<?xml version="1.0"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>openSUSE News</title>
    <link>https://news.opensuse.org</link>
    <description>Latest news from the openSUSE Project</description>
    <atom:link href="https://news.opensuse.org/feed.xml" rel="self" type="application/rss+xml"/>

    <item>
      <guid>https://news.opensuse.org/2026/05/04/tw-monthly-update-april/</guid>
      <title>Tumbleweed Monthly Update - April 2026</title>
      <pubDate>Mon, 04 May 2026 11:00:00 +0000</pubDate>
      <link>https://news.opensuse.org/2026/05/04/tw-monthly-update-april/</link>
      <author>admin@opensuse.org (Douglas DeMaio)</author>
      <enclosure url="https://news.opensuse.org/wp-content/uploads/2025/05/tw.png" length="209112" type="image/png" />
      <description>There were several software package updates for openSUSE Tumbleweed during April and the later half of the month brought some urgency with Copy Fail, which is now safe for users of the rolling release and Slowroll for those who have done a zypper dup at the end of the month....</description>
      <content:encoded>&lt;p&gt;There were several software package updates for &lt;a href=&quot;https://get.opensuse.org/tumbleweed/&quot;&gt;openSUSE Tumbleweed&lt;/a&gt; during April and the later half of the month brought some urgency with &lt;a href=&quot;https://copy.fail/&quot;&gt;Copy Fail&lt;/a&gt;, which is now safe for users of the rolling release and &lt;a href=&quot;https://en.opensuse.org/openSUSE:Slowroll&quot;&gt;Slowroll&lt;/a&gt; for those who have done a &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;zypper dup&lt;/code&gt; at the end of the month.&lt;/p&gt;

&lt;p&gt;The information about affected flavors of openSUSE was covered in a &lt;a href=&quot;https://www.suse.com/c/suse-responds-to-the-copy-fail-vulnerability/&quot;&gt;blog by the security team&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;April brought a major desktop release of &lt;a href=&quot;https://release.gnome.org/50/&quot;&gt;GNOME 50&lt;/a&gt; and there was a fourth Plasma 6.6 point release. &lt;a href=&quot;https://www.php.net/&quot;&gt;PHP&lt;/a&gt;, &lt;a href=&quot;https://www.gtk.org/&quot;&gt;GTK4&lt;/a&gt; with the new native &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;GtkSvg&lt;/code&gt; renderer, &lt;a href=&quot;https://www.sqlite.org/&quot;&gt;SQLite&lt;/a&gt;, &lt;a href=&quot;https://wiki.linuxfoundation.org/networking/iproute2&quot;&gt;iproute2&lt;/a&gt;, and &lt;a href=&quot;https://www.nano-editor.org/&quot;&gt;nano&lt;/a&gt; were among some of the develop packages updated this month. The &lt;a href=&quot;https://www.kernel.org/&quot;&gt;Linux kernel&lt;/a&gt; advances to 7.0.2, and &lt;a href=&quot;https://www.mesa3d.org/&quot;&gt;Mesa&lt;/a&gt; progressed through 26.0.4 and 26.0.5 with raytracing fixes ahead of upcoming game releases. Security received heavy attention with &lt;a href=&quot;https://webkitgtk.org/&quot;&gt;WebKitGTK&lt;/a&gt;, &lt;a href=&quot;https://www.python.org/&quot;&gt;Python&lt;/a&gt;, &lt;a href=&quot;https://www.cups.org/&quot;&gt;CUPS&lt;/a&gt;, &lt;a href=&quot;https://flatpak.org/&quot;&gt;Flatpak&lt;/a&gt;, &lt;a href=&quot;https://www.sudo.ws/&quot;&gt;sudo&lt;/a&gt;, and &lt;a href=&quot;https://openexr.com/&quot;&gt;OpenEXR&lt;/a&gt; all receiving multiple &lt;a href=&quot;https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures&quot;&gt;Common Vulnerabilities and Exposures&lt;/a&gt; fixes.&lt;/p&gt;

&lt;p&gt;As always, be sure to roll back using &lt;a href=&quot;https://github.com/openSUSE/snapper&quot;&gt;snapper&lt;/a&gt; if any issues arise.&lt;/p&gt;

&lt;p&gt;For more details on the change logs for the month, visit the &lt;a href=&quot;https://lists.opensuse.org/archives/list/factory@lists.opensuse.org/&quot;&gt;openSUSE Factory mailing list&lt;/a&gt;.&lt;/p&gt;

&lt;h2 id=&quot;new-features-and-enhancements&quot;&gt;New Features and Enhancements&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://kde.org/announcements/gear/26.04.0/&quot;&gt;KDE Gear 26.04.0&lt;/a&gt;&lt;/strong&gt;: This major release updates 129 packages from the 25.12.3 series across the core PIM suite (&lt;a href=&quot;https://community.kde.org/KDE_PIM/Akonadi&quot;&gt;Akonadi&lt;/a&gt;, &lt;a href=&quot;https://apps.kde.org/kmail/&quot;&gt;KMail&lt;/a&gt;, &lt;a href=&quot;https://apps.kde.org/kontact/&quot;&gt;Kontact&lt;/a&gt;, &lt;a href=&quot;https://apps.kde.org/korganizer/&quot;&gt;KOrganizer&lt;/a&gt;), graphics tools (&lt;a href=&quot;https://apps.kde.org/gwenview/&quot;&gt;Gwenview&lt;/a&gt;, &lt;a href=&quot;https://apps.kde.org/okular/&quot;&gt;Okular&lt;/a&gt;), development tools (&lt;a href=&quot;https://apps.kde.org/kate/&quot;&gt;Kate&lt;/a&gt;, &lt;a href=&quot;https://apps.kde.org/kompare/&quot;&gt;Kompare&lt;/a&gt;, &lt;a href=&quot;https://apps.kde.org/umbrello/&quot;&gt;Umbrello&lt;/a&gt;), and system utilities (&lt;a href=&quot;https://apps.kde.org/dolphin/&quot;&gt;Dolphin&lt;/a&gt;, &lt;a href=&quot;https://apps.kde.org/konsole/&quot;&gt;Konsole&lt;/a&gt;, &lt;a href=&quot;https://apps.kde.org/kleopatra/&quot;&gt;Kleopatra&lt;/a&gt;). &lt;a href=&quot;https://apps.kde.org/dolphin/&quot;&gt;Dolphin&lt;/a&gt; prevents re-entrant signal activation across multiple view states, and &lt;a href=&quot;https://apps.kde.org/ark/&quot;&gt;Ark&lt;/a&gt; prevents silent replacement of existing files by directory entries during extraction. &lt;a href=&quot;https://apps.kde.org/okular/&quot;&gt;Okular&lt;/a&gt; avoids processing HTML with &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;QDomDocument&lt;/code&gt; and improves certificate selection, and &lt;a href=&quot;https://invent.kde.org/graphics/kdegraphics-thumbnailers&quot;&gt;kdegraphics-thumbnailers&lt;/a&gt; addresses multiple crashes for malformed files. Infrastructure-wide changes include CMake modernization, a port to QDoc documentation, and migration toward modern C++ patterns such as &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;std::shared_ptr&lt;/code&gt; over &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;QSharedPointer&lt;/code&gt;. The companion &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;ktextaddons&lt;/code&gt; library jumps from 1.8.0 to 2.0.1.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://kde.org/announcements/frameworks/6/6.25.0/&quot;&gt;KDE Frameworks 6.25.0&lt;/a&gt;&lt;/strong&gt;: This release emphasizes code quality, memory safety, and developer experience. &lt;a href=&quot;https://invent.kde.org/frameworks/kio&quot;&gt;KIO&lt;/a&gt; reverts a problematic permissions-based readability check, restores proper FTP UTF-8 negotiation, fixes WebDAV copy/move headers, and resolves multiple memory leaks across file operations and preview jobs. &lt;a href=&quot;https://invent.kde.org/frameworks/kcodecs&quot;&gt;KCodecs&lt;/a&gt; streamlines encoding detection with safer initialization, improved codec lookup performance, and removes obsolete code since Qt 6.8+ is required.&lt;a href=&quot;https://invent.kde.org/frameworks/kirigami&quot;&gt;Kirigami&lt;/a&gt; enhances component reliability by preventing dialog layer leaks and adds a configurable &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;textFormat&lt;/code&gt; property to &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;TitleSubtitle&lt;/code&gt;, while &lt;a href=&quot;https://develop.kde.org/frameworks/breeze-icons/&quot;&gt;Breeze Icons&lt;/a&gt; expands the icon set with new status icons. &lt;a href=&quot;https://invent.kde.org/frameworks/ktexteditor&quot;&gt;KTextEditor&lt;/a&gt; improves document handling by using the first line as a fallback title and adding relevant MIME types to save dialogs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://release.gnome.org/50/&quot;&gt;GNOME 50&lt;/a&gt; for developers&lt;/strong&gt;: This release brings significant improvements to the development stack. &lt;a href=&quot;https://apps.gnome.org/Builder/&quot;&gt;Builder&lt;/a&gt; gains a new save delegate system for better draft handling, refined dark theme colors matching the &lt;a href=&quot;https://gnome.pages.gitlab.gnome.org/libadwaita/&quot;&gt;Adwaita&lt;/a&gt; palette, and more integrated help documentation. Flatpak support now moves deleted files to the trash, the LSP client better handles delete notifications, and the build pipeline supports more flexible post-install commands. &lt;a href=&quot;https://gitlab.gnome.org/GNOME/mutter&quot;&gt;Mutter&lt;/a&gt; Devkit receives a major feature expansion including HiDPI and fractional scaling simulation, multi-monitor support within a single session, clipboard integration between host and Devkit, and resizable virtual displays with emulated monitor modes — reducing the need for physical multi-monitor test setups. &lt;a href=&quot;https://www.gtk.org/&quot;&gt;GTK&lt;/a&gt; 4.22 introduces &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;GtkSvg&lt;/code&gt;, a new native in-process SVG renderer integrated with the GTK Scene Graph that supports SVG animations, passes over 1,250 tests in the resvg test suite, and maintains 60fps+ performance for trusted system icons and application resources (untrusted SVGs should still use the sandboxed &lt;a href=&quot;https://gitlab.gnome.org/sophie-h/glycin&quot;&gt;Glycin&lt;/a&gt; library). &lt;a href=&quot;https://gnome.pages.gitlab.gnome.org/libadwaita/&quot;&gt;Libadwaita&lt;/a&gt; 1.9 introduces new sidebar widgets including &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;AdwSidebar&lt;/code&gt; and &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;AdwViewSwitcherSidebar&lt;/code&gt; (replacing &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;GtkStackSidebar&lt;/code&gt;), automatic support for the system-wide reduced motion preference across most widgets, context menus on &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;AdwAboutDialog&lt;/code&gt; link rows, and &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;GTK_DEBUG=builder&lt;/code&gt; diagnostics for all standard widgets. Autoloaded style resources are deprecated in favor of standard CSS media queries.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://wiki.gnome.org/Projects/GDM&quot;&gt;GDM&lt;/a&gt; 50.0&lt;/strong&gt;: The most significant change for this in the &lt;a href=&quot;https://release.gnome.org/50/&quot;&gt;GNOME 50&lt;/a&gt; release is the complete removal of X11 support for GDM’s own sessions, which now always run on &lt;a href=&quot;https://wayland.freedesktop.org/&quot;&gt;Wayland&lt;/a&gt;. Features like XDMCP and the system-wide Xserver are gone, though launching other desktops’ X11 sessions via per-user X servers is still possible. Compiling GDM without Wayland support is no longer possible. With systemd v260+, remote desktop sessions and local background sessions are now granted GPU access, enabling accelerated graphics for remote sessions on distributions that restrict GPU device node permissions. service&lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt; simplifies starting headless graphical sessions for RDP purposes. The &lt;/code&gt;gdm&lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;/&lt;/code&gt;gdm3` user is no longer needed since GDM now fully relies on dynamically allocated users. Wtmp/utmp/btmp records now contain more useful values, especially for Wayland and headless RDP sessions.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://kde.org/announcements/changelogs/plasma/6/6.6.3-6.6.4/&quot;&gt;Plasma 6.6.4&lt;/a&gt;&lt;/strong&gt;: &lt;a href=&quot;https://invent.kde.org/plasma/kwin&quot;&gt;KWin&lt;/a&gt; fixes blur flickering after wobbly windows, improves startup feedback icon clarity, resolves crashes with accessibility keyboards, and enhances pointer scaling and key repeat handling on &lt;a href=&quot;https://wayland.freedesktop.org/&quot;&gt;Wayland&lt;/a&gt;. The &lt;a href=&quot;https://invent.kde.org/plasma/oxygen&quot;&gt;Oxygen&lt;/a&gt; theme addresses pixelated buttons under fractional scaling, restores missing menu shadows, and adds a missing switch SVG. Usability improvements include better RTL support in Kicker, proper drag initiation only after pointer movement, and refined shortcut conflict prevention in keyboard settings. &lt;a href=&quot;https://invent.kde.org/plasma/plasma-keyboard&quot;&gt;Plasma Keyboard&lt;/a&gt; hardens virtual input handling with UTF-8 length fixes and disables predictive text during capture. Other fixes improve &lt;a href=&quot;https://apps.kde.org/discover/&quot;&gt;Discover&lt;/a&gt; by correcting how it tracks the number of active transactions, &lt;a href=&quot;https://invent.kde.org/plasma/drkonqi&quot;&gt;Dr Konqi&lt;/a&gt; with more reliable crash debugging, and &lt;a href=&quot;https://apps.kde.org/spectacle/&quot;&gt;Spectacle&lt;/a&gt; with a workaround for an overlay issue introduced in Qt 6.11. Several system tray and menu rendering glitches across multiple applets are also resolved, resulting in a smoother and more resilient desktop experience.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://w3m.sourceforge.net/&quot;&gt;w3m&lt;/a&gt; 0.5.6&lt;/strong&gt;: This is a major update for the terminal web browser. New features include commands to scroll the current line to top/bottom, a change directory (CD) command, a vim-like smartcase search option, recognition of &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;aria-label&lt;/code&gt; for buttons, &lt;a href=&quot;https://en.wikipedia.org/wiki/Gopher_(protocol)&quot;&gt;gopher protocol&lt;/a&gt; support, and experimental session store and restore. The image display in the &lt;a href=&quot;https://sw.kovidgoyal.net/kitty/&quot;&gt;kitty&lt;/a&gt; terminal is fixed, and slow backward search in long lines is improved.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.libreoffice.org/&quot;&gt;LibreOffice&lt;/a&gt; 26.2.2.2&lt;/strong&gt;: This is a major version upgrade with completely new features, improvements, and bug fixes across Writer, Calc, Impress, Draw, Math, and Base. Detailed release notes are available at &lt;a href=&quot;https://wiki.documentfoundation.org/Releases/26.2.0/RC1&quot;&gt;The Document Foundation wiki&lt;/a&gt;. Bundled components are refreshed including &lt;a href=&quot;https://pdfium.googlesource.com/pdfium/&quot;&gt;PDFium&lt;/a&gt; updated from 7012 to 7471 and 2D Graphics Library &lt;a href=&quot;https://skia.org/&quot;&gt;Skia&lt;/a&gt; updated from milestone 136 to 142.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.libsdl.org/&quot;&gt;SDL3&lt;/a&gt; 3.4.2&lt;/strong&gt;: This update adds &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;SDL_HINT_OPENGL_FORCE_SRGB_FRAMEBUFFER&lt;/code&gt; to control sRGB behavior for OpenGL and OpenGL ES contexts. A long startup time on Windows caused by non-compliant input devices was fixed, along with a divide-by-zero when using Nintendo Switch 2 controllers and improved GameCube adapter handling in PC mode. Support for the Razer Raiju V5 Pro is added.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://gitlab.com/cryptsetup/cryptsetup&quot;&gt;cryptsetup&lt;/a&gt; 2.8.6&lt;/strong&gt;: This update has several disk encryption fixes. The resumed device UUID is now verified against the UUID stored in metadata, and the LUKS2 reencryption lock name was corrected. FileVault (fvault2) metadata parsing is fixed, including reading from the correct image offset. The OpenSSL crypto backend works again when built with LibreSSL and allows up to 64 concurrent threads.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.mozilla.org/en-US/firefox/new/&quot;&gt;Mozilla Firefox&lt;/a&gt; 149.0.2&lt;/strong&gt;: This update addresses multiple security vulnerabilities, including integer overflow and memory safety bugs in Graphics: Text and Graphics: WebGPU components. The update also includes enterprise-related features such as AI-feature management, prevention of built-in VPN and IP protection, and correct application of browser homepage and start page policies. Other fixes include resolution of layout issues with graphics (SVG), crash prevention for security keys and WebAuthn features, and improved handling of web page printing and website error pages. Additionally, the build process is updated to be compatible with clang-based building on Leap, with the necessary libraries specified. [Linux]&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.php.net/&quot;&gt;PHP&lt;/a&gt; 8.5.5&lt;/strong&gt;: This minor version bump from the 8.4 series brings numerous bug fixes across the core, &lt;a href=&quot;https://www.php.net/manual/en/book.dom.php&quot;&gt;DOM&lt;/a&gt;, &lt;a href=&quot;https://www.php.net/manual/en/book.opcache.php&quot;&gt;Opcache&lt;/a&gt;, and &lt;a href=&quot;https://www.php.net/manual/en/book.openssl.php&quot;&gt;OpenSSL&lt;/a&gt; modules. Notable fixes address JIT compiler arithmetic errors, memory leaks, and use-after-free vulnerabilities. The package now requires &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;libcapstone&lt;/code&gt; as a dependency.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.nano-editor.org/&quot;&gt;nano&lt;/a&gt; 9.0&lt;/strong&gt;: This is a major version bump for the popular terminal text editor. The release improves horizontal scrolling, changes how macro recording is handled, and brings other usability refinements that build on the 8.x series.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://wiki.linuxfoundation.org/networking/iproute2&quot;&gt;iproute2&lt;/a&gt; 7.0&lt;/strong&gt;: A major version bump for the Linux network configuration toolkit. New features include CAN XL support and DPLL mode setting, both of which extend networking and timing capabilities for newer hardware platforms.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://wireless.wiki.kernel.org/en/users/documentation/iw&quot;&gt;iw&lt;/a&gt; 6.17&lt;/strong&gt;: This wireless configuration tool sees a significant jump from 6.9. It adds support for &lt;a href=&quot;https://www.wi-fi.org/discover-wi-fi/security&quot;&gt;WPA3&lt;/a&gt; SAE association, EHT rate and bitrate handling for Wi-Fi 7, multi-radio RTS configuration, and endianness fixes across the wireless stack.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.gimp.org/&quot;&gt;GIMP&lt;/a&gt; 3.2.4&lt;/strong&gt;: This minor update to the GNU Image Manipulation Program continues the 3.2 series with bug fixes and incremental improvements following the 3.2.2 release.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://invisible-island.net/xterm/&quot;&gt;xterm&lt;/a&gt; 407&lt;/strong&gt;: New private modes for UTF-8 and character width reporting are introduced, and Unicode handling and window resizing functionality are improved.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://gitlab.gnome.org/GNOME/gnome-remote-desktop&quot;&gt;gnome-remote-desktop&lt;/a&gt; 50.1&lt;/strong&gt;: This minor update to the GNOME 50 release fixes a black-screen issue when using NVIDIA GPUs.&lt;/p&gt;

