stalld is a daemon that aims to prevent starvation of operating system threads on Linux. It has recently been added to openSUSE Tumbleweed and we performed a routine review of the contained systemd service. During the review we noticed a couple of security issues that should be addressed.

We reached out to upstream via their GitLab issue tracker and created a public and a private issue (still private), but never got any reaction. After nearly three months without a reply we decided to publish the available information now.

This report is based on stalld version v1.19.6.

2) Use of Fixed Temporary File Path /tmp/rtthrottle in scripts/throttlectl.sh

The throttlectl.sh script, which is called with root privileges as a pre and post script in stalld’s systemd unit, is using the fixed /tmp path /tmp/rtthrottle to cache the original values found in /proc/sys/kernel/sched_rt_runtime_us and /proc/sys/kernel/sched_rt_period_us. This allows for a symlink attack and a file pre-creation attack.

A symlink attack can only work if the Linux kernel’s protected_symlinks setting is not in effect. If that would be the case then an attacker could place a symlink at the location causing throttlectl to overwrite arbitrary files in the system, allowing for a local Denial-of-Service.

2.b) File Pre-Creation Attack

Pre-creating the path in /tmp/rtthrottle will always work, even if the protected_regular setting in the kernel is active. This is the case because the shell redirection in the script (like in the line echo $period > $path/sched_rt_period_us) will fall back to opening the target file without O_CREAT in the open() flags, if creating the file fails. Without O_CREAT the protected_regular logic no longer triggers.

This means that if a local attacker pre-creates the file, the script will write to a file owned by the attacker. By the time the script tries to restore the values from this file, the local attacker can place arbitrary values in it, which will in turn be written to the pseudo files in /proc/sys/kernel/sched_rt_*. This is a kind of local Denial-of-Service or a local integrity violation. It is not an information leak, because the content of these pseudo files is world-accessible anyway.

2.c) Exploitability

When stalld starts at boot time, there is not much opportunity for unprivileged local users to exploit this issue. If the service is started at a later time, or restarted, then the attack vector is exploitable, though.

2.d) Suggested Fix

To fix this, we suggest to place the file into the /run/stalld directory, which is owned by root. This directory is already created via stalld’s systemd unit.

In the systemd unit some hardenings like PrivateTmp=yes could also be applied to prevent any future temporary file issues of this type.

The throttlectl script should also set the errexit shell option to make it exit upon any unexpected errors.

3) The fill_process_comm() Function Might Read Unexpected Control Characters

The fill_process_comm() function reads the content of /proc/<pid>/comm from potentially untrusted processes in the system. The data found in there is obtained from the name of the executable that the kernel executed. Executable names can contain any data, except for the / character. This also includes control characters like \r or even terminal control sequences. This string is used by stalld to write information to logs. By embedding a carriage return in an executable name, a local attacker could achieve log spoofing.

To fix this, we suggest to transform any non-alphanumeric characters in the string into some safe character like ?.

4) Experimental FIFO Boosting Feature might have a Danger of Locking up the System

Via the --force_fifo command line switch, stalld can be instructed to “boost” stalled tasks by switching them to SCHED_FIFO scheduling. We are wondering what happens if a “rogue task” is assigned to this scheduler. As far as we know, if such a task never yields the CPU again, the whole system could lock up. This might require stalld to run under SCHED_FIFO itself, using a higher scheduling priority than the boosted task, to prevent any such situation.

5) Potential Race Conditions when Accessing /proc/<pid>/{status,comm}

As usual, when iterating over the processes in the /proc file system, race conditions can occur. Target processes could attempt to replace themselves by other processes, confusing stalld. We don’t believe that the “stall” situation can be provoked easily by a local attacker, though, thus the possibility to exploit anything in this direction is likely small.

We just mention this as a hint to the reader, maybe we’re overlooking something more critical here.

6) Weird umask() Setting used in daemonize()

The daemonize() function applies a new umask to the daemon process by calling umask(DAEMON_UMASK). The constant for this has a weird value, though:

/*
 * Daemon umask value.
 */
#define DAEMON_UMASK  0x133  /* 0644 */

We don’t know why an octal 0644 value isn’t used in the first place, instead of writing this as a comment only. The constant 0x133 corresponds to an octal value of 0463, though. It will mask out the owner-readable bit, read-write bits for the group and write-execute bits for world. This is likely not what was intended here.