&lt;h2 id=&quot;key-package-updates&quot;&gt;Key Package Updates&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.kernel.org/&quot;&gt;Linux kernel&lt;/a&gt; 6.19.11 - 7.0.2&lt;/strong&gt;: The 7.0.2 update fixes an SMB client out-of-bounds read in &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;smb2_ioctl_query_info&lt;/code&gt;, DACL validation in &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;cifsacl&lt;/code&gt;, and directory separator handling in SMB1 UNIX mounts. F2FS receives multiple fixes including a use-after-free in &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;f2fs_compress_write_end_io()&lt;/code&gt; and &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;f2fs_write_end_io()&lt;/code&gt;, a memory leak in &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;f2fs_rename()&lt;/code&gt;, and improved sanity checks. FUSE fixes several issues including rejection of oversized dirents in page cache, aborting on fatal signals during sync init, and ensuring device file initialization before cloning. A TOCTOU race in &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;net/packet&lt;/code&gt; on mmap’d &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;vnet_hdr&lt;/code&gt; in &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;tpacket_snd()&lt;/code&gt; is corrected, and crypto fixes address async decrypt skipping hash verification in &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;krb5enc&lt;/code&gt; and failed PSP command handling in the CCP driver. The 7.0.1 version sees KVM SEV receive several hardening fixes including locking all vCPUs when synchronizing VMSAs for SNP launch finish, disallowing &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;LAUNCH_FINISH&lt;/code&gt; if vCPUs are actively being created, and protecting &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;sev_mem_enc_register_region()&lt;/code&gt; with proper locking. Multiple use-after-free bugs are resolved across subsystems including &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;bcache&lt;/code&gt; (crash in &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;cached_dev.sb_bio&lt;/code&gt;), &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;ocfs2&lt;/code&gt; (fault handling with &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;VM_FAULT_RETRY&lt;/code&gt;), the &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;em28xx&lt;/code&gt; media driver, &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;blk-cgroup&lt;/code&gt; writeback, and &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;ALSA 6fire&lt;/code&gt; on USB disconnect. The 6.19.11 update brings several BPF fixes including reset of register ID for &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;BPF_END&lt;/code&gt; value tracking, constant blinding for &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;PROBE_MEM32&lt;/code&gt; stores, undefined behavior in interpreter &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;sdiv&lt;/code&gt;/&lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;smod&lt;/code&gt; for &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;INT_MIN&lt;/code&gt;, and unsound scalar forking in &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;maybe_fork_scalars()&lt;/code&gt;. CXL receives multiple corrections including a use-after-free of &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;parent_port&lt;/code&gt; in &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;cxl_detach_ep()&lt;/code&gt; and a leak in region construction. NVMe-PCI now caps queue creation to used queues, and platform support is expanded with several HP Omen and Victus laptops, OneXPlayer handheld variants, and Dell 14 Plus 2-in-1 keyboard support.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.mesa3d.org/&quot;&gt;Mesa&lt;/a&gt; 26.0.4 &amp;amp; 26.0.5&lt;/strong&gt;: The 26.0.4 out-of-schedule release combines bugfix updates and important raytracing fixes for an upcoming game. &lt;a href=&quot;https://docs.mesa3d.org/drivers/radv.html&quot;&gt;RADV&lt;/a&gt; corrects an invalid &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;hitAttributeEXT&lt;/code&gt; value when using function-call RT pipelines, fixes a memory leak in &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;radv_rt_nir_to_asm&lt;/code&gt;, and emits BOP events after every draw to work around a VRS bug on GFX12. &lt;a href=&quot;https://docs.mesa3d.org/drivers/radeonsi.html&quot;&gt;RadeonSI&lt;/a&gt; fixes a missing ground texture and &lt;a href=&quot;https://docs.mesa3d.org/drivers/anv.html&quot;&gt;ANV&lt;/a&gt; (Intel) addresses flashing effects in &lt;a href=&quot;https://store.steampowered.com/app/2420110/Horizon_Forbidden_West_Complete_Edition/&quot;&gt;Horizon Forbidden West&lt;/a&gt;. &lt;a href=&quot;https://nouveau.freedesktop.org/&quot;&gt;Nouveau&lt;/a&gt; fixes a segmentation fault in &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;gm200_validate_sample_locations&lt;/code&gt; triggered by Firefox on GTX 1070 Ti, and &lt;a href=&quot;https://docs.mesa3d.org/drivers/nvk.html&quot;&gt;NVK&lt;/a&gt; corrects barrier cache invalidation and viewport handling on Turing with FSR. The 26.0.5 follow-up is another bugfix release that refreshes the GL headers from libglvnd and disables Vulkan and Panfrost on armv6. Full release notes are available at the &lt;a href=&quot;https://docs.mesa3d.org/relnotes/26.0.4&quot;&gt;Mesa documentation site&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.sqlite.org/&quot;&gt;SQLite&lt;/a&gt; 3.53.0&lt;/strong&gt;: A new Query Result Formatter library is introduced in this release for the popular embedded database, and &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;ALTER TABLE&lt;/code&gt; is enhanced with additional capabilities. The jump from 3.51.3 also brings query planner refinements and incremental improvements that benefit any application linking against the system SQLite.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://gitlab.gnome.org/GNOME/libxml2&quot;&gt;libxml2&lt;/a&gt; 2.15.3&lt;/strong&gt;: A point release follow-up to the major 2.15 update. Multiple security fixes are included for type confusion, double-free, and use-after-free issues in the XML parser.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;http://www.libpng.org/pub/png/libpng.html&quot;&gt;libpng16&lt;/a&gt; 1.6.57&lt;/strong&gt;: A small but security-relevant point release that fixes a use-after-free in chunk setters tracked as CVE-2026-34757.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://libjpeg-turbo.org/&quot;&gt;libjpeg-turbo&lt;/a&gt; 3.1.4.1&lt;/strong&gt;: This update to the widely used JPEG codec includes multiple API hardening fixes and improved buffer handling, providing a more robust foundation for image-processing software across the system.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://libarchive.org/&quot;&gt;libarchive&lt;/a&gt; 3.8.7&lt;/strong&gt;: A heap buffer overflow in CAB archive handling is fixed, along with a buffer overflow in the ISO9660 reader. As &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;libarchive&lt;/code&gt; is used by package managers and archive tools across the distribution, this update is broadly relevant.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://firefox-source-docs.mozilla.org/security/nss/index.html&quot;&gt;mozilla-nss&lt;/a&gt; 3.122.1&lt;/strong&gt;: This release of the Network Security Services library brings 30+ bug fixes, including patches for multiple heap use-after-free, integer overflow, and ASN.1 parsing vulnerabilities that affect TLS handling in Firefox, Thunderbird, and other consumers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://pipewire.org/&quot;&gt;pipewire&lt;/a&gt; 1.6.4&lt;/strong&gt;: This audio and video pipeline server resolves segmentation faults, improves &lt;a href=&quot;https://jackaudio.org/&quot;&gt;JACK&lt;/a&gt; compatibility, and corrects regressions in the RAOP (AirPlay) module.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://sssd.io/&quot;&gt;SSSD&lt;/a&gt; 2.13.0&lt;/strong&gt;: The &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;pam_sss_gss&lt;/code&gt; module can now read SIDs from the Kerberos ticket PAC and apply authentication indicators via the new &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;pam_gssapi_indicators_apply&lt;/code&gt; option, supporting Active Directory’s Authentication Mechanism Assurance (AMA). Active Directory Foreign Security Principals (FSP) are now properly detected and ignored when reading nested group members. Support for the &lt;a href=&quot;https://invent.kde.org/plasma/plasma-login-manager&quot;&gt;KDE Plasma Login Manager&lt;/a&gt; is added. New options include &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;avoid_by_id_lookups&lt;/code&gt; for preferring name-based lookups, and &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;interactive&lt;/code&gt;/&lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;interactive_prompt&lt;/code&gt; for customizing OAuth2 prompting behavior. Cache performance is optimized for large deployments.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.multiprecision.org/mpc/&quot;&gt;mpc&lt;/a&gt; 1.4.1&lt;/strong&gt;: This complex-number arithmetic library steps from 1.3.1 to 1.4.1 and adds new functions including &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;mpc_exp10&lt;/code&gt;, &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;mpc_exp2&lt;/code&gt;, and &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;mpc_log2&lt;/code&gt;. Sign handling for imaginary parts is improved and pkg-config generation is included.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://github.com/smuellerDD/leancrypto&quot;&gt;leancrypto&lt;/a&gt; 1.7.2&lt;/strong&gt;: This cryptographic library jumps from 1.6.0 and adds post-quantum primitives ML-DSA, SLH-DSA, and ML-KEM along with an X.509 fix tracked as &lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-34610.html&quot;&gt;CVE-2026-34610&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://github.com/fedora-selinux/selinux-policy&quot;&gt;SELinux Policy&lt;/a&gt; 20260410&lt;/strong&gt;: This update contains a wide range of policy refinements. Missing Nextcloud file contexts are added, the openSUSE &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;/var/lib/php8&lt;/code&gt; path and &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;/srv/www/htdocs&lt;/code&gt; Apache DocumentRoot are properly labeled. Cloud-init is now allowed to &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;domtrans&lt;/code&gt; into &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;ssh-keygen&lt;/code&gt;, and &lt;a href=&quot;https://linux.die.net/man/8/accountsd_selinux&quot;&gt;accountsd&lt;/a&gt; gains proper D-Bus communication with systemd-homed along with corrected file context labeling for &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;/usr/share/accountsservice&lt;/code&gt;. OpenSSH receives a policy adjustment allowing &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;sshd-session&lt;/code&gt; to send a generic signal to &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;sshd-auth&lt;/code&gt;. Polkit support is updated for its agent helper. Additional permissions are granted for staff and sysadm users, including reading PID1 process state, connecting to systemd-logind and lvm over Unix stream sockets, mounting &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;/proc&lt;/code&gt;, and gaining sandboxing features. Virtualization policies gain several adjustments for &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;virtqemud&lt;/code&gt; and &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;virtnetworkd&lt;/code&gt;, and a new &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;local_login_allow_accountutils_fallback_mode&lt;/code&gt; boolean is introduced. The &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;snapper&lt;/code&gt; sdbootutil plugin is allowed to read kernel modules. The embedded &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;container-selinux&lt;/code&gt; is updated to v2.247.0.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.gnu.org/software/texinfo/&quot;&gt;texinfo&lt;/a&gt; 7.3&lt;/strong&gt;: The documentation format package adds new title-page commands, flexible node headings, and cross-reference features. &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;texi2any&lt;/code&gt; gains major HTML speedups, optional C implementation, improved diagnostics, and defaults updates. HTML, Info, LaTeX, XML, and &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;info&lt;/code&gt; tool receive enhancements and cleanups. The updated deprecated &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;@clickstyle&lt;/code&gt; and removed old patches.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://tukaani.org/xz/&quot;&gt;XZ Utils&lt;/a&gt; 5.8.3&lt;/strong&gt;: This update fixes a buffer overflow in &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;lzma_index_append()&lt;/code&gt; and an invalid memory access in &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;xz&lt;/code&gt; when using &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;--files&lt;/code&gt; and &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;--files0&lt;/code&gt; options. Arabic man page translations are added.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.gtk.org/&quot;&gt;GTK4&lt;/a&gt; 4.22.2&lt;/strong&gt;: The headline change is native SVG rendering via the new &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;GtkSvg&lt;/code&gt; renderer, which drops the &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;librsvg&lt;/code&gt; dependency entirely for icon and image rendering. The new renderer supports animations, state names, and SVG filters, with filters now operating in linear RGB by default. The GStreamer media backend now supports gapless looping with GStreamer 1.28, and &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;gtk4-rendernode-tool&lt;/code&gt; gains a new &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;filter&lt;/code&gt; command for node manipulation. Several drag-and-drop fixes are included, notably restoring the &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;DropTarget::leave&lt;/code&gt; signal emission when a drop finishes. Vulkan handling is improved with fixes for &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;SWAPCHAIN_MAINTENANCE&lt;/code&gt; checks, pending offset resets on Wayland, and invalid reads. Symbolic icon fallback rendering is corrected, dmabuf support now handles fewer fds than planes, and drop shadow rendering no longer darkens transparent textures. For Tumbleweed users, this brings major rendering architecture improvements and broad stability fixes to GTK4 applications.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://webkitgtk.org/&quot;&gt;webkitgtk3&lt;/a&gt; and &lt;a href=&quot;https://webkitgtk.org/&quot;&gt;webkitgtk4&lt;/a&gt; 2.52.1&lt;/strong&gt;: Numerous security vulnerabilities are patched across both releases. Touch scrolling for small movements is smoother, and &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;scrollend&lt;/code&gt; events are now correctly emitted after scroll animations. Async scrolling is improved when the main thread is busy by rendering scrollbars from the scrolling thread. The GPU process is disabled by default in this cycle. A build option to disable &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;USE_GSTREAMER&lt;/code&gt; is added for configurations without multimedia support.&lt;/p&gt;

&lt;h2 id=&quot;security-updates&quot;&gt;Security Updates&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.python.org/&quot;&gt;Python&lt;/a&gt;&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25645.html&quot;&gt;CVE-2026-25645&lt;/a&gt;&lt;/strong&gt;: Addresses an issue in Python allowing a local attacker to pre-create malicious files that could be reused and loaded without validation.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-4519.html&quot;&gt;CVE-2026-4519&lt;/a&gt;&lt;/strong&gt;: Fixes a command-line option injection in Python’s &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;webbrowser.open()&lt;/code&gt; where leading dashes in URLs could be interpreted as browser command-line arguments.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-13462.html&quot;&gt;CVE-2025-13462&lt;/a&gt;&lt;/strong&gt;: Addresses an issue where Python’s tarfile module can cause crafted archives to be misinterpreted.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-4224.html&quot;&gt;CVE-2026-4224&lt;/a&gt;&lt;/strong&gt;: Resolves a stack overflow that could lead to a crash.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://pypi.org/project/cryptography/&quot;&gt;python-cryptography&lt;/a&gt; 46.0.7&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-39892.html&quot;&gt;CVE-2026-39892&lt;/a&gt;&lt;/strong&gt;: Fixes a buffer overflow that can occurr when a non-contiguous buffer was passed to APIs accepting Python buffers.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://w3m.sourceforge.net/&quot;&gt;w3m&lt;/a&gt; 0.5.6&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2023-38252.html&quot;&gt;CVE-2023-38252&lt;/a&gt;&lt;/strong&gt;: Fixes an out-of-bounds read that could allow a crafted HTML file to cause a denial of service.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2023-38253.html&quot;&gt;CVE-2023-38253&lt;/a&gt;&lt;/strong&gt;: Fixes an out-of-bounds read that could allow a crafted HTML file to cause a denial of service.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://webkitgtk.org/&quot;&gt;webkitgtk3&lt;/a&gt; and &lt;a href=&quot;https://webkitgtk.org/&quot;&gt;webkitgtk4&lt;/a&gt; 2.52.1&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-43213.html&quot;&gt;CVE-2025-43213&lt;/a&gt;&lt;/strong&gt;: Fixes an issue where processing maliciously crafted web content could lead to an unexpected crash.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-43214.html&quot;&gt;CVE-2025-43214&lt;/a&gt;&lt;/strong&gt;: Addresses a flaw where processing maliciously crafted web content could cause an unexpected crash.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-43457.html&quot;&gt;CVE-2025-43457&lt;/a&gt;&lt;/strong&gt;: Resolves a vulnerability where processing maliciously crafted web content could lead to an unexpected crash.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-43511.html&quot;&gt;CVE-2025-43511&lt;/a&gt;&lt;/strong&gt;: Fixes an issue where processing maliciously crafted web content could lead to memory corruption.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-46299.html&quot;&gt;CVE-2025-46299&lt;/a&gt;&lt;/strong&gt;: Addresses a flaw in WebKit where processing maliciously crafted web content could lead to unexpected behavior.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-20608.html&quot;&gt;CVE-2026-20608&lt;/a&gt;&lt;/strong&gt;: Resolves a vulnerability where processing maliciously crafted web content could lead to memory corruption.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-20635.html&quot;&gt;CVE-2026-20635&lt;/a&gt;&lt;/strong&gt;: Fixes a WebKit flaw where processing maliciously crafted web content could cause an unexpected crash.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-20636.html&quot;&gt;CVE-2026-20636&lt;/a&gt;&lt;/strong&gt;: Addresses an issue where processing maliciously crafted web content could lead to memory corruption.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-20644.html&quot;&gt;CVE-2026-20644&lt;/a&gt;&lt;/strong&gt;: Resolves a WebKit vulnerability where processing maliciously crafted web content could lead to an unexpected crash.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-20652.html&quot;&gt;CVE-2026-20652&lt;/a&gt;&lt;/strong&gt;: Fixes an issue where processing maliciously crafted web content could cause memory corruption.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-20676.html&quot;&gt;CVE-2026-20676&lt;/a&gt;&lt;/strong&gt;: Addresses a WebKit flaw where processing maliciously crafted web content could lead to unexpected behavior or a crash.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-20643.html&quot;&gt;CVE-2026-20643&lt;/a&gt;&lt;/strong&gt;: Resolves a cross-origin issue in the Navigation API where processing maliciously crafted web content could bypass the Same Origin Policy.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-20664.html&quot;&gt;CVE-2026-20664&lt;/a&gt;&lt;/strong&gt;: Fixes a WebKit memory handling flaw where processing maliciously crafted web content could cause an unexpected process crash.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-20665.html&quot;&gt;CVE-2026-20665&lt;/a&gt;&lt;/strong&gt;: Addresses an issue where processing maliciously crafted web content could prevent Content Security Policy from being enforced.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-20691.html&quot;&gt;CVE-2026-20691&lt;/a&gt;&lt;/strong&gt;: Resolves an authorization flaw where a maliciously crafted webpage could be used to fingerprint the user.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-28857.html&quot;&gt;CVE-2026-28857&lt;/a&gt;&lt;/strong&gt;: Fixes a WebKit memory handling issue where processing maliciously crafted web content could cause an unexpected process crash.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-28859.html&quot;&gt;CVE-2026-28859&lt;/a&gt;&lt;/strong&gt;: Addresses a flaw where a malicious website could process restricted web content outside the sandbox.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-28861.html&quot;&gt;CVE-2026-28861&lt;/a&gt;&lt;/strong&gt;: Resolves a logic issue where a malicious website could access script message handlers intended for other origins.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-28871.html&quot;&gt;CVE-2026-28871&lt;/a&gt;&lt;/strong&gt;: Fixes a logic flaw where visiting a maliciously crafted website could lead to a cross-site scripting attack.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://sites.google.com/site/fullycapable/&quot;&gt;libcap&lt;/a&gt; 2.78&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-4878.html&quot;&gt;CVE-2026-4878&lt;/a&gt;&lt;/strong&gt;: Addresses a race condition that could lead to local privilege escalation.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://openjdk.org/&quot;&gt;OpenJDK 25&lt;/a&gt; 25.0.3&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-22007.html&quot;&gt;CVE-2026-22007&lt;/a&gt;&lt;/strong&gt;: Fixes an information disclosure vulnerability in the Security component of Java SE that could allow a local attacker to read a subset of accessible data.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-22008.html&quot;&gt;CVE-2026-22008&lt;/a&gt;&lt;/strong&gt;: Addresses a flaw in the Libraries component of Java SE that could allow an unauthenticated network attacker to modify some accessible data.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-22013.html&quot;&gt;CVE-2026-22013&lt;/a&gt;&lt;/strong&gt;: Resolves an information disclosure vulnerability in the JGSS component of Java SE that could expose critical data to an unauthenticated network attacker.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-22016.html&quot;&gt;CVE-2026-22016&lt;/a&gt;&lt;/strong&gt;: Fixes an information disclosure flaw in the JAXP component of Java SE that could allow an unauthenticated attacker to access critical data via network protocols.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-22018.html&quot;&gt;CVE-2026-22018&lt;/a&gt;&lt;/strong&gt;: Addresses a denial-of-service vulnerability in the Libraries component of Java SE that could be triggered by an unauthenticated network attacker.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-22021.html&quot;&gt;CVE-2026-22021&lt;/a&gt;&lt;/strong&gt;: Resolves a denial-of-service flaw in the JSSE component of Java SE exploitable via HTTPS by an unauthenticated attacker.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-23865.html&quot;&gt;CVE-2026-23865&lt;/a&gt;&lt;/strong&gt;: Fixes a vulnerability in the bundled FreeType library that could allow memory corruption when processing crafted font data.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-34268.html&quot;&gt;CVE-2026-34268&lt;/a&gt;&lt;/strong&gt;: A patch was added for an information disclosure issue in the Security component of Java SE that could allow a local attacker to read a subset of accessible data.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-34282.html&quot;&gt;CVE-2026-34282&lt;/a&gt;&lt;/strong&gt;: Addresses a denial-of-service vulnerability in the Networking component of Java SE that could allow an unauthenticated attacker to cause a complete crash or hang.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://flatpak.org/&quot;&gt;Flatpak&lt;/a&gt; 1.16.6&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-34078.html&quot;&gt;CVE-2026-34078&lt;/a&gt;&lt;/strong&gt;: Fixes a sandbox escape where the portal accepted app-controlled symlinks in sandbox-expose paths, allowing arbitrary host file access and code execution in the host context.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-34079.html&quot;&gt;CVE-2026-34079&lt;/a&gt;&lt;/strong&gt;: Addresses a path traversal flaw that could allow an app to delete arbitrary files on the host.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://wayland.freedesktop.org/libinput/doc/latest/&quot;&gt;libinput&lt;/a&gt; 1.31.1&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-35093.html&quot;&gt;CVE-2026-35093&lt;/a&gt;&lt;/strong&gt;: Fixes a code injection flaw where a local attacker could place a crafted Lua bytecode file in system or user configuration directories to bypass security restrictions and execute code with the privileges of the affected program.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-35094.html&quot;&gt;CVE-2026-35094&lt;/a&gt;&lt;/strong&gt;: Addresses a dangling pointer that could leak memory contents to system logs.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://github.com/OpenSC/OpenSC&quot;&gt;opensc&lt;/a&gt; 0.27.1&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-49010.html&quot;&gt;CVE-2025-49010&lt;/a&gt;&lt;/strong&gt;: Fixes a stack buffer overflow that could cause memory corruption.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-66215.html&quot;&gt;CVE-2025-66215&lt;/a&gt;&lt;/strong&gt;: Fixes a stack buffer overflow that could cause memory corruption. .&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-66038.html&quot;&gt;CVE-2025-66038&lt;/a&gt;&lt;/strong&gt;: Addresses an out-of-bounds read that could lead to memory corruption during smart card processing.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-66037.html&quot;&gt;CVE-2025-66037&lt;/a&gt;&lt;/strong&gt;: Addresses an out-of-bounds heap read that could lead to denial of service.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-13763.html&quot;&gt;CVE-2025-13763&lt;/a&gt;&lt;/strong&gt;: Fixes several uses of potentially uninitialized memory in OpenSC detected by fuzzers.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://tukaani.org/xz/&quot;&gt;XZ Utils&lt;/a&gt; 5.8.3&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-34743.html&quot;&gt;CVE-2026-34743&lt;/a&gt;&lt;/strong&gt;: Fixes a heap buffer overflow in XZ Utils where decoding an empty Index left lzma_index in a state that caused undersized allocation in a subsequent lzma_index_append() call.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://github.com/389ds&quot;&gt;389ds&lt;/a&gt; 3.1.4+e2562f589&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-14905.html&quot;&gt;CVE-2025-14905&lt;/a&gt;&lt;/strong&gt;: Fixes a heap buffer overflow caused by incorrect buffer size calculation that could potentially lead to denial of service or remote code execution.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://openexr.com/&quot;&gt;openexr&lt;/a&gt; 3.4.9&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-34589.html&quot;&gt;CVE-2026-34589&lt;/a&gt;&lt;/strong&gt;: Fixes a heap out-of-bounds write that could lead to memory corruption.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-34588.html&quot;&gt;CVE-2026-34588&lt;/a&gt;&lt;/strong&gt;: Addresses a signed 32-bit overflow leading to out-of-bounds read/write.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-34380.html&quot;&gt;CVE-2026-34380&lt;/a&gt;&lt;/strong&gt;: Resolves a signed integer overflow that could allow bounds-check bypass during PXR24 decompression.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-34379.html&quot;&gt;CVE-2026-34379&lt;/a&gt;&lt;/strong&gt;: Fixes a misaligned write leading to undefined behavior.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-34378.html&quot;&gt;CVE-2026-34378&lt;/a&gt;&lt;/strong&gt;: Addresses a signed integer overflow in generic_unpack() when parsing EXR files with crafted negative dataWindow.min.x values.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-34543.html&quot;&gt;CVE-2026-34543&lt;/a&gt;&lt;/strong&gt;: Resolves a heap information disclosure that could cause uninitialized heap memory to leak into output pixel data.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-34544.html&quot;&gt;CVE-2026-34544&lt;/a&gt;&lt;/strong&gt;: Fixes a signed integer overflow that could lead to an out-of-bounds write and memory corruption.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://gitlab.gnome.org/GNOME/evolution-data-server&quot;&gt;evolution-data-server&lt;/a&gt; 3.60.0&lt;/strong&gt;:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-2604.html&quot;&gt;CVE-2026-2604&lt;/a&gt;&lt;/strong&gt;: The advisory for this vulnerability indicates it involves an insecure local cache file removal.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://sssd.io/&quot;&gt;SSSD&lt;/a&gt; 2.13.0&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-6245.html&quot;&gt;CVE-2026-6245&lt;/a&gt;&lt;/strong&gt;: Fixes an out-of-bounds read in the PAM passkey responder.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://wiki.gnome.org/Projects/GLib&quot;&gt;glib2&lt;/a&gt; 2.88.0&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-23868.html&quot;&gt;CVE-2026-23868&lt;/a&gt;&lt;/strong&gt;: Fixes a vulnerability caused by a shallow copy that may lead to memory corruption.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-32776.html&quot;&gt;CVE-2026-32776&lt;/a&gt;&lt;/strong&gt;: Fixes a NULL pointer dereference when processing empty external parameter entity content.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-32777.html&quot;&gt;CVE-2026-32777&lt;/a&gt;&lt;/strong&gt;: Addresses an issue that could result in an infinite loop while parsing DTD content, potentially leading to a denial of service.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-32778.html&quot;&gt;CVE-2026-32778&lt;/a&gt;&lt;/strong&gt;: Resolves a NULL pointer dereference following an earlier out-of-memory condition.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.sudo.ws/&quot;&gt;sudo&lt;/a&gt;&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-35535.html&quot;&gt;CVE-2026-35535&lt;/a&gt;&lt;/strong&gt;: Fixes a privilege escalation in sudo where a failed setuid, setgid, or setgroups call during the privilege drop was not treated as a fatal error.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.cups.org/&quot;&gt;CUPS&lt;/a&gt; 2.4.17&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-27447.html&quot;&gt;CVE-2026-27447&lt;/a&gt;&lt;/strong&gt;: Fixes a case-sensitivity vulnerability in user/group handling that could allow access bypass.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-34978.html&quot;&gt;CVE-2026-34978&lt;/a&gt;&lt;/strong&gt;: Addresses a directory traversal flaw in the RSS notifier.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-34979.html&quot;&gt;CVE-2026-34979&lt;/a&gt;&lt;/strong&gt;: Resolves insufficient memory allocation for job options that could lead to buffer issues.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-34980.html&quot;&gt;CVE-2026-34980&lt;/a&gt;&lt;/strong&gt;: Fixes incomplete control character filtering in option values.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-34990.html&quot;&gt;CVE-2026-34990&lt;/a&gt;&lt;/strong&gt;: Addresses missing certificate validation over loopback connections.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-39314.html&quot;&gt;CVE-2026-39314&lt;/a&gt;&lt;/strong&gt;: Resolves a job password range check flaw.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-39316.html&quot;&gt;CVE-2026-39316&lt;/a&gt;&lt;/strong&gt;: Fixes a scheduler subscription bug that could be abused to disrupt printing.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://firefox-source-docs.mozilla.org/security/nss/index.html&quot;&gt;mozilla-nss&lt;/a&gt; 3.122.1&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;This release rolls up more than 30 fixes across the Network Security Services library, including patches for multiple heap use-after-free, integer overflow, and ASN.1 parsing vulnerabilities affecting TLS handling.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.ruby-lang.org/&quot;&gt;ruby4.0&lt;/a&gt; 4.0.3&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-41316.html&quot;&gt;CVE-2026-41316&lt;/a&gt;&lt;/strong&gt;: Fixes a vulnerability in the &lt;a href=&quot;https://docs.ruby-lang.org/en/master/ERB.html&quot;&gt;ERB&lt;/a&gt; component affecting &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;Marshal.load&lt;/code&gt; operations with untrusted data.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://lxml.de/&quot;&gt;python-lxml&lt;/a&gt; 6.1.0&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-41066.html&quot;&gt;CVE-2026-41066&lt;/a&gt;&lt;/strong&gt;: Fixes an external entity injection (XXE) vulnerability in &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;iterparse()&lt;/code&gt; that could allow disclosure of local files or server-side request forgery.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://gitlab.freedesktop.org/xorg/lib/libxpm&quot;&gt;libXpm&lt;/a&gt;&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-4367.html&quot;&gt;CVE-2026-4367&lt;/a&gt;&lt;/strong&gt;: Addresses an out-of-bounds read when parsing crafted XPM image files that could lead to information disclosure or a crash.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.thekelnetworks.org/projects/dnsmasq.html&quot;&gt;dnsmasq&lt;/a&gt;&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-6507.html&quot;&gt;CVE-2026-6507&lt;/a&gt;&lt;/strong&gt;: Fixes an out-of-bounds write in DHCP BOOTREPLY processing that could be triggered by a malicious DHCP server response.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;http://www.libpng.org/pub/png/libpng.html&quot;&gt;libpng16&lt;/a&gt; 1.6.57&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-34757.html&quot;&gt;CVE-2026-34757&lt;/a&gt;&lt;/strong&gt;: Fixes a use-after-free in chunk setters that could lead to memory corruption.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://libarchive.org/&quot;&gt;libarchive&lt;/a&gt; 3.8.7&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;Fixes a heap buffer overflow in CAB archive handling and a buffer overflow in the ISO9660 reader. Both flaws could be triggered by crafted archive files and are relevant given libarchive’s broad use across packaging and extraction tools.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://gitlab.gnome.org/GNOME/libxml2&quot;&gt;libxml2&lt;/a&gt; 2.15.3&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;This release rolls up multiple security fixes including a type confusion issue, a double-free, and a use-after-free in the XML parser.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://imagemagick.org/&quot;&gt;ImageMagick&lt;/a&gt; 7.1.2.19&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-33905.html&quot;&gt;CVE-2026-33905&lt;/a&gt;&lt;/strong&gt;: Fixes a flaw that could be triggered by crafted images and lead to a crash or memory corruption.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;http://www.graphicsmagick.org/&quot;&gt;GraphicsMagick&lt;/a&gt;&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-33535.html&quot;&gt;CVE-2026-33535&lt;/a&gt;&lt;/strong&gt;: Addresses an out-of-bounds write in X11 display interaction that could lead to a crash or potential code execution.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-26284.html&quot;&gt;CVE-2026-26284&lt;/a&gt;&lt;/strong&gt;: Fixes a heap overflow that could be triggered while processing crafted images.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://github.com/smuellerDD/leancrypto&quot;&gt;leancrypto&lt;/a&gt; 1.7.2&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-34610.html&quot;&gt;CVE-2026-34610&lt;/a&gt;&lt;/strong&gt;: Fixes an X.509 parsing flaw that could lead to certificate validation bypass.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.openldap.org/&quot;&gt;openldap2&lt;/a&gt; 2.6.13&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;Addresses a heap buffer overflow in &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;parse_whsp&lt;/code&gt; and a potential NULL pointer dereference, both of which could be triggered by malformed input to the LDAP server.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Users are advised to update to the latest versions to mitigate these vulnerabilities.&lt;/p&gt;

&lt;h2 id=&quot;conclusion&quot;&gt;Conclusion&lt;/h2&gt;

&lt;p&gt;April 2026 was a busy month for &lt;a href=&quot;https://get.opensuse.org/tumbleweed/&quot;&gt;openSUSE Tumbleweed&lt;/a&gt; with two of the largest desktop releases of the year landing back to back: &lt;a href=&quot;https://release.gnome.org/50/&quot;&gt;GNOME 50&lt;/a&gt; and &lt;a href=&quot;https://kde.org/announcements/gear/26.04.0/&quot;&gt;KDE Gear 26.04.0&lt;/a&gt;. &lt;a href=&quot;https://www.gtk.org/&quot;&gt;GTK4&lt;/a&gt; 4.22 introduced the new native &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;GtkSvg&lt;/code&gt; renderer and dropped the &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;librsvg&lt;/code&gt; dependency for icon rendering, while &lt;a href=&quot;https://www.libreoffice.org/&quot;&gt;LibreOffice&lt;/a&gt; 26.2 brought a fresh major office suite. Developers received major version bumps across &lt;a href=&quot;https://www.php.net/&quot;&gt;PHP&lt;/a&gt; 8.5, &lt;a href=&quot;https://www.sqlite.org/&quot;&gt;SQLite&lt;/a&gt; 3.53, &lt;a href=&quot;https://wiki.linuxfoundation.org/networking/iproute2&quot;&gt;iproute2&lt;/a&gt; 7.0, &lt;a href=&quot;https://www.nano-editor.org/&quot;&gt;nano&lt;/a&gt; 9.0, and the &lt;a href=&quot;https://wireless.wiki.kernel.org/en/users/documentation/iw&quot;&gt;iw&lt;/a&gt; wireless tool. Security continued to be a heavy theme with &lt;a href=&quot;https://webkitgtk.org/&quot;&gt;WebKitGTK&lt;/a&gt;, &lt;a href=&quot;https://www.cups.org/&quot;&gt;CUPS&lt;/a&gt;, &lt;a href=&quot;https://www.python.org/&quot;&gt;Python&lt;/a&gt;, &lt;a href=&quot;https://flatpak.org/&quot;&gt;Flatpak&lt;/a&gt;, &lt;a href=&quot;https://www.sudo.ws/&quot;&gt;sudo&lt;/a&gt;, and &lt;a href=&quot;https://openexr.com/&quot;&gt;OpenEXR&lt;/a&gt; all receiving multiple &lt;a href=&quot;https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures&quot;&gt;CVE&lt;/a&gt; fixes alongside a steady cadence of cryptographic library hardening from &lt;a href=&quot;https://firefox-source-docs.mozilla.org/security/nss/index.html&quot;&gt;mozilla-nss&lt;/a&gt;, &lt;a href=&quot;https://www.gnupg.org/software/libgcrypt/&quot;&gt;libgcrypt&lt;/a&gt;, and &lt;a href=&quot;https://github.com/smuellerDD/leancrypto&quot;&gt;leancrypto&lt;/a&gt;.&lt;/p&gt;