Luckily no world-writable files will come into existence this way, but the misconfiguration could lead to strange effects in the future, e.g. because the owner of the file will not have read permissions for it.

We don’t believe this is a security issue, which is why we created a public issue in the upstream GitLab tracker for this.

7) CVE Assignments

Since upstream did not react and therefore also didn’t confirm any of these issues, we did not request any CVEs from Mitre until now. The fixed temporary file usage issue 2) likely is worthy of a CVE assignment, though.

8) Timeline

2024-09-09 We reported the issues (1, 2) in the upstream GitLab project, offering coordinated disclosure for the sensitive issues.
2024-11-13 After getting no reaction for such a long time we commented in the issue, asking for a reply until 2024-11-22, otherwise we would publish the issue on our end.
2024-11-28 We published the information without upstream fixes being available.

9) References

a silhouette of a person's head and shoulders, used as a default avatar

Juegos libres de calidad y en desarrollo noviembre 2024

Repito entrada recurrente. Os recuerdo que esta entrada mensual (que me salté el mes pasado) tiene como objetivo promocionar los juegos libres, pero no como una página que quede obsoleta o sea un cementerio de proyectos muertos, así que la voy a realizar poco a poco y con conocimiento de causa. Por ello, y conociendo mis limitaciones y mi estilo de trabajo, la voy a ir actualizando de forma mes a mes y su contenido se irá ampliando poco a poco a. De esta forma, bienvenidos a la entrada de juegos libres de calidad y en desarrollo de nobiembre 2024 en la que recopilo los juegos libres presentados en forma de entrada «tocha» en el blog ampliándola con OpenArena y con noticias breves algunos de los juegos presentados.

Juegos libres de calidad y en desarrollo septiembre 2024

Juegos libres de calidad y en desarrollo noviembre 2024

Como decía al principio, esta entrada de la serie Juegos Libre de Calidad y en Desarrollo pretende ser una entrada viva y creciente, que tenga una parte fija pero dinámica en la que muestre no solo juegos libres sino también su estado de desarrollo, sus novedades principales y, si es posible, alguna noticia relevante de alguno de ellos: lanzamientos especiales, vídeos, premios, cambios notables, etc.

Para empezar utilizaré una tabla para mostrar la información y los juegos iniciales que aparecen son aquellos que he analizado a fondo en el blog dado que son los que tengo más claro su desarrollo, y cada més añadiré el siguiente que tengo en mente analizar.

Género Nombre Presentado en el blog Última actualización Comentario Otros juegos alternativos Libres o no.
Conducción Speed-dreams Si Marzo 2024
Versión 2.3
Siempre activos en redes, sobre todo en X (ex-Twitter) Need For Speed
Conducción SuperTux Kart Si Septiembre 2023
1.4
Beta de 1.5, octubre 2024
Ya está aquí la beta de la versión 1.5. SuperMario Kart
Estrategia por turnos The Battle of Wesnoth Si 28 de octubre de 2024
Versión en desarrollo 1.19.5
9 de noviembre de 2024
versión estable 1.18.3
En la versión en desarrollo se está probando un menú principal rediseñado. ?¿?League of Legends??¿
Estrategia por turnos Hedgewars Si Versión 1.0 el 9 de octubre de 2019 Se está desarrollando un nuevo editor de temas. Worms
Warmux (proyecto libre sin desarrollo)
FPS Alien Arena Si 7.71.7 (nueva) ¡Alien Arena ha sido instalado más de 1500 veces desde Flathub! Quake, Doom, Nexuiz, Unreal
FPS Xonotic Si 20/06/2023
Versión 0.8.6
No necesita instalación Quake, Doom, Nexuiz, Unreal
FPS Si Si 0.8.8
2012
Para los amantes de la nostalgia hiperactiva. Se prepra en secreto su versión 3.0. Quake, Doom, Nexuiz, Unreal
MMORPG Ryzom Si 3 de julio de 2021
Versión 3.4.0
Es posible que esta no sea la última versión ya que se parchea muy seguido. World of Warcraft
Albion Online
MMORPG Eternal Lands Si Diciembre de 2021 A pesar de tener un cliente algo antiguo los foros están activos 100% World of Warcraft
Albion Online
Plataformas Supertux Si 2021
Versón 0.6.3
Se estima que la 0.7.0 saldrá en agosto de 2024. Super Mario
Plataformas Frogatto & Friends Si 1.0
2010
Juego cerrado y completo Wonder Boy
Simulación Simutrans Si 3 de junio 2024
Simutrans 123
Disponible para Linux, Windows, Max, Steam y Android. Transport Tycoon Deluxe
Simulación OpenTTD Si 3 de mayo 2024
14.1
Disponible en Steam y Gog. Transport Tycoon Deluxe