&lt;h3 id=&quot;slowroll-arrivals&quot;&gt;Slowroll Arrivals&lt;/h3&gt;
&lt;p&gt;Please note that these updates also apply to &lt;a href=&quot;https://en.opensuse.org/openSUSE:Slowroll&quot;&gt;Slowroll&lt;/a&gt; and arrive between an average of 5 to 10 days after being released in Tumbleweed snapshot. This monthly approach has been consistent for many months, ensuring stability and timely enhancements for users. Updated packages for Slowroll are regularly published in emails on &lt;a href=&quot;https://lists.opensuse.org/archives/list/factory@lists.opensuse.org/&quot;&gt;openSUSE Factory mailing list&lt;/a&gt;.&lt;/p&gt;

&lt;h3 id=&quot;contributing-to-opensuse-tumbleweed&quot;&gt;Contributing to openSUSE Tumbleweed&lt;/h3&gt;
&lt;p&gt;Stay updated with the latest snapshots by subscribing to the openSUSE Factory mailing list.
For those Tumbleweed users who want to contribute or want to engage with detailed technological discussions, subscribe to the &lt;a href=&quot;https://lists.opensuse.org/archives/list/factory@lists.opensuse.org/&quot;&gt;openSUSE Factory mailing list &lt;/a&gt;. The openSUSE team encourages users to continue participating through bug reports, feature suggestions and discussions.&lt;/p&gt;

&lt;p&gt;Your contributions and feedback make openSUSE Tumbleweed better with every update. Whether reporting bugs, suggesting features, or participating in community discussions, your involvement is highly valued.&lt;/p&gt;

&lt;meta name=&quot;Linux, rolling release, developers, sysadmins, power users,
KDE, Plasma, KDE Gear, KDE Frameworks,
GNOME, cups, Wayland, Kernel, kernel-source, Slowroll, open source, copyfail&quot; content=&quot;HTML,CSS,XML,JavaScript&quot; /&gt;

</content:encoded>
    </item>

    <item>
      <guid>https://news.opensuse.org/2026/04/29/opensuse-asia-summit-2026-call-for-speakers/</guid>
      <title>openSUSE Asia Summit 2026 Call for Speakers</title>
      <pubDate>Wed, 29 Apr 2026 17:30:00 +0000</pubDate>
      <link>https://news.opensuse.org/2026/04/29/opensuse-asia-summit-2026-call-for-speakers/</link>
      <author>admin@opensuse.org (openSUSE Asia Summit Team)</author>
      <enclosure url="https://news.opensuse.org/wp-content/uploads/2025/12/yogyakarta.png" length="286780" type="image/png" />
      <description>We are excited to announce that the Call for Speakers for openSUSE.Asia Summit 2026 is now open! This year, the Summit will take place on October 3–4, 2026, at the Teaching Industry Learning Center (TILC), Vocational School, Universitas Gadjah Mada (UGM), Yogyakarta, Indonesia. For more details, stay tuned to our...</description>
      <content:encoded>&lt;p&gt;We are excited to announce that the Call for Speakers for &lt;a href=&quot;https://events.opensuse.org/conferences/oSAS26&quot;&gt;openSUSE.Asia Summit 2026&lt;/a&gt; is now open! This year, the Summit will take place on October 3–4, 2026, at the Teaching Industry Learning Center (TILC), Vocational School, Universitas Gadjah Mada (UGM), Yogyakarta, Indonesia. For more details, stay tuned to our official channels and &lt;a href=&quot;https://news.opensuse.org/&quot;&gt;news portal&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;The openSUSE.Asia committee invites speakers from all backgrounds to share their knowledge, experience, and passion for openSUSE and open source. Speakers may also apply for support from the &lt;a href=&quot;https://en.opensuse.org/openSUSE:Travel_Support_Program&quot;&gt;openSUSE Travel Support Program (TSP)&lt;/a&gt;. We encourage everyone, near or far, to submit their proposals and join us in Yogyakarta!&lt;/p&gt;

&lt;h3 id=&quot;topics&quot;&gt;Topics&lt;/h3&gt;

&lt;p&gt;The examples of the topics (not limited to) are as the following:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;openSUSE (e.g., Leap, Tumbleweed, Micro OS, Open Build Services, openQA, YaST)&lt;/li&gt;
  &lt;li&gt;Desktop environments and applications (e.g., GNOME, KDE, XFCE)&lt;/li&gt;
  &lt;li&gt;Office suite, graphic art, multimedia (e.g., LibreOffice, Calligra, GIMP, Inkscape)&lt;/li&gt;
  &lt;li&gt;Multilingualization support (e.g., input methods, translation)&lt;/li&gt;
  &lt;li&gt;Cloud, Virtualization, Container, and Container Orchestration (e.g., Kubernetes, Rancher)&lt;/li&gt;
  &lt;li&gt;Package supply-chain security, vulnerability management&lt;/li&gt;
  &lt;li&gt;Embedded and IoT&lt;/li&gt;
  &lt;li&gt;Other applications running on openSUSE&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Topics that are not related to a specific technology are also welcome. For example:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;An overview of FLOSS technologies&lt;/li&gt;
  &lt;li&gt;Development, Quality Assurance, Translation&lt;/li&gt;
  &lt;li&gt;Tips &amp;amp; Tricks, Experience stories (success or fail), Best practice&lt;/li&gt;
  &lt;li&gt;Marketing and community management&lt;/li&gt;
  &lt;li&gt;Education&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;types-of-sessions&quot;&gt;Types of sessions&lt;/h3&gt;

&lt;p&gt;We are inviting proposals for these two types of sessions.&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;Long talks with presentation (45 min. + Q&amp;amp;A)&lt;/li&gt;
  &lt;li&gt;Short talks with presentation (30 min. + Q&amp;amp;A)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Lighting talk sessions (5 min.) will be announced later.&lt;/p&gt;

&lt;h3 id=&quot;schedule&quot;&gt;Schedule&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;Proposal submission deadline: 1 July, 2026&lt;/li&gt;
  &lt;li&gt;Notification to speakers: 21 July, 2026&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;how-to-submit-your-proposal-document&quot;&gt;How to submit your proposal document&lt;/h3&gt;

&lt;p&gt;Please submit your proposal at &lt;a href=&quot;https://events.opensuse.org/conferences/oSAS26/&quot;&gt;events.opensuse.org&lt;/a&gt;. If you do not have a SUSE community account, please sign up before submitting your proposal.&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;You must follow &lt;a href=&quot;https://en.opensuse.org/openSUSE:Conference_code_of_conduct&quot;&gt;the openSUSE Conference Code of Conduct&lt;/a&gt;.&lt;/li&gt;
  &lt;li&gt;Your proposal should be written in English, between 130 and 250 words, and have a clear, relevant title.&lt;/li&gt;
  &lt;li&gt;Please check for spelling and grammar before submitting, using tools like LibreOffice, Google Docs, or Grammarly.&lt;/li&gt;
  &lt;li&gt;See &lt;a href=&quot;https://en.opensuse.org/openSUSE:Asia_Summit_How_to_Write_a_Good_Proposal&quot;&gt;our guide&lt;/a&gt; for tips on writing a great proposal.&lt;/li&gt;
  &lt;li&gt;If you need help, contact &lt;a href=&quot;https://en.opensuse.org/openSUSE:Asia_Organization_Committee#The_list_of_committees&quot;&gt;committee members&lt;/a&gt; in your country or region.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;requirements-for-your-presentation&quot;&gt;Requirements for your presentation&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;You may present in English or Bahasa Indonesia, but all documents and slides must be in English.&lt;/li&gt;
  &lt;li&gt;Speakers must be present at the venue; prerecorded videos and remote presentations are not allowed.&lt;/li&gt;
&lt;/ul&gt;
</content:encoded>
    </item>

    <item>
      <guid>https://news.opensuse.org/2026/04/28/quantum-opensuse/</guid>
      <title>Quantum-Resilient Cryptography in the openSUSE Ecosystem</title>
      <pubDate>Tue, 28 Apr 2026 04:00:00 +0000</pubDate>
      <link>https://news.opensuse.org/2026/04/28/quantum-opensuse/</link>
      <author>admin@opensuse.org (Alessandro de Oliveira Faria)</author>
      <enclosure url="https://news.opensuse.org/wp-content/uploads/2026/04/logo-libzupt.jpg" length="23395" type="image/jpeg" />
      <description>It is with great joy that I officially announce the release in the openSUSE family (Leap and Tumbleweed) of the new package focused on cryptography resistant to the post-quantum era. The libzupt library is designed to offer encryption and decryption of files and binary data in memory using a hybrid...</description>
      <content:encoded>&lt;p&gt;It is with great joy that I officially announce the release in the openSUSE family (Leap and Tumbleweed) of the new package focused on cryptography resistant to the post-quantum era.&lt;/p&gt;

&lt;p&gt;The &lt;a href=&quot;https://software.opensuse.org/package/libzupt&quot;&gt;libzupt&lt;/a&gt; library is designed to offer encryption and decryption of files and binary data in memory using a hybrid approach based on &lt;strong&gt;ML-KEM-768 + X25519.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;libzupt&lt;/strong&gt; is a modern SDK that simplifies the adoption of post-quantum cryptography in real-world applications. Currently, it has initial support for C++, Python, and Java, with support for Node.js (under development). Its goal is to make the implementation of advanced cryptographic mechanisms accessible without compromising usability for developers.&lt;/p&gt;

&lt;p&gt;libzupt, created by Alessandro de Oliveira Faria, is a modern SDK that simplifies the adoption of post-quantum cryptography in real-world applications. Currently, it has initial support for C++, Python, and Java, with Node.js support (under development). Its goal is to make the implementation of advanced cryptographic mechanisms accessible without compromising usability for developers.&lt;/p&gt;

&lt;p&gt;The project originates from the &lt;strong&gt;Zupt&lt;/strong&gt; initiative, conceived by Cristian Cezar Moisés. As a tribute, the library inherited the name of the original project. Zupt, in turn, is a compression and backup tool that already incorporated advanced concepts such as authenticated AES-256 encryption and post-quantum key encapsulation.&lt;/p&gt;

&lt;p&gt;The motivation behind libzupt is directly linked to the evolution of modern cryptography. The ML-KEM algorithm was standardized by &lt;a href=&quot;https://csrc.nist.gov/pubs/fips/203/final&quot;&gt;NIST on August 13, 2024&lt;/a&gt;, as a secure key encapsulation mechanism for post-quantum scenarios. It allows for the secure establishment of keys even in insecure channels, anticipating future threats.&lt;/p&gt;

&lt;p&gt;Below is a simple example of using libzupt in Python:&lt;/p&gt;

&lt;div class=&quot;language-plaintext highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;import zupt
encryptor = zupt.Encryptor(keypair.public_key)
message = b&quot;Hello, Post-Quantum World! This is a secret message.&quot;
ciphertext, enc_header = encryptor.encrypt(message)

&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;p&gt;The main benefit of natively providing this library in openSUSE, is that it allows current applications to be prepared for a scenario where quantum computing could compromise classical algorithms, such as Shor’s Algorithm.&lt;/p&gt;

&lt;p&gt;By combining traditional cryptography with mechanisms resistant to quantum computing, libzupt adds a strategic layer of protection. This enables the development of more resilient systems, ensuring the confidentiality and integrity of data in the long term, even in the face of technological evolution.&lt;/p&gt;

&lt;p&gt;For more information, go to &lt;a href=&quot;https://software.opensuse.org/package/libzupt&quot;&gt;software opensuse&lt;/a&gt; or the &lt;a href=&quot;https://github.com/cabelo/libzupt&quot;&gt;source&lt;/a&gt;.&lt;/p&gt;

</content:encoded>
    </item>

    <item>
      <guid>https://news.opensuse.org/2026/04/27/planet-roundup/</guid>
      <title>Planet News Roundup</title>
      <pubDate>Mon, 27 Apr 2026 08:00:00 +0000</pubDate>
      <link>https://news.opensuse.org/2026/04/27/planet-roundup/</link>
      <author>admin@opensuse.org (Douglas DeMaio)</author>
      <enclosure url="https://news.opensuse.org/wp-content/uploads/2025/07/planet.png" length="78165" type="image/png" />
      <description>This is a roundup of articles from the openSUSE community listed on planet.opensuse.org. The community blog feed aggregator lists the featured highlights below from April 17 to 23. Blogs this week cover a Tumbleweed weekly review delivering seven snapshots with notable updates including GNOME 50, KDE Plasma 6.6.4, and Linux...</description>
      <content:encoded>&lt;p&gt;This is a roundup of articles from the openSUSE community listed on &lt;a href=&quot;https://planet.opensuse.org&quot;&gt;planet.opensuse.org&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;The community blog feed aggregator lists the featured highlights below from April 17 to 23.&lt;/p&gt;

&lt;p&gt;Blogs this week cover a Tumbleweed weekly review delivering seven snapshots with notable updates including GNOME 50, KDE Plasma 6.6.4, and Linux kernel 6.19.12. The week also features the venue announcement for openSUSE.Asia Summit 2026 in Yogyakarta, a SUSE Security Team winter spotlight, performance tuning improvements in syslog-ng, a hands-on look at Cockpit as a YaST replacement, and more.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Here is a summary and links for each post:&lt;/strong&gt;&lt;/p&gt;

&lt;h2 id=&quot;kookbook-updates-to-version-030&quot;&gt;&lt;a href=&quot;https://www.kdeblog.com/kookbook-se-actualiza-a-la-version-0-3-0.html&quot;&gt;Kookbook Updates to Version 0.3.0&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.kdeblog.com/&quot;&gt;KDE Blog&lt;/a&gt; covers the 0.3.0 release of Kookbook, a recipe management application created by KDE developer Sune Vuorela. The update brings minor bug fixes along with a migration to Qt6. The application stores recipes as Markdown files and offers ingredient indexing, tag-based organization, and flexible synchronization through external tools like Git or Nextcloud.&lt;/p&gt;

&lt;h2 id=&quot;testing-cockpit-the-yast-replacement-in-opensuse-tumbleweed&quot;&gt;&lt;a href=&quot;https://victorhckinthefreeworld.com/2026/04/22/probando-cockpit-el-sustituto-de-yast-en-opensuse-tumbleweed/&quot;&gt;Testing Cockpit, the YaST Replacement in openSUSE Tumbleweed&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;&lt;a href=&quot;https://victorhckinthefreeworld.com/&quot;&gt;Victorhck in the Free World&lt;/a&gt; explores Cockpit, the web-based system management tool that is replacing YaST in openSUSE. After installing the cockpit-client-launcher and resolving missing GTK dependencies, the author found the interface clean and well-organized with familiar configuration options alongside modern features for managing storage, networks, and software repositories.&lt;/p&gt;

&lt;h2 id=&quot;new-performance-tuning-possibilities-in-syslog-ng&quot;&gt;&lt;a href=&quot;https://peter.czanik.hu/other/syslog-ng-new-performance-tuning-possibilities/&quot;&gt;New Performance Tuning Possibilities in syslog-ng&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;&lt;a href=&quot;https://peter.czanik.hu/&quot;&gt;Peter Czánik’s Blog&lt;/a&gt; discusses performance enhancements coming to syslog-ng 4.12 that achieved seven million events per second under laboratory conditions. While the figure represents a benchmark rather than a real-world deployment number, Peter explains that the underlying technologies are already available on the development branch or have existed for some time but lacked sufficient promotion and testing.&lt;/p&gt;

&lt;h2 id=&quot;best-jpg-to-pdf-converters-for-speed-and-ease&quot;&gt;&lt;a href=&quot;https://www.kdeblog.com/mejores-convertidores-de-jpg-a-pdf-por-rapidez-y-facilidad.html&quot;&gt;Best JPG to PDF Converters for Speed and Ease&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.kdeblog.com/&quot;&gt;KDE Blog&lt;/a&gt; evaluates a range of JPG to PDF conversion tools, from desktop options like KDE Plasma’s Service Menus to online platforms such as Adobe Acrobat Online and iLovePDF. The post weighs each tool’s strengths regarding conversion speed, ease of use, and privacy, and also covers mobile solutions like CamScanner for document digitization.&lt;/p&gt;

&lt;h2 id=&quot;ai-workshop-at-linux-center-valencia&quot;&gt;&lt;a href=&quot;https://www.kdeblog.com/jornada-de-ia-en-linux-center-valencia.html&quot;&gt;AI Workshop at Linux Center Valencia&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.kdeblog.com/&quot;&gt;KDE Blog&lt;/a&gt; announces a free AI-focused event organized by Slimbook at their Linux Center facility in Paterna, Valencia on April 25, 2026. The workshop features three sessions: an overview of current AI tools, a hands-on tutorial for running AI locally using Ollama and Fox, and an advanced session on creating autonomous AI assistants for personal computers.&lt;/p&gt;

&lt;h2 id=&quot;from-virtual-desktop-deployment-to-running-local-ai--new-barcelona-free-software-talk&quot;&gt;&lt;a href=&quot;https://www.kdeblog.com/de-desplegar-escritorios-virtuales-a-ejecutar-ia-locales-nueva-charla-de-barcelona-free-software.html&quot;&gt;From Virtual Desktop Deployment to Running Local AI – New Barcelona Free Software Talk&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.kdeblog.com/&quot;&gt;KDE Blog&lt;/a&gt; announces a Barcelona Free Software talk on Tuesday April 28, 2026 at 19:00 at Akasha Hub in Barcelona, featuring Alberto Larraz, co-founder of IsardVDI. The talk traces IsardVDI’s 14-year journey from a Free Software alternative to Citrix and VMware Horizon in educational settings to a versatile platform that now leverages GPU management to run local AI inference workloads. Attendees will learn how IsardVDI can be used to generate images, run LLM chats, and power local code assistants using sovereign AI models.&lt;/p&gt;

&lt;h2 id=&quot;suse-security-team-spotlight-winter-20252026&quot;&gt;&lt;a href=&quot;https://security.opensuse.org/2026/04/20/winter-spotlight.html&quot;&gt;SUSE Security Team Spotlight Winter 2025/2026&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://security.opensuse.org/&quot;&gt;SUSE Security Team&lt;/a&gt; winter report documents code review activities across multiple software projects. The team examined systemd releases v258 through v260, snapd transparency features, various D-Bus services including bootkitd and rtkit, and investigated SteamOS and Deepin desktop components. A revisit of Deepin software revealed persistent vulnerabilities in the accounts service, prompting the team to deprioritize future Deepin reviews.&lt;/p&gt;

&lt;h2 id=&quot;opensuseasia-summit-2026-announces-venue-at-universitas-gadjah-mada&quot;&gt;&lt;a href=&quot;https://news.opensuse.org/2026/04/19/opensuse-asia-summit-2026-announces-venue/&quot;&gt;openSUSE.Asia Summit 2026 Announces Venue at Universitas Gadjah Mada&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;&lt;a href=&quot;https://news.opensuse.org/&quot;&gt;openSUSE News&lt;/a&gt; announces that the openSUSE.Asia Summit 2026 will be held October 3–4 at the Teaching Industry Learning Center of Universitas Gadjah Mada in Yogyakarta, Indonesia. Organizers anticipate around 350 participants over two days of talks, workshops, and community activities. The venue was selected for its modern facilities and the university’s strong reputation as a leading Indonesian institution focused on education, research, and innovation.&lt;/p&gt;

&lt;h2 id=&quot;per-screen-virtual-desktops-and-wayland-session-restore--this-week-in-plasma&quot;&gt;&lt;a href=&quot;https://www.kdeblog.com/escritorios-virtuales-por-pantalla-y-restauracion-de-sesion-en-wayland-esta-semana-en-plasma.html&quot;&gt;Per-Screen Virtual Desktops and Wayland Session Restore – This Week in Plasma&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.kdeblog.com/&quot;&gt;KDE Blog&lt;/a&gt; covers the latest &lt;em&gt;This Week in Plasma&lt;/em&gt; highlights, including a major new feature in Plasma 6.7 that allows each monitor to independently switch between virtual desktops. KWin has also gained support for the Wayland session management protocol, paving the way for applications to remember their size and position after a system restart. The edition also rounds up numerous UI improvements, such as drag-and-drop support for app launchers, a new standard Badge component in Kirigami, and a range of bug fixes across Plasma 6.6.4, 6.6.5, and 6.7.&lt;/p&gt;

&lt;h2 id=&quot;hello-old-new-projects-directory&quot;&gt;&lt;a href=&quot;https://blog.tenstral.net/2026/04/hello-projects-directory.html&quot;&gt;Hello Old New ‘Projects’ Directory!&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;&lt;a href=&quot;https://blog.tenstral.net/&quot;&gt;Matthias Klumpp’s Blog&lt;/a&gt; introduces the xdg-user-dirs 0.20 release, which now enables a Projects directory by default in Linux home folders. The folder offers a standardized location for project files that do not cleanly belong in existing categories like Documents or Music. Users who prefer the old layout can simply delete the folder and the utility will adjust accordingly, while administrators can customize default locations through configuration files.&lt;/p&gt;

&lt;h2 id=&quot;tumbleweed--review-of-the-week-202616&quot;&gt;Tumbleweed – Review of the Week 2026/16&lt;/h2&gt;

&lt;p&gt;&lt;a href=&quot;https://victorhckinthefreeworld.com/2026/04/17/opensuse-tumbleweed-revision-de-la-semana-16-de-2026/&quot;&gt;Victorhck&lt;/a&gt; and &lt;a href=&quot;https://dominique.leuenberger.net/blog/2026/04/tumbleweed-review-of-the-week-2026-16/&quot;&gt;dimstar&lt;/a&gt; cover a busy week with seven Tumbleweed snapshots delivered in seven days across snapshots 0410 through 0416. Major updates included GNOME 50, KDE Plasma 6.6.4, Samba 4.23.6, PHP 8.4.20, GStreamer 1.28.2, and Linux kernel 6.19.12, along with improvements to transactional-update’s soft-reboot functionality. Looking ahead, the team is preparing significant upgrades such as Linux kernel 7.0, LLVM 22, and GCC 16 as the system compiler.&lt;/p&gt;

&lt;h2 id=&quot;episode-72-of-kde-express-plasma-664-gear-2604-and-more-news&quot;&gt;&lt;a href=&quot;https://www.kdeblog.com/episodio-72-de-kde-express-plasma-6-6-4-gear-26-04-y-muchas-noticias.html&quot;&gt;Episode 72 of KDE Express: Plasma 6.6.4, Gear 26.04 and More News&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.kdeblog.com/&quot;&gt;KDE Blog&lt;/a&gt; shares the latest episode of KDE Express, a Spanish-language podcast covering the KDE community and open source software. The episode highlights significant releases including Plasma 6.6.4 and KDE Gear 26.04, along with developments across various KDE applications and distributions.&lt;/p&gt;

&lt;p&gt;View more blogs or learn to publish your own on &lt;a href=&quot;https://planet.opensuse.org&quot;&gt;planet.opensuse.org&lt;/a&gt;.&lt;/p&gt;

&lt;meta name=&quot;openSUSE, Open Source, development, Linux, secure operating systems, open source, plasma, GNOME, KDE, Cockpit, syslog-ng, Tumbleweed, AI&quot; content=&quot;HTML,CSS,XML,JavaScript&quot; /&gt;

</content:encoded>
    </item>

    <item>
      <guid>https://news.opensuse.org/2026/04/19/opensuse-asia-summit-2026-announces-venue/</guid>
      <title>openSUSE.Asia Summit 2026 Announces Venue at Universitas Gadjah Mada</title>
      <pubDate>Sun, 19 Apr 2026 17:30:00 +0000</pubDate>
      <link>https://news.opensuse.org/2026/04/19/opensuse-asia-summit-2026-announces-venue/</link>
      <author>admin@opensuse.org (openSUSE Asia Summit Team)</author>
      <enclosure url="https://news.opensuse.org/wp-content/uploads/2026/04/sv-ugm-utara-tilc.jpg" length="1445882" type="image/jpeg" />
      <description>The openSUSE.Asia Summit 2026 team is excited to announce the official venue for this year’s conference. The summit will be held at Universitas Gadjah Mada (UGM) in Yogyakarta, Indonesia. The event will take place at the Teaching Industry Learning Center (TILC) of the Vocational School, a modern facility designed to...</description>
      <content:encoded>&lt;p&gt;The &lt;a href=&quot;https://events.opensuse.org/conferences/oSAS26&quot;&gt;openSUSE.Asia Summit 2026&lt;/a&gt; team is excited to announce the official venue for this year’s conference. The summit will be held at &lt;strong&gt;Universitas Gadjah Mada (UGM)&lt;/strong&gt; in Yogyakarta, Indonesia.&lt;/p&gt;

&lt;p&gt;The event will take place at the Teaching Industry Learning Center (TILC) of the Vocational School, a modern facility designed to support collaboration, learning, and industry engagement. The summit is expected to welcome around 350 participants over two days of talks, workshops, and community activities.&lt;/p&gt;

&lt;h2 id=&quot;date--venue&quot;&gt;Date &amp;amp; Venue&lt;/h2&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;strong&gt;Dates:&lt;/strong&gt; 3–4 October 2026&lt;br /&gt;
&lt;strong&gt;Venue: &lt;em&gt;Teaching Industry Learning Center (TILC), Vocational School&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;
Universitas Gadjah Mada (UGM)&lt;br /&gt;
Jl. Blimbingsari No.37, Caturtunggal, Depok, Sleman&lt;br /&gt;
Special Region of Yogyakarta, Indonesia&lt;br /&gt;
&lt;a href=&quot;https://www.openstreetmap.org/way/1360825096#map=19/-7.773950/110.372681&quot;&gt;OpenStreetMap&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;We look forward to welcoming you to the UGM campus — a place where academic excellence meets a vibrant student and technology community.&lt;/p&gt;

&lt;h2 id=&quot;about-universitas-gadjah-mada&quot;&gt;About Universitas Gadjah Mada&lt;/h2&gt;

&lt;p&gt;Founded in 1949, Universitas Gadjah Mada is one of Indonesia’s leading universities and a symbol of national education and cultural identity. Starting with just six faculties, UGM has grown into a comprehensive institution with 18 faculties, a graduate school, and a vocational school.
Today, UGM continues to play a key role in education, research, and innovation, making it an ideal setting for the openSUSE.Asia Summit.&lt;/p&gt;

&lt;h2 id=&quot;who-should-attend&quot;&gt;Who Should Attend&lt;/h2&gt;

&lt;p&gt;We expect more than 350 participants, including:&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;openSUSE contributors and users&lt;/li&gt;
  &lt;li&gt;ICT professionals and industry representatives&lt;/li&gt;
  &lt;li&gt;Free and Open Source Software (FOSS) enthusiasts&lt;/li&gt;
  &lt;li&gt;Students interested in open-source technologies and development&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We can’t wait to welcome you to Yogyakarta — see you on campus at Universitas Gadjah Mada! 🦎🌏&lt;/p&gt;
</content:encoded>
    </item>

    <item>
      <guid>https://news.opensuse.org/2026/04/17/planet-roundup/</guid>
      <title>Planet News Roundup</title>
      <pubDate>Fri, 17 Apr 2026 08:00:00 +0000</pubDate>
      <link>https://news.opensuse.org/2026/04/17/planet-roundup/</link>
      <author>admin@opensuse.org (Douglas DeMaio)</author>
      <enclosure url="https://news.opensuse.org/wp-content/uploads/2025/07/planet.png" length="78165" type="image/png" />
      <description>This is a roundup of articles from the openSUSE community listed on planet.opensuse.org. The community blog feed aggregator lists the featured highlights below from April 10 to 16. Blogs this week cover a combined two-week Tumbleweed review delivering 10 snapshots with notable updates including the Linux kernel, Qt 6.11.0, and...</description>
      <content:encoded>&lt;p&gt;This is a roundup of articles from the openSUSE community listed on &lt;a href=&quot;https://planet.opensuse.org&quot;&gt;planet.opensuse.org&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;The community blog feed aggregator lists the featured highlights below from April 10 to 16.&lt;/p&gt;

&lt;p&gt;Blogs this week cover a combined two-week Tumbleweed review delivering 10 snapshots with notable updates including the Linux kernel, Qt 6.11.0, and GIMP 3.2.2. A follow-up on the growing ARMv9 build infrastructure, an updated version of OpenVINO, &lt;a href=&quot;https://akademy.kde.org/2026/&quot;&gt;KDE Akademy 2026&lt;/a&gt; in Graz, and more.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Here is a summary and links for each post:&lt;/strong&gt;&lt;/p&gt;

&lt;h2 id=&quot;openvino-20261-more-models-performance-and-a-real-jump-in-multimodal-ai&quot;&gt;&lt;a href=&quot;https://assuntonerd.com.br/2026/04/16/openvino-2026-1-mais-modelos-performance-e-um-salto-real-na-ia-multimodal/&quot;&gt;OpenVINO 2026.1: More Models, Performance and a Real Jump in Multimodal AI&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;&lt;a href=&quot;https://assuntonerd.com.br/&quot;&gt;Alessandro’s Blog&lt;/a&gt; covers the release of OpenVINO 2026.1. The post highlights expanded support for large and multimodal models like GPT-OSS 120B running on CPU and Qwen3-VL across CPU and GPU while pointing out improvements to the OpenVINO Model Server. Alessandro emphasizes the practical value of dynamic LoRA for vision-language models, which lets teams swap adapters at runtime without reloading the base model, which helps cut memory overhead and latency in production.&lt;/p&gt;

&lt;h2 id=&quot;discussing-rto-in-my-genesi-t-shirt&quot;&gt;&lt;a href=&quot;https://peter.czanik.hu/posts/genesi-rto/&quot;&gt;Discussing RTO in My Genesi T-Shirt&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;&lt;a href=&quot;https://peter.czanik.hu/&quot;&gt;Peter Czánik’s Blog&lt;/a&gt; reflects on a conversation with friends about return-to-office policies, prompted by wearing a t-shirt from Genesi, the US company where he first experienced fully remote work in the early days of his career. The post contrasts that flexible, asynchronous work culture with the rigid schedules of other professions like teachers.&lt;/p&gt;

&lt;h2 id=&quot;new-configurator-for-plasma-66&quot;&gt;&lt;a href=&quot;https://www.kdeblog.com/nuevo-configurador-para-de-plasma-6-6.html&quot;&gt;New Configurator for Plasma 6.6&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.kdeblog.com/&quot;&gt;KDE Blog&lt;/a&gt; highlights the new Plasma Setup wizard introduced in Plasma 6.6, which is a first-run tool that creates and configures user accounts independently of the operating system installation process. The separation of technical installation steps from user setup steps makes it easier to hand off a device. It is part of Plasma 6.6’s broader focus on improving usability and accessibility for new and reconditioned hardware.&lt;/p&gt;

&lt;h2 id=&quot;streaming-syslog-ng-data-to-your-lakehouse-using-opentelemetry&quot;&gt;&lt;a href=&quot;https://peter.czanik.hu/other/syslog-ng-streaming-data-to-your-lakehouse-using-opentelemetry/&quot;&gt;Streaming syslog-ng Data to Your Lakehouse Using OpenTelemetry&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;&lt;a href=&quot;https://peter.czanik.hu/&quot;&gt;Peter Czánik’s Blog&lt;/a&gt; explains how Databricks contributed OAuth2 authentication improvements to syslog-ng 4.11.0, which enables customers to stream logs to data lakehouses via the OpenTelemetry protocol. The contributions extended OAuth2 support to gRPC-based destinations including OpenTelemetry, Loki, BigQuery, and ClickHouse.&lt;/p&gt;

&lt;h2 id=&quot;librecan-2026-the-meeting-of-free-software-in-the-canary-islands-grows&quot;&gt;&lt;a href=&quot;https://victorhckinthefreeworld.com/2026/04/15/librecan-2026-el-encuentro-de-software-libre-en-canarias-crece/&quot;&gt;LibreCan 2026: The meeting of free software in the Canary Islands grows&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;&lt;a href=&quot;https://victorhckinthefreeworld.com/&quot;&gt;Victorhck in the Free World&lt;/a&gt; promotes the second edition of LibreCan, a free software and hacker culture meetup taking place in the Canary Islands in May 2026. The event has grown since its first edition in 2025 and brings together free software enthusiasts from across the islands.&lt;/p&gt;

&lt;h2 id=&quot;la-palma-tech-tagoror-regresa-este-2026&quot;&gt;&lt;a href=&quot;https://www.kdeblog.com/iconos-elegantes-gris-y-naranja-o-azul-o-verde-para-tu-pc.html&quot;&gt;La Palma Tech Tagoror regresa este 2026&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.kdeblog.com/&quot;&gt;KDE Blog&lt;/a&gt; discusses a series of meetups of the group “San Miguel de la Palma Tech”. The event is planned for April 23, 2026, from 18:00 to 20:00 (Canary time) and is being nicknamed “La Palma Tech Spring 2026”.&lt;/p&gt;

&lt;h2 id=&quot;equest-icon-theme--elegant-grey-and-orange-or-blue-or-green-icons-for-your-pc&quot;&gt;&lt;a href=&quot;https://www.kdeblog.com/iconos-elegantes-gris-y-naranja-o-azul-o-verde-para-tu-pc.html&quot;&gt;eQuest Icon Theme – Elegant Grey and Orange (or Blue or Green) Icons for Your PC&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.kdeblog.com/&quot;&gt;KDE Blog&lt;/a&gt; presents the eQuest icon theme by Thalic with a set of elegant desktop icons combining grey with a vivid accent color such as orange, blue, or green. The pack is designed to complement desktops with matching wallpaper tones and is available through the KDE Store.&lt;/p&gt;

&lt;h2 id=&quot;120-icons-and-counting&quot;&gt;&lt;a href=&quot;https://blog.jimmac.eu/posts/app-icon-requests/&quot;&gt;120+ Icons and Counting&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;&lt;a href=&quot;https://blog.jimmac.eu/&quot;&gt;Jakub Steiner’s Blog&lt;/a&gt; celebrates the milestone of over 120 completed app icon requests through the GNOME app-icon-requests project on GitLab. Each icon represents a collaborative design process between a contributor and an app developer following the modern GNOME icon style introduced in 2019.&lt;/p&gt;

&lt;h2 id=&quot;magic-folder--automatically-sort-files-with-this-plasmoid-for-plasma-6-28&quot;&gt;&lt;a href=&quot;https://www.kdeblog.com/ordena-archivos-de-forma-automatica-con-magic-folder-plasmoides-para-plasma-6-27.html&quot;&gt;Magic Folder – Automatically Sort Files with This Plasmoid for Plasma 6 (28)&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.kdeblog.com/&quot;&gt;KDE Blog&lt;/a&gt; presents Magic Folder, the 28th entry in their Plasma 6 plasmoid series, which automatically moves files dropped onto its panel icon into predefined folders. The widget is aimed at users who want to bring order to a cluttered desktop without manual file management. It is a practical addition to the growing library of Plasma 6-native widgets available in the KDE Store.&lt;/p&gt;