Novedades de los juegos de la tabla

  • Empezamos con Speed-dreams, el desarrolador Xavi92 ha grabado un video donde nos muestra las nuevas características en las que ha estado trabajando. Es posible generar competidores IA eligiendo coche y bot.
  • [RYZOM] Trailer 25 – Free to play MMORPG for Windows, Mac and Linux

Y este mes no hay tiempo para más.

La entrada Juegos libres de calidad y en desarrollo noviembre 2024 se publicó primero en KDE Blog.

the avatar of openSUSE News

Project to have AMA with SUSE’s GM

The openSUSE community is invited to an online engagement with SUSE’s General Manager for Business Critical Linux on Dec. 3 at 16:00 UTC.

Rick Spencer, who leads the SUSE Linux Enterprise and SUSE Multi-Linux Manager teams, works closely with those contributing to openSUSE as part of his day-to-day roles. He is eager to strengthen the ties between SUSE and the openSUSE communities.

The Ask Me Anything session is an opportunity for open dialogue with members of the project and open-source contributors.

Participants can ask questions, share insights and learn about SUSE’s ongoing initiatives involving openSUSE and open-source development. Questions can also be submitted in advance to Rick Spencer or Gerald Pfeifer to guide the discussion.

Event Details:

  • Event: openSUSE Open Door Session with Rick Spencer

  • Date: Dec. 3, 2024

  • Time: 17:00–17:45 CET / 11:00–11:45 ET

  • Location: Online

How to Participate:

Spencer provided the keynote at this year’s openSUSE Conference.

a silhouette of a person's head and shoulders, used as a default avatar

a silhouette of a person's head and shoulders, used as a default avatar

Episodio 36 de KDE Express: Las distros KDE están on fire

Me congratula presentaros el episodio 35 de KDE Express, titulado «Las distros KDE están on fire» donde David Marzal sigue llevando en solitario estas más que interesantes píldoras. Un hurra por él.

Episodio 36 de KDE Express: Las distros KDE están on fire

Comenté hace ya bastante tiempo que había nacido KDE Express, un audio con noticias y la actualidad de la Comunidad KDE y del Software Libre con un formato breve (menos de 30 minutos) que complementan los que ya generaba la Comunidad de KDE España, aunque ahora estamos tomándonos un tiempo de respiro por diversos motivos, con sus ya veteranos Vídeo-Podcast que todavía podéis encontrar en Archive.org, Youtube, Ivoox, Spotify y Apple Podcast.

De esta forma, a lo largo de estos 36 episodios, promovidos principalmente por David Marzal, nos han contado un poco de todo: noticias, proyectos, eventos, etc., convirtiéndose (al menos para mi) uno de los podcast favoritos que me suelo encontrar en mi reproductor audio.

En palabras de David el nuevo episodio de KDE Express toca los siguientes temas:

Episodio 36 de KDE Express: Las distros KDE están on fire

Hacer copia de seguridad de todo, incluido de vuestros marcadores, listas y cuentas que seguis de Mastodon. Este episodio ha tardado más y tiene menos noticias por no hacer esas copias más regularmente. Y si os seguía y no teneis una petición, pegarme un toque a https://masto.es/@DavidMarzalC, que hice todo lo posible por buscar todas las cuentas que estaba siguiendo. Dicho lo cual, empezamos con las noticias KDE.