&lt;h2 id=&quot;following-up-on-armv9-build-infrastructure&quot;&gt;&lt;a href=&quot;https://news.opensuse.org/2026/04/13/follow-up-on-armv9-build-infra/&quot;&gt;Following Up on ARMv9 Build Infrastructure&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;&lt;a href=&quot;https://news.opensuse.org/&quot;&gt;openSUSE News&lt;/a&gt; provides an update on the native ARMv9 build capacity added to the Open Build Service following the arrival of NVIDIA Grace Hopper hardware last June. OBS worker dashboards now show active ARMv9 builds across a wide range of packages including the Linux kernel, LLVM, GCC, Python, and Qt. The post also invites hardware vendors to donate or lend equipment to expand multi-architecture coverage further.&lt;/p&gt;

&lt;h2 id=&quot;releasegnomeorg-refactor&quot;&gt;&lt;a href=&quot;https://blog.jimmac.eu/posts/release-gnome-zola/&quot;&gt;release.gnome.org Refactor&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;&lt;a href=&quot;https://blog.jimmac.eu/&quot;&gt;Jakub Steiner’s Blog&lt;/a&gt; describes porting the GNOME Release Notes website from Jekyll to Zola after his successful migration of his personal blog. The move unlocks two long-missing features: a native RSS feed for GNOME releases and a fully navigable archive of release notes going all the way back to GNOME 2.x. The site now runs as a single binary with zero dependency management, making it far easier for contributors who just want to write markdown.&lt;/p&gt;

&lt;h2 id=&quot;submit-your-talk-for-akademy-2026-in-graz-austria&quot;&gt;&lt;a href=&quot;https://www.kdeblog.com/presenta-tu-charla-para-akademy-2026-de-graz-austria.html&quot;&gt;Submit Your Talk for Akademy 2026 in Graz, Austria&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.kdeblog.com/&quot;&gt;KDE Blog&lt;/a&gt; encourages readers to submit talk proposals for KDE community conference Akademy 2026, which will be held in Graz, Austria from September 19 to 24 as a special edition marking KDE’s 30th anniversary. The event follows a hybrid format, with in-person and online participation. The talks will take place on the first two days with the remainder reserved for working sessions and BoFs.
.&lt;/p&gt;

&lt;h2 id=&quot;linux-saloon-195--open-mic-night&quot;&gt;&lt;a href=&quot;https://cubiclenate.com/2026/04/11/linux-saloon-195-open-mic-night/&quot;&gt;Linux Saloon 195 | Open Mic Night&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;&lt;a href=&quot;https://cubiclenate.com/&quot;&gt;CubicleNate’s Blog&lt;/a&gt; recaps episode 195 of the Linux Saloon podcast, which covered a range of tech topics. The episode also touched on critical security flaws in Telegram, and discusses Android malware. The open mic format allowed contributors to share their own perspectives on the week’s developments.&lt;/p&gt;

&lt;h2 id=&quot;25th-update-of-kde-frameworks-6-and-the-bluezqt-library&quot;&gt;&lt;a href=&quot;https://www.kdeblog.com/vigesimoquinta-actualizacion-de-kde-frameworks-6-y-libreria-libreria-bluezqt.html&quot;&gt;25th Update of KDE Frameworks 6 and the BluezQt Library&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.kdeblog.com/&quot;&gt;KDE Blog&lt;/a&gt; announces the release of KDE Frameworks 6.25. As part of an ongoing series, the post also profiles the BluezQt library, which provides Bluetooth management for KDE Plasma and enables everyday tasks like connecting wireless headphones and monitoring peripheral battery levels.&lt;/p&gt;

&lt;h2 id=&quot;opensuse-tumbleweed-weekly-review--week-14--15&quot;&gt;openSUSE Tumbleweed Weekly Review – Week 14 &amp;amp; 15&lt;/h2&gt;

&lt;p&gt;&lt;a href=&quot;https://victorhckinthefreeworld.com/2026/04/10/opensuse-tumbleweed-revision-de-las-semanas-14-y-15-de-2026/&quot;&gt;Victorhck&lt;/a&gt; and &lt;a href=&quot;https://dominique.leuenberger.net/blog/2026/04/tumbleweed-review-of-the-weeks-2026-14-15/&quot;&gt;dimstar&lt;/a&gt; publish a combined two-week Tumbleweed review covering weeks 14 and 15. Ten snapshots were released during the fortnight, delivering updates including the Linux kernel 6.19.10 and 6.19.11, Mozilla Firefox 149.0, Qt 6.11.0, Mesa 26.0.4, GIMP 3.2.2, and LibreOffice 26.2.2.2. Looking ahead, the post previews upcoming changes such as GNOME 50, KDE Plasma 6.6.4, GCC 16 as the default compiler, and LLVM 22.&lt;/p&gt;

&lt;h2 id=&quot;moving-to-zola&quot;&gt;&lt;a href=&quot;https://blog.jimmac.eu/posts/port-to-zola/&quot;&gt;Moving to Zola&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;&lt;a href=&quot;https://blog.jimmac.eu/&quot;&gt;Jakub Steiner’s Blog&lt;/a&gt; details the migration of his personal blog from Jekyll to the Rust-based static site generator Zola, driven by frustration with Ruby dependency management. Key benefits highlighted include near-instant build times, a single binary with no external dependencies, and native support for asset colocation keeping images alongside their posts. The post also notes CSS-only dark mode theming and improved font legibility as welcome side effects of the overhaul.&lt;/p&gt;

&lt;p&gt;View more blogs or learn to publish your own on &lt;a href=&quot;https://planet.opensuse.org&quot;&gt;planet.opensuse.org&lt;/a&gt;.&lt;/p&gt;

&lt;meta name=&quot;openSUSE, Open Source, development, Linux, secure operating systems, open source, plasma, GNOME, KDE, Akademy, OpenVINO, Rust&quot; content=&quot;HTML,CSS,XML,JavaScript&quot; /&gt;

</content:encoded>
    </item>

    <item>
      <guid>https://news.opensuse.org/2026/04/13/follow-up-on-armv9-build-infra/</guid>
      <title>Following Up on ARMv9 Build Infrastructure</title>
      <pubDate>Mon, 13 Apr 2026 11:00:00 +0000</pubDate>
      <link>https://news.opensuse.org/2026/04/13/follow-up-on-armv9-build-infra/</link>
      <author>admin@opensuse.org (Douglas DeMaio)</author>
      <enclosure url="https://news.opensuse.org/wp-content/uploads/2025/06/nvidia.png" length="24204" type="image/png" />
      <description>The arrival of NVIDIA Grace Hopper in the Open Build Service (OBS) infrastructure last June signaled more than new hardware; it launched a new era of native ARMv9 build capacity for the openSUSE Project. The results are becoming visible and more meaningful months later. The OBS worker monitoring dashboards shows...</description>
      <content:encoded>&lt;p&gt;The arrival of &lt;a href=&quot;https://news.opensuse.org/2025/06/20/grace-hopper-to-boost-tw-armv9-builds/&quot;&gt;NVIDIA Grace Hopper&lt;/a&gt; in the &lt;a href=&quot;https://build.opensuse.org/&quot;&gt;Open Build Service (OBS)&lt;/a&gt; infrastructure last June signaled more than new hardware; it launched a new era of native ARMv9 build capacity for the &lt;a href=&quot;https://www.opensuse.org/&quot;&gt;openSUSE Project&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;The results are becoming visible and more meaningful months later.&lt;/p&gt;

&lt;p&gt;The OBS &lt;a href=&quot;https://build.opensuse.org/monitor&quot;&gt;worker monitoring dashboards&lt;/a&gt; shows a picture that tells the story better than any changelog. Across dozens of build workers spanning architectures from &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;x86_64&lt;/code&gt; and &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;aarch64&lt;/code&gt; to &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;ppc64le&lt;/code&gt;, &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;s390x&lt;/code&gt;, and the newer &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;armv9&lt;/code&gt;-class machine is humming with activity.&lt;/p&gt;

&lt;p&gt;Projects have been underway rebuilding a subset of &lt;a href=&quot;https://get.opensuse.org/tumbleweed/&quot;&gt;Tumbleweed&lt;/a&gt; packages for ARMv9, and the worker dashboard reflects these efforts.&lt;/p&gt;

&lt;p&gt;The dashboard reveals not only the heavy load on &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;aarch64&lt;/code&gt; and &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;armv9&lt;/code&gt; workers but also the remarkable diversity of packages building for the target. From the Linux kernel and compiler toolchains like &lt;a href=&quot;https://llvm.org/&quot;&gt;LLVM&lt;/a&gt; and &lt;a href=&quot;https://gcc.gnu.org/&quot;&gt;GNU Compiler Collection (GCC)&lt;/a&gt;, &lt;a href=&quot;https://www.python.org/&quot;&gt;Python&lt;/a&gt; packages, &lt;a href=&quot;https://www.qt.io/&quot;&gt;Qt&lt;/a&gt; frameworks, and more, the workers are compiling these complex workloads with good success rates.&lt;/p&gt;

&lt;p&gt;This activity is instrumental to ARMv9, demonstrating that it is evolving beyond its proof-of-concept into an active development distribution path alongside the main Tumbleweed tree.&lt;/p&gt;

&lt;p&gt;NVIDIA Grace uses high-performance &lt;a href=&quot;https://www.arm.com/&quot;&gt;arm&lt;/a&gt;-based CPU cores with the Hopper GPU architecture, linked by &lt;a href=&quot;https://www.nvidia.com/en-us/data-center/nvlink-c2c/&quot;&gt;NVIDIA’s NVLink™-C2C&lt;/a&gt; (Chip-to-Chip) interface. The architecture allows both processors to access data in place, which results in significantly faster compilation and reduced latency for complex workloads. It provides better efficiency across OBS pipelines.&lt;/p&gt;

&lt;p&gt;The architectural difference is not an abstract specification point. It translates directly into shorter queue times for contributors, faster feedback loops for package maintainers, and the ability to handle the kinds of large, parallel builds that a rolling-release distribution like Tumbleweed demands.&lt;/p&gt;

&lt;p&gt;Integrating native ARMv9 hardware within OBS was essential to unlock maximum performance gains and successfully validate builds optimized for the architecture.&lt;/p&gt;

&lt;p&gt;Native builds eliminate the risks of emulated cross-compilation, which often masks critical &lt;a href=&quot;https://en.wikipedia.org/wiki/Application_binary_interface&quot;&gt;Application Binary Interface&lt;/a&gt; mismatches, instruction scheduling errors, and performance regressions. Deploying the Grace Hopper in production ensures ARMv9 targets are validated on actual silicon, guaranteeing real-world reliability and peak performance.&lt;/p&gt;

&lt;p&gt;Collaboration that made this possible is a model worth repeating in its structure, a template. The efforts reflect a shared commitment to open-source and the need for cutting-edge build capabilities. This isn’t just a philosophical framing but a practical argument other hardware companies across the industry can consider.&lt;/p&gt;

&lt;p&gt;The openSUSE Project actively welcomes hardware vendors who may want to lend or &lt;a href=&quot;https://en.opensuse.org/Sponsors#Want_to_Become_a_Sponsor_of_openSUSE?&quot;&gt;donate hardware&lt;/a&gt; to enable openSUSE on their systems, test openSUSE on their systems, or add more build power to the build system.&lt;/p&gt;

&lt;p&gt;Consider what lent or donated hardware to OBS actually achieves for a company. When a vendor’s silicon appears in OBS as a native build target, thousands of open-source packages begin being compiled, tested, and validated continuously and automatically against that architecture. It’s a hardware vendors QA dream!&lt;/p&gt;

&lt;p&gt;Every successful build validates software readiness on contributed hardware, while every failure proactively resolves compatibility issues before impacting end users. Continuous integration coverage delivers critical risk mitigation for new processor launches at a negligible infrastructure cost.&lt;/p&gt;

&lt;p&gt;The OBS worker pool has comprehensive multi-architecture coverage as seen with Intel/AMD handling the bulk load alongside dedicated ARM, POWER, and Z Systems nodes. The diverse infrastructure, secured through partnerships and community contributions, ensures validation across a large hardware spectrum.&lt;/p&gt;

&lt;p&gt;A machine lent, donated or co-located with the project becomes a continuous, automated test bed for software compatibility, running 24 hours a day, maintained by the community, and producing results visible to every Linux developer who watches the Tumbleweed package feed.&lt;/p&gt;

&lt;p&gt;The NVIDIA collaboration demonstrates this in practice. OBS’ thriving build farm benefits every distribution user, every application developer, and every hardware vendor whose products run Linux.&lt;/p&gt;

&lt;p&gt;If your company makes chips, accelerators, or servers and you want your products to run on Linux, get your hardware into the hands of the people who build the software. The openSUSE Project is ready to put it to work.&lt;/p&gt;

&lt;p&gt;For more information, email &lt;a href=&quot;mailto:ddemaio@opensuse.org&quot;&gt;ddemaio@opensuse.org&lt;/a&gt;&lt;/p&gt;

&lt;meta name=&quot;openSUSE, Open Source, development, Linux, operating systems, open source, NVIDIA, OBS, GCC, Python, ABI, arm&quot; content=&quot;HTML,CSS,XML,JavaScript&quot; /&gt;

</content:encoded>
    </item>

    <item>
      <guid>https://news.opensuse.org/2026/04/10/planet-roundup/</guid>
      <title>Planet News Roundup</title>
      <pubDate>Fri, 10 Apr 2026 07:00:00 +0000</pubDate>
      <link>https://news.opensuse.org/2026/04/10/planet-roundup/</link>
      <author>admin@opensuse.org (Douglas DeMaio)</author>
      <enclosure url="https://news.opensuse.org/wp-content/uploads/2025/07/planet.png" length="78165" type="image/png" />
      <description>This is a roundup of articles from the openSUSE community listed on planet.opensuse.org. The community blog feed aggregator lists the featured highlights below from April 3 to 9. Blogs this week cover the fourth bugfix update to KDE Plasma 6.6, Slimbook’s refreshed Creative ultrabook featuring the AMD Ryzen AI 9...</description>
      <content:encoded>&lt;p&gt;This is a roundup of articles from the openSUSE community listed on &lt;a href=&quot;https://planet.opensuse.org&quot;&gt;planet.opensuse.org&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;The community blog feed aggregator lists the featured highlights below from April 3 to 9.&lt;/p&gt;

&lt;p&gt;Blogs this week cover the fourth bugfix update to KDE Plasma 6.6, Slimbook’s refreshed Creative ultrabook featuring the AMD Ryzen AI 9 365 with a dedicated AI NPU, and the promotion of Slimbook Days 2026, which the sales help support donations to KDE. Blogs also highlight two new Plasmoids for Plasma 6. One is the Aero Weather weather viewer and the other is Battery Plasmoid Boero. There were also practical tips for openSUSE users on using Rufus in DD mode when writing USB install media.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Here is a summary and links for each post:&lt;/strong&gt;&lt;/p&gt;

&lt;h2 id=&quot;use-dd-mode-when-creating-an-opensuse-dvd-image-with-rufus&quot;&gt;&lt;a href=&quot;https://blog.geeko.jp/ribbon/3622&quot;&gt;Use DD Mode When Creating an openSUSE DVD Image with Rufus&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://blog.geeko.jp/&quot;&gt;Geeko Blog&lt;/a&gt; warns openSUSE users that writing a DVD image to a USB drive using Rufus in ISO mode can silently skip files, resulting in a broken installer that fails to boot mid-installation. The author discovered this when attempting a fresh install of openSUSE 16.0 on physical hardware and confirmed the issue across multiple machines. Switching Rufus to DD mode resolved the problem entirely, and readers are advised to always use DD mode when creating openSUSE USB media.&lt;/p&gt;

&lt;h2 id=&quot;aero-weather-widget--weather-viewer-plasmoid-for-plasma-6-26&quot;&gt;&lt;a href=&quot;https://www.kdeblog.com/visor-meteorologico-aero-weather-plasmoides-para-plasma-6-26.html&quot;&gt;Aero Weather Widget – Weather Viewer Plasmoid for Plasma 6 (26)&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.kdeblog.com/&quot;&gt;KDE Blog&lt;/a&gt; presents Aero Weather; it’s a desktop weather viewer widget for KDE Plasma. The plasmoid displays current conditions and a multi-day weather forecast directly on the desktop. It also has support for automatic IP-based location detection or manual coordinates along with customizable font colors.&lt;/p&gt;

&lt;h2 id=&quot;new-slimbook-creative--renewing-its-high-end-model&quot;&gt;&lt;a href=&quot;https://www.kdeblog.com/nuevo-slimbook-creative-renovando-su-modelo-de-gama-alta.html&quot;&gt;New Slimbook Creative,  Renewing its High-End Model&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.kdeblog.com/&quot;&gt;KDE Blog&lt;/a&gt; covers Slimbook’s 2026 refresh of its Creative ultrabook that features the AMD Ryzen AI 9 365 processor with a dedicated NPU designed for local AI workloads. The updated model also brings improvements in performance, design, personalization, and portability.&lt;/p&gt;

&lt;h2 id=&quot;fourth-update-of-plasma-66&quot;&gt;&lt;a href=&quot;https://www.kdeblog.com/cuarta-actualizacion-de-plasma-6-6.html&quot;&gt;Fourth Update of Plasma 6.6&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.kdeblog.com/&quot;&gt;KDE Blog&lt;/a&gt; announces the fourth bugfix update of KDE Plasma 6.6, released on April 7, 2026, continuing the project’s regular maintenance cadence following the feature release. The post recaps the major new features introduced in the full Plasma 6.6 release, including the new Plasma Keyboard on-screen keyboard, OCR text extraction in Spectacle, and a new Plasma Setup configuration wizard. As with all bugfix updates, the release is strongly recommended for all users.&lt;/p&gt;

&lt;h2 id=&quot;battery-plasmoid-boero--visual-plasmoids-for-plasma-6-27&quot;&gt;&lt;a href=&quot;https://www.kdeblog.com/controla-tu-bateria-en-plasma-con-battery-plasmoid-boero-plasmoides-para-plasma-6-27.html&quot;&gt;Battery Plasmoid Boero – Visual Plasmoids for Plasma 6 (27)&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.kdeblog.com/&quot;&gt;KDE Blog&lt;/a&gt; presents Battery Plasmoid Boero, which is a widget that provides detailed battery monitoring including charge/discharge graphs and power mode settings. The plasmoid is aimed at laptop users who want more granular control over battery status than the default widget provides. Users interested in energy-efficient computing should visit &lt;a href=&quot;https://eco.kde.org/&quot;&gt;eco.kde.org&lt;/a&gt;.&lt;/p&gt;

&lt;h2 id=&quot;interface-and-stability-improvements--this-week-in-plasma&quot;&gt;&lt;a href=&quot;https://www.kdeblog.com/mejoras-de-interfaz-y-estabilidad-esta-semana-en-plasma.html&quot;&gt;Interface and Stability Improvements – This Week in Plasma&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.kdeblog.com/&quot;&gt;KDE Blog&lt;/a&gt; translates and summarizes the latest “This Week in Plasma” development report, covering ongoing work on interface refinements and stability fixes headed toward Plasma 6.7. The post highlights improvements across several Plasma components aimed at making the desktop feel more polished and reliable for daily use. This is part of the blog’s ongoing series of Spanish-language translations of Nate Graham’s weekly KDE development updates.&lt;/p&gt;

&lt;h2 id=&quot;linux-saloon-194--news-flight-night&quot;&gt;&lt;a href=&quot;https://cubiclenate.com/2026/04/04/linux-saloon-194-news-flight-night/&quot;&gt;Linux Saloon 194 | News Flight Night&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;&lt;a href=&quot;https://cubiclenate.com/&quot;&gt;CubicleNate’s Blog&lt;/a&gt; recaps episode 194 of the Linux Saloon podcast, which focused on a range of current tech topics including Google’s Android ecosystem changes and sideloading restrictions. Participants also discussed the Claude Code source leak, critical security vulnerabilities in Telegram, and a notable increase in Steam’s reported Linux usage share. Yay!&lt;/p&gt;

&lt;h2 id=&quot;japan&quot;&gt;&lt;a href=&quot;https://blog.jimmac.eu/posts/japan/&quot;&gt;Japan&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;&lt;a href=&quot;https://blog.jimmac.eu/&quot;&gt;Jakub Steiner’s Blog&lt;/a&gt; shares a personal travel post about a return trip to Japan. This time focused on Tokyo and a short excursion to Kawaguchiko during cherry blossom season. The post reflects on shooting with a Fuji X-T20 camera rather than relying solely on a smartphone, and includes a link to a full photo gallery on the author’s photo website.&lt;/p&gt;

&lt;h2 id=&quot;slimbook-days-2026&quot;&gt;&lt;a href=&quot;https://www.kdeblog.com/llegan-los-slimbook-days-2026.html&quot;&gt;Slimbook Days 2026&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.kdeblog.com/&quot;&gt;KDE Blog&lt;/a&gt; announces the arrival of Slimbook Days 2026, which is a promotional sale period for the GNU/Linux hardware brand happening between April 8 to 12. The post encourages readers to take advantage of the event, noting that Slimbook devices come fully pre-configured for GNU/Linux and come with a portion of each sale supporting the KDE community.&lt;/p&gt;

&lt;h2 id=&quot;screenshots-and-screen-recording-in-plasma-66&quot;&gt;&lt;a href=&quot;https://www.kdeblog.com/capturas-y-grabacion-de-pantalla-en-plasma-6-6.html&quot;&gt;Screenshots and Screen Recording in Plasma 6.6&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.kdeblog.com/&quot;&gt;KDE Blog&lt;/a&gt; examines the screenshot and screen recording improvements in KDE Plasma 6.6, with a particular focus on Spectacle’s new ability to recognize and extract text from captured images using OCR. This addition is highlighted as a significant usability and accessibility improvement and makes it easier to create alt text for visual content.&lt;/p&gt;

&lt;p&gt;View more blogs or learn to publish your own on &lt;a href=&quot;https://planet.opensuse.org&quot;&gt;planet.opensuse.org&lt;/a&gt;.&lt;/p&gt;

&lt;meta name=&quot;openSUSE, Open Source, development, Linux, secure operating systems, open source, plasma, gaming, Slimbooks, Japan, Weather, Spectacle, text, image&quot; content=&quot;HTML,CSS,XML,JavaScript&quot; /&gt;

</content:encoded>
    </item>

    <item>
      <guid>https://news.opensuse.org/2026/04/04/planet-roundup/</guid>
      <title>Planet News Roundup</title>
      <pubDate>Sat, 04 Apr 2026 06:00:00 +0000</pubDate>
      <link>https://news.opensuse.org/2026/04/04/planet-roundup/</link>
      <author>admin@opensuse.org (Douglas DeMaio)</author>
      <enclosure url="https://news.opensuse.org/wp-content/uploads/2025/07/planet.png" length="78165" type="image/png" />
      <description>This is a roundup of articles from the openSUSE community listed on planet.opensuse.org. The community blog feed aggregator lists the featured highlights below from March 27 to April 2. Blogs this week highlight the end of the nearly eight-year openSUSE Leap 15 era with Leap 15.6 reaching end of life,...</description>
      <content:encoded>&lt;p&gt;This is a roundup of articles from the openSUSE community listed on &lt;a href=&quot;https://planet.opensuse.org&quot;&gt;planet.opensuse.org&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;The community blog feed aggregator lists the featured highlights below from March 27 to April 2.&lt;/p&gt;

&lt;p&gt;Blogs this week highlight the end of the nearly eight-year openSUSE Leap 15 era with Leap 15.6 reaching end of life, the March 2026 &lt;a href=&quot;https://get.opensuse.org/tumbleweed/&quot;&gt;Tumbleweed&lt;/a&gt; monthly update covering three Plasma 6.6 point releases and kernel advances to 6.19.9, and the switch to systemd-boot as the default bootloader for fresh Tumbleweed installations. Blogs also cover the Claude Code source leak and its supply chain security lessons, syslog-ng benchmarks hitting 7 million events per second, accessibility improvements in Plasma 6.6, progress on Thunderbird’s Linux system tray integration and more.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Here is a summary and links for each post:&lt;/strong&gt;&lt;/p&gt;

&lt;h2 id=&quot;fsf-newsletter-roundup--april-2026&quot;&gt;&lt;a href=&quot;https://victorhckinthefreeworld.com/2026/04/02/recopilacion-del-boletin-de-noticias-de-la-free-software-foundation-abril-de-2026/&quot;&gt;FSF Newsletter Roundup – April 2026&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;&lt;a href=&quot;https://victorhckinthefreeworld.com&quot;&gt;Victorhck&lt;/a&gt; compiles and translates highlights from the Free Software Foundation’s April 2026 newsletter, which marks the FSF’s 40th anniversary this month. Topics include Discord’s controversial age verification policies, Google’s friction-heavy process for installing unverified Android apps, and payment provider Nexi terminating its contract with the FSFE after the organization refused to hand over donor data without explanation.&lt;/p&gt;

&lt;h2 id=&quot;tumbleweed-monthly-update---march-2026&quot;&gt;&lt;a href=&quot;https://news.opensuse.org/2026/04/02/tw-monthly-update-march/&quot;&gt;Tumbleweed Monthly Update - March 2026&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://news.opensuse.org&quot;&gt;openSUSE News&lt;/a&gt; publishes its March 2026 Tumbleweed monthly summary. The month saw three Plasma 6.6 point releases, kernel updates from 6.19.5 to 6.19.9, Mesa 26.0.2 fixing RDNA 4 visual corruption, and significant CVE attention for FreeRDP, curl, and the kernel.&lt;/p&gt;

&lt;h2 id=&quot;aero-weather-widget--plasmoids-for-plasma-6-26&quot;&gt;&lt;a href=&quot;https://www.kdeblog.com/visor-meteorologico-aero-weather-plasmoides-para-plasma-6-26.html&quot;&gt;Aero Weather Widget – Plasmoids for Plasma 6 (26)&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.kdeblog.com/&quot;&gt;KDE Blog&lt;/a&gt; presents Aero Weather, a desktop weather viewer widget for KDE Plasma created by XcurcX. The plasmoid displays current conditions and multi-day forecasts with customizable font colors and supports automatic IP-based location or manual coordinates.&lt;/p&gt;

&lt;h2 id=&quot;tahoe-launcher--a-macos-style-launcher-for-kde-plasma--plasmoids-for-plasma-6-25&quot;&gt;&lt;a href=&quot;https://www.kdeblog.com/lanzador-estilo-macos-para-kde-plasma-tahoe-launcher-plasmoides-para-plasma-6-25.html&quot;&gt;Tahoe Launcher – A macOS-Style Launcher for KDE Plasma – Plasmoids for Plasma 6 (25)&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.kdeblog.com/&quot;&gt;KDE Blog&lt;/a&gt; showcases Tahoe Launcher, which is a minimalist macOS-style application launcher for KDE Plasma featuring a grid layout with transparency and blur effects. The widget is built natively in QML for low resource consumption and allows users to customize the grid dimensions, icon sizes, and search bar design.&lt;/p&gt;

&lt;h2 id=&quot;quick-update-on-the-package-version-tracking-feature-in-obs&quot;&gt;&lt;a href=&quot;https://openbuildservice.org/2026/04/02/package-version-tracking-updates/&quot;&gt;Quick Update on the Package Version Tracking Feature in OBS&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://openbuildservice.org&quot;&gt;Open Build Service Blog&lt;/a&gt; shares updates to the package version tracking feature as part of the Foster Collaboration beta program. The API now allows querying upstream and local package versions, and individual packages can opt out of version tracking when upstream monitoring is not relevant.&lt;/p&gt;

&lt;h2 id=&quot;closing-out-a-roughly-8-year-era&quot;&gt;&lt;a href=&quot;https://news.opensuse.org/2026/04/01/leap-15-eol/&quot;&gt;Closing Out a Roughly 8-Year Era&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://news.opensuse.org&quot;&gt;openSUSE News&lt;/a&gt; announces that the openSUSE Leap 15 series is reaching its end of life after nearly eight years, starting with 15.0 on May 25, 2018. Leap 15.6 will stop receiving maintenance and security updates at the end of this month.&lt;/p&gt;

&lt;h2 id=&quot;my-new-toy-april-1-syslog-ng-performance-tests&quot;&gt;&lt;a href=&quot;https://peter.czanik.hu/posts/new-toy-1st-of-april-syslog-ng-performance-tests/&quot;&gt;My New Toy: April 1 syslog-ng Performance Tests&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;&lt;a href=&quot;https://peter.czanik.hu/&quot;&gt;Peter Czánik’s Blog&lt;/a&gt; presents benchmark results showing syslog-ng reaching 7 million events per second, though he immediately clarifies this is a synthetic lab measurement that does not represent real-world production performance. The post introduces sngbench, his open-source benchmarking tool for comparing syslog-ng performance across architectures and operating systems.&lt;/p&gt;

&lt;h2 id=&quot;this-month-in-kde-linux-march-2026&quot;&gt;&lt;a href=&quot;https://www.kdeblog.com/este-mes-de-marzo-en-kde-linux.html&quot;&gt;This Month in KDE Linux: March 2026&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.kdeblog.com/&quot;&gt;KDE Blog&lt;/a&gt; summarizes Nate Graham’s March 2026 progress report on Adventures in Linux and KDE. Key improvements include better automatic rollback after failed updates, improved memory management to prevent total system freezes, and easier iPhone/iPad connectivity for photo transfers.&lt;/p&gt;

&lt;h2 id=&quot;thunderbird-and-the-system-tray-on-linux&quot;&gt;&lt;a href=&quot;https://victorhckinthefreeworld.com/2026/04/01/thunderbird-y-la-bandeja-de-sistema-en-linux/&quot;&gt;Thunderbird and the System Tray on Linux&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;&lt;a href=&quot;https://victorhckinthefreeworld.com&quot;&gt;Victorhck&lt;/a&gt; highlights progress from Thunderbird’s March 2026 development digest regarding the long-requested system tray integration for Linux. Contributor Christophe Henry has been working on a cross-platform approach spanning JavaScript, C++, and Rust to unify unread mail indicators and tray icon behavior.&lt;/p&gt;

&lt;h2 id=&quot;automating-test-management-with-qase&quot;&gt;&lt;a href=&quot;https://bzoltan1.github.io/automating-test-management-with-qase/&quot;&gt;Automating Test Management with QASE&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;&lt;a href=&quot;https://bzoltan1.github.io&quot;&gt;Zoltán Balogh’s Blog&lt;/a&gt; breaks from his usual open-source focus to review QASE, a cloud-based test management tool, finding its API to be its strongest feature. He explains why the open-source world generally lacks dedicated test management tools, which he notes that community-driven projects like openSUSE and Debian tend to crowdsource quality engineering through staged releases rather than formal test plans.&lt;/p&gt;

&lt;h2 id=&quot;claude-code-leak-exposes-half-a-million-lines-of-ai&quot;&gt;&lt;a href=&quot;https://assuntonerd.com.br/2026/03/31/vazamento-do-claude-code-expoe-meio-milhao-de-linhas-de-ia/&quot;&gt;Claude Code Leak: Exposes Half a Million Lines of AI&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;&lt;a href=&quot;https://assuntonerd.com.br/&quot;&gt;Alessandro’s Blog&lt;/a&gt; analyzes the March 31 incident in which a source map file accidentally published to npm exposed the entire Claude Code codebase, which was roughly 1,900 files and over 512,000 lines of TypeScript. Alessandro frames the incident as a cautionary lesson about build pipeline security and supply chain risks, arguing that the future of AI lies in mastering the orchestration layer around models, not just the models themselves.&lt;/p&gt;

&lt;h2 id=&quot;my-new-toy-back-to-high-end-audio&quot;&gt;&lt;a href=&quot;https://peter.czanik.hu/posts/new-toy-back-to-high-end-audio/&quot;&gt;My New Toy: Back to High-End Audio&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;&lt;a href=&quot;https://peter.czanik.hu/&quot;&gt;Peter Czánik’s Blog&lt;/a&gt; shares how installing software synthesizers and connecting his HP Z2 Mini AI workstation to his HiFi system reminded him of how much better high-end audio sounds compared to the laptop speakers and meeting-oriented headphones he had been using for months. The post is part of his ongoing series about adventures with his AI mini workstation.&lt;/p&gt;

&lt;h2 id=&quot;kde-express-episode-71-eslibre2026--digital-self-defense-guide-with-enxeñería-sen-fronteiras&quot;&gt;&lt;a href=&quot;https://www.kdeblog.com/episodio-71-de-kde-express-eslibre2026-guia-de-autodefensa-digital-con-enxeneria-sen-fronteiras.html&quot;&gt;KDE Express Episode 71: esLibre2026 – Digital Self-Defense Guide with Enxeñería Sen Fronteiras&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.kdeblog.com/&quot;&gt;KDE Blog&lt;/a&gt; covers episode 71 of the KDE Express podcast featuring Laura Salgueiro Sánchez from Enxeñería Sen Fronteiras promoting a talk at esLibre2026. The session will present a digital self-defense guide aimed at helping anyone improve their online security and recover digital sovereignty without requiring prior cybersecurity knowledge.&lt;/p&gt;

&lt;h2 id=&quot;what-is-better-windows-or-linux-my-experience-1-year-later&quot;&gt;&lt;a href=&quot;https://www.kdeblog.com/que-es-mejor-windows-o-linux-mi-experiencia-1-ano-despues.html&quot;&gt;What is Better, Windows or Linux? My Experience 1 Year Later&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.kdeblog.com/&quot;&gt;KDE Blog&lt;/a&gt; highlights a video by content creator GCtech sharing his experience after a full year of using Linux as his primary operating system. He praises Linux’s resource efficiency for reviving older hardware, its transparency and security model, while acknowledging gaps in professional software like Adobe and some limitations with AAA gaming.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://youtu.be/QKlJLWJzzDk?si=YhPykFzPsSm0v0CK&quot;&gt;&lt;img src=&quot;https://img.youtube.com/vi/QKlJLWJzzDk/0.jpg&quot; alt=&quot;Video title&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2 id=&quot;accessibility-improvements-in-plasma-66&quot;&gt;&lt;a href=&quot;https://www.kdeblog.com/mejoras-en-la-accesibilidad-de-plasma-6-6.html&quot;&gt;Accessibility Improvements in Plasma 6.6&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.kdeblog.com/&quot;&gt;KDE Blog&lt;/a&gt; details the accessibility enhancements in Plasma 6.6, including a new grayscale filter joining three existing color blindness correction filters. The magnification feature gains a new tracking mode that keeps the pointer centered on screen, and Slow Keys returns on Wayland to help users with motor difficulties avoid accidental keypresses.&lt;/p&gt;

&lt;h2 id=&quot;easy-microphone-sensitivity-adjustment--this-week-in-plasma&quot;&gt;&lt;a href=&quot;https://www.kdeblog.com/ajuste-sencillo-de-la-sensibilidad-del-microfono-esta-semana-en-plasma.html&quot;&gt;Easy Microphone Sensitivity Adjustment – This Week in Plasma&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.kdeblog.com/&quot;&gt;KDE Blog&lt;/a&gt; translates and covers the latest “This Week in Plasma” development report. Plasma 6.7 gains a microphone test-and-adjust feature, notification portal support for Flatpak apps, and a multi-GPU swapchain implementation in KWin.&lt;/p&gt;

&lt;h2 id=&quot;opensuse-tumbleweed-weekly-review--week-13-of-2026&quot;&gt;openSUSE Tumbleweed Weekly Review – Week 13 of 2026&lt;/h2&gt;