Artículo original con los enlaces en https://kdeexpress.gitlab.io/36/ Si no ves nada despues de esta linea en tu aplicación de podcast, es que no sabe leer bien el feed RSS, prueba otra 😉

  • En Fedora 42 KDE se convertirá en una versión oficial y deja de ser un simple «spin». Español / English
    • añade la opción de activar los repositorios de terceros en la pantalla de bienvenida
  • Steam Deck actualiza a Plasma 5.27.10 (la última hasta la fecha en 5 es la 5.27.11 de marzo de 2024)
  • Fedora lanza los spins Plasma Mobile y Kinote Mobile
  • KDE Wave vuelve a estar en desarrollo más allá de mantenimiento básico
  • Proyecto Banana, una distro atómica/inmutable en desarrollo por KDE. Basada en Arch y Brtfs.
  • Plasma 6.3 (2025-02-11):
    • Mejoras para tabletas
    • Notificación cuando el sistema ha tenido que matar algún proceso por falta de memoria.
    • Dolphin tiene una nueva interfaz para dispositivos moviles desde la 24.12
    • El centro de información mostrará todas tus GPUs
    • Discover te informará si la aplicación viene directamente de los desarrolladores o de voluntarios.
    • El widget de impresora ahora muestra la información de la cola directamente
    • El widget de indicador de teclado ahora muestra cuando las teclas modificadores están bloqueadas o «latched» por accesibilidad.

Y, como siempre, os dejo aquí el listado de los episodios. ¡Disfrutad!

Por cierto, también podéis encontrarlos en Telegram: https://t.me/KDEexpress

La entrada Episodio 36 de KDE Express: Las distros KDE están on fire se publicó primero en KDE Blog.

a silhouette of a person's head and shoulders, used as a default avatar

Cuarta actualización de Plasma 6.2

Me alegra compartir con todos vosotros la cuarta actualización de Plasma 6.2, iniciando así una serie de revisión de software que le dotará de más estabilidad, mejores traducción y resolución de errores. Estas actualizaciones son 100% recomendables y casi obligatorias para cualquier usuario ya que lo único que hacen es mejorar la versión sin comprometer sus funcionalidades.

Cuarta actualización de Plasma 6.2

No existe Software creado por la humanidad que no contenga errores. Es un hecho incontestable y cuya única solución son las actualizaciones. Es por ello que en el ciclo de desarrollo del software creado por la Comunidad KDE se incluye siempre las fechas de las mismas siguiendo una especie de serie de Fibonacci.

La Comunidad KDE ha publicado la primera actualización de Plasma 6.2, una versión que viene a subsanar los errores más graves del gran salto en cuanto a tecnología que fue Plasma 6 y Plasma 6.1.

Cuarta actualización de Plasma 6.2

Así que me congratula en presentar que hoy martes 26 de noviembre de 2024, un mes después de liberar el código de Plasma 6.2 la Comunidad KDE presenta la cuarta actualización de errores.

  • libkscreen Doctor: aclarado el significado de brillo máximo cero.
  • Espacio de trabajo Plasma: Icono de batería, añadido icono de auriculares.
  • Control de volumen de audio Plasma: Arreglado el diseño de prueba de los altavoces para el perfil Pro-Audio

Más información: KDE

Las novedades generales de Plasma 6.2

Aprovecho para realizar un listado de las novedades generales de Plasma 6.2:

  • Opción para reasignar los botones del lápiz de la tableta de dibujo a distintos tipos de clics del ratón.
  • Capacidad de anular aplicaciones que bloquean la suspensión o el bloqueo de la pantalla.
  • Discover es compatible ahora con PostmarketOS.
  • Se ha renovado la interfaz gráfica del módulo Accesibilidad de las Preferencias del sistema para mayor… ¡accesibilidad!
  • Nueva experiencia de usuario para el modo de edición de Plasma, para hacer que su modalidad sea más obvia y visualmente más elegante.
  • Previsión meteorológica: Pronóstico nocturno del proveedor meteorológico NOAA.
  • Opción para desactivar el desplazamiento suave en las aplicaciones de KDE.
  • Se ha mejorado la organización de la vista de cuadrícula expandida de la bandeja del sistema.
  • Ahora se reproduce un sonido al conectar o desconectar una pantalla.
  • Herramienta de recorte integrada cuando se selecciona el avatar del usuario.

Más información: KDE

La entrada Cuarta actualización de Plasma 6.2 se publicó primero en KDE Blog.