&lt;p&gt;&lt;a href=&quot;https://victorhckinthefreeworld.com/2026/03/27/opensuse-tumbleweed-revision-de-la-semana-13-de-2026/&quot;&gt;Victorhck&lt;/a&gt; and &lt;a href=&quot;https://dominique.leuenberger.net/blog/2026/03/tumbleweed-review-of-the-week-2026-13/&quot;&gt;dimstar&lt;/a&gt; report on a slow week for Tumbleweed with only two snapshots (0324 and 0326) reaching the mirrors due to the transition from grub2-bls to systemd-boot as the default bootloader for fresh installations. Notable updates delivered include KDE Plasma 6.6.3, ffmpeg 8.1, FreeRDP 3.24.1, Linux kernel 6.19.9, and qemu 10.2.2. Upcoming changes in the pipeline include GNOME 50, Qt 6.11.0, Mozilla Firefox 149.0, GCC 16, and glibc 2.43.&lt;/p&gt;

&lt;p&gt;View more blogs or learn to publish your own on &lt;a href=&quot;https://planet.opensuse.org&quot;&gt;planet.opensuse.org&lt;/a&gt;.&lt;/p&gt;

&lt;meta name=&quot;openSUSE, Open Source, development, Linux, secure operating systems, open source, plasma, Tumbleweed, music, podcast, FSF, gaming, windows, OBS, mac, iphone, FSFE&quot; content=&quot;HTML,CSS,XML,JavaScript&quot; /&gt;

</content:encoded>
    </item>

    <item>
      <guid>https://news.opensuse.org/2026/04/02/tw-monthly-update-march/</guid>
      <title>Tumbleweed Monthly Update - March 2026</title>
      <pubDate>Thu, 02 Apr 2026 08:00:00 +0000</pubDate>
      <link>https://news.opensuse.org/2026/04/02/tw-monthly-update-march/</link>
      <author>admin@opensuse.org (Douglas DeMaio)</author>
      <enclosure url="https://news.opensuse.org/wp-content/uploads/2025/05/tw.png" length="209112" type="image/png" />
      <description>There were several software package updates for openSUSE Tumbleweed during March. Tumbleweed saw three Plasma 6.6 updates bringing progressive bugfixes to KWin, the system tray, Spectacle, and the Kicker launcher. KDE Frameworks advanced to 6.24.0 with nanosecond-precision timestamps in KIO and a new Kirigami StyleHints API. The Linux kernel moved...</description>
      <content:encoded>&lt;p&gt;There were several software package updates for &lt;a href=&quot;https://get.opensuse.org/tumbleweed/&quot;&gt;openSUSE Tumbleweed&lt;/a&gt; during March.&lt;/p&gt;

&lt;p&gt;Tumbleweed saw three Plasma 6.6 updates bringing progressive bugfixes to KWin, the system tray, Spectacle, and the Kicker launcher. KDE Frameworks advanced to 6.24.0 with nanosecond-precision timestamps in KIO and a new Kirigami &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;StyleHints&lt;/code&gt; API. The Linux kernel moved from 6.19.5 to 6.19.9 with broad fixes across audio, display, and filesystem drivers. Both the Linux Kernel and FreeRDP fixed several &lt;a href=&quot;https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures&quot;&gt;Common Vulnerabilities and Exposures&lt;/a&gt;, and Mesa 26.0.2 resolved visual corruption on RDNA 4 hardware and a Counter-Strike 2 regression on Intel Arc.&lt;/p&gt;

&lt;p&gt;As always, be sure to roll back using &lt;a href=&quot;https://github.com/openSUSE/snapper&quot;&gt;snapper&lt;/a&gt; if any issues arise.&lt;/p&gt;

&lt;p&gt;For more details on the change logs for the month, visit the &lt;a href=&quot;https://lists.opensuse.org/archives/list/factory@lists.opensuse.org/&quot;&gt;openSUSE Factory mailing list&lt;/a&gt;.&lt;/p&gt;

&lt;h2 id=&quot;new-features-and-enhancements&quot;&gt;New Features and Enhancements&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://kde.org/announcements/plasma/6/6.6.1&quot;&gt;Plasma 6.6.1&lt;/a&gt;, &lt;a href=&quot;https://kde.org/announcements/plasma/6/6.6.2/&quot;&gt;6.6.2&lt;/a&gt; &amp;amp; &lt;a href=&quot;https://kde.org/announcements/plasma/6/6.6.3&quot;&gt;Plasma 6.6.3&lt;/a&gt;&lt;/strong&gt;: Version 6.6.3 finished the month with the third update. Application launcher &lt;a href=&quot;https://userbase.kde.org/Plasma/Kicker&quot;&gt;Kicker&lt;/a&gt; receives several fixes for the sidebar, icon display, and expanded root list width calculations. The Task Manager now keeps thumbnails properly aligned in horizontal group tooltips. &lt;a href=&quot;https://apps.kde.org/spectacle/&quot;&gt;Spectacle&lt;/a&gt; resolves a crash on quick region selection and fixes a pixel-off error in the magnifier tool. The system tray sees improved popup placement on Wayland. &lt;a href=&quot;https://invent.kde.org/plasma/powerdevil&quot;&gt;PowerDevil&lt;/a&gt;  restores the battery badge for 100 percent charge and syncs the manual inhibition switch with external changes. Plasma 6.6.2 has &lt;a href=&quot;https://invent.kde.org/plasma/kwin&quot;&gt;KWin&lt;/a&gt; resolve crashes in DRM output handling, improves mouse tracking with caret-based zoom, and fixes input region gaps in window decorations. The &lt;a href=&quot;https://apps.kde.org/kicker/&quot;&gt;Kicker&lt;/a&gt; applet sees refinements in visual search, scrollbar behavior, and hover logic. &lt;a href=&quot;https://apps.kde.org/spectacle/&quot;&gt;Spectacle&lt;/a&gt; fixes a crash when exporting via KDE Connect, and System Settings now correctly navigates to subcategories from search results. In version 6.6.1, &lt;a href=&quot;https://invent.kde.org/plasma/kwin&quot;&gt;KWin&lt;/a&gt; sees the most changes with fixes for corner rounding applying to both decorations and window surfaces, zoom now works correctly on rotated outputs, and software brightness dimming on external screens on screens were enhanced. The tile editor no longer triggers on key repeat, and interactive move-resize no longer unconditionally raises windows. Clipboard and drag-and-drop teardown under &lt;a href=&quot;https://wayland.freedesktop.org/&quot;&gt;XWayland&lt;/a&gt; is improved, and*Wine/Proton color management gains better compatibility. The Kicker application launcher for the &lt;a href=&quot;https://kde.org/plasma-desktop/&quot;&gt;Plasma Desktop&lt;/a&gt; receives multiple fixes for the icon display, layout margins, and search field behavior. The Task Manager corrects tooltip sizing. The digital clock now properly localizes digits, and the media controller fixes premature label truncation. &lt;a href=&quot;https://invent.kde.org/plasma/plasma-nm&quot;&gt;Plasma Network Manager&lt;/a&gt; improves icon accuracy for Wi-Fi disabled states and now responds to external configuration changes. &lt;a href=&quot;https://apps.kde.org/discover/&quot;&gt;Discover&lt;/a&gt; improves Flatpak app resolution and exposes proper star count ratings. &lt;a href=&quot;https://invent.kde.org/plasma/powerdevil&quot;&gt;Powerdevil&lt;/a&gt; adds a power level check before executing critical actions that prevent premature shutdowns.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://apps.gnome.org/Settings/&quot;&gt;GNOME Control Center&lt;/a&gt; 49.5&lt;/strong&gt;: The Display and Power panels now handle a missing &lt;a href=&quot;https://upower.freedesktop.org/&quot;&gt;UPower&lt;/a&gt; service instead of failing. An infinite loop when switching battery charge modes on systems with multiple batteries was fixed. Sound and Bluetooth device switching regressions are resolved through an updated &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;libgnome-volume-control&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://gitlab.gnome.org/GNOME/libxml2&quot;&gt;libxml2&lt;/a&gt; 2.15.2&lt;/strong&gt;: A significant version jump that removes the built-in HTTP client and LZMA compression support, and the parser option &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;XML_PARSE_UNZIP&lt;/code&gt; is now required to read compressed data. HTML serialization and character encoding handling are brought more in line with the HTML5 specification, and additional accessors for &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;xmlParserCtxt&lt;/code&gt; were added for developers. Several previously patched CVEs are now resolved upstream, including fixes for attribute normalization and standalone checks. Python bindings are no longer built as they are scheduled for removal in 2.16, and Schematron support has similarly been dropped.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://xfce.org/&quot;&gt;Xfce&lt;/a&gt; 4.20.2&lt;/strong&gt;: This update covers the screensaver, session manager, and display settings. &lt;a href=&quot;https://docs.xfce.org/apps/xfce4-screensaver/start&quot;&gt;xfce4-screensaver&lt;/a&gt; fixes a wrong conditional in the lock plug, improves theme preview rendering, and switches from &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;pidof&lt;/code&gt; to &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;pgrep&lt;/code&gt; for more reliable process detection. The overlay window handling is reworked to use a single permanent window, improving device reliability. &lt;a href=&quot;https://docs.xfce.org/xfce/xfce4-session/start&quot;&gt;xfce4-session&lt;/a&gt; fixes an idle function and prevents multiple logout dialogs from being created. It also adds &lt;a href=&quot;https://wiki.gnome.org/Projects/GnomeKeyring&quot;&gt;gnome-keyring&lt;/a&gt; as a Secret portal provider and improves keyboard layout detection on Wayland. &lt;a href=&quot;https://docs.xfce.org/xfce/xfce4-settings/start&quot;&gt;xfce4-settings&lt;/a&gt; improves display management by checking EDID to detect output list changes, adds a missing condition for new Wayland outputs, and falls back to output name when EDID data is duplicated.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://kde.org/announcements/frameworks/6/6.24.0/&quot;&gt;KDE Frameworks 6.24.0&lt;/a&gt;&lt;/strong&gt;: This updates see &lt;a href=&quot;https://github.com/KDE/kio&quot;&gt;KIO&lt;/a&gt; gain nanosecond-precision timestamps across file operations, improved paste dialogs with proper titles, and refined trash handling. &lt;a href=&quot;https://github.com/KDE/kcodecs&quot;&gt;KCodecs&lt;/a&gt; overhauls encoding with safer memory management (using &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;unique_ptr&lt;/code&gt;) and &lt;a href=&quot;https://github.com/KDE/kirigami&quot;&gt;Kirigami&lt;/a&gt; introduces a new &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;StyleHints&lt;/code&gt; API to unify theme behavior. &lt;a href=&quot;https://github.com/KDE/baloo&quot;&gt;Baloo&lt;/a&gt; fixes database access mode issues and &lt;a href=&quot;https://github.com/KDE/ktexteditor&quot;&gt;KTextEditor&lt;/a&gt; adds search history clearing and safer clipboard handling.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://7-zip.org/&quot;&gt;7-Zip&lt;/a&gt; 26.00&lt;/strong&gt;: The file manager now uses the file name as a secondary sorting key for more intuitive file list ordering, and the benchmark tool supports systems with more than 64 CPU threads. A bug preventing correct extraction of TAR archives containing sparse files is fixed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://kde.org/announcements/gear/25.12.3/&quot;&gt;KDE Gear 25.12.3&lt;/a&gt;&lt;/strong&gt;: &lt;a href=&quot;https://apps.kde.org/kdenlive/&quot;&gt;Kdenlive&lt;/a&gt; addresses numerous stability and usability issues, including crashes in the curve editor, audio scrubbing with “Pause on Seek” disabled, and provides better handling of multi-stream clips and improved effect management. &lt;a href=&quot;https://apps.kde.org/itinerary/&quot;&gt;Itinerary&lt;/a&gt; and &lt;a href=&quot;https://api.kde.org/pim/kitinerary/html/&quot;&gt;Kitinerary&lt;/a&gt; expand travel support with new extractors for ferry tickets. &lt;a href=&quot;https://apps.kde.org/neochat/&quot;&gt;NeoChat&lt;/a&gt; refines room list navigation, fixes emoticon editor layout issues, prevents timeline scrolling during reactions, and resolves a crash. &lt;a href=&quot;https://apps.kde.org/kmail/&quot;&gt;KMail&lt;/a&gt; restores proper rendering of plain-text emails and &lt;a href=&quot;https://apps.kde.org/tokodon/&quot;&gt;Tokodon&lt;/a&gt; fixes alt-text editing and account switching after login failures.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://imagemagick.org/&quot;&gt;ImageMagick&lt;/a&gt; 7.1.2.16 - 7.1.2.18&lt;/strong&gt;: The image editor update for version 7.1.2.18 improves the reliability of animated image handling by fixing frame delay parsing and resolves a visual artifact where the &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;-dissolve&lt;/code&gt; composite operation introduced random noise. Version 7.1.2.17 focused on addressing multiple vulnerabilities and security advisories are resolved along with out-of-band data handling improvements. Version 7.1.2.16 hardens security and adds overflow checks to several image write paths including JXL, PS3, sixel, SGI, and BMP/DIB. It fixes a heap over-read in &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;BilateralBlurImage&lt;/code&gt; with even-dimension kernels, a NULL pointer dereference in HEIC NCLX color profile allocation, and a double-free in SVG &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;gradientTransform&lt;/code&gt; parsing.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.ruby-lang.org/&quot;&gt;Ruby&lt;/a&gt; 4.0.2&lt;/strong&gt;: This update fixes a YJIT bug. A segfault with argument forwarding combined with splat and positional arguments is resolved, along with a GC crash in &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;String#%&lt;/code&gt; and a crash on signal raise. A 20 percent performance regression in Rails related to global allocatable slots and empty pages is addressed. Several Prism parser issues were corrected including misparsing of standalone &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;in&lt;/code&gt; pattern matching and the &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;and?&lt;/code&gt; predicate being confused with the &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;and&lt;/code&gt; keyword.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.freerdp.com/&quot;&gt;FreeRDP&lt;/a&gt; 3.24.1&lt;/strong&gt;: This update sees the API comprehensively marked with &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;[[nodiscard]]&lt;/code&gt; to surface unchecked function return values. Smartcard support is improved including ECC key handling in PKCS#11 enumeration, proxy support is extended to RFX and NSC graphics modes, and SDL3 multi-monitor scaling is introduced. Numerous memory leaks across connection setup, settings copying, and smartcard paths were resolved.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://github.com/AOMediaCodec/libavif&quot;&gt;libavif&lt;/a&gt; 1.4.0&lt;/strong&gt;: This update adds support for Sample Transform schemes from the AVIF 1.2 specification, which enables 16-bit AVIF file handling and grid-based derived image items. Data behind a document for the software handles picture files was made with &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;avifenc&lt;/code&gt;, which can now read PNG or JPEG files through stdin via &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;--stdin-format&lt;/code&gt; and supports converting JPEG files with Apple-style gain maps.  PNG decoding now respects &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;cICP&lt;/code&gt; chunks for color information as per the PNG Third Edition specification. Encoding defaults have been refined; &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;AOM_TUNE_IQ&lt;/code&gt; is now used for still color samples with libaom v3.13.0+, while &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;AOM_TUNE_PSNR&lt;/code&gt; is used for alpha to avoid ringing artifacts from SSIM tuning. Support for libaom versions 2.0.0 and earlier is removed.&lt;/p&gt;

&lt;h2 id=&quot;key-package-updates&quot;&gt;Key Package Updates&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.kernel.org/&quot;&gt;Linux kernel&lt;/a&gt; 6.19.5 - 6.19.9:&lt;/strong&gt;: The 6.19.9 update improved audio with a speaker pop fix for Star Labs StarFighter hardware and the &lt;a href=&quot;https://btrfs.readthedocs.io/&quot;&gt;Btrfs&lt;/a&gt; filesystem resolves a space info lock issue during periodic reclaim. NFS3 now correctly returns &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;EISDIR&lt;/code&gt; when a create operation encounters a directory alias. The 6.19.8 kernel was dominated by a major batch of AppArmor fixes and multiple CVE-tracked fixes that were backported. The 6.19.7 release receives multiple corrections for CFS/EEVDF scheduler including fixes for &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;zero_vruntime&lt;/code&gt; tracking, lag clamping, and slice protection timing. The AMD XDNA accelerator driver resolves several issues including a crash when destroying suspended hardware contexts. The 6.19.6 kernel had fixes led by extensive &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;perf&lt;/code&gt; tooling corrections including reference count leaks, srcline printing with inlines, and Zen 5 vendor event definitions for AMD. &lt;a href=&quot;https://btrfs.readthedocs.io/&quot;&gt;Btrfs&lt;/a&gt; replaces a &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;BUG()&lt;/code&gt; call with proper error handling for unexpected delayed ref types, adds fallback to buffered IO for data profiles with duplication, and improves user interrupt handling in &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;btrfs_trim_fs()&lt;/code&gt;. The 6.19.5 releases sees &lt;a href=&quot;https://btrfs.readthedocs.io/&quot;&gt;Btrfs&lt;/a&gt; correct a &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;block_group_tree&lt;/code&gt; dirty list corruption and a chunk allocation abort caused by non-consecutive gaps. &lt;a href=&quot;https://www.kernel.org/doc/html/next/filesystems/gfs2.html&quot;&gt;GFS2&lt;/a&gt; resolves quota handling and an inline data write path. The SMB client fixes a potential use-after-free and double free in &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;smb2_open_file()&lt;/code&gt;. A &lt;a href=&quot;https://netfilter.org/&quot;&gt;netfilter&lt;/a&gt; &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;nf_tables&lt;/code&gt; fix adds an abort skip removal flag for set types to address tracked security-relevant issues.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://gstreamer.freedesktop.org/&quot;&gt;GStreamer&lt;/a&gt; 1.28.1&lt;/strong&gt;: This update includes a new whisper-based speech-to-text transcription element and the &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;speechmatics&lt;/code&gt; element now supports detecting audio events like applause, laughter, and music. Reverse playback and gap handling are improved across multiple components. The &lt;a href=&quot;https://www.kernel.org/doc/html/latest/userspace-api/media/v4l/v4l2.html&quot;&gt;V4L2&lt;/a&gt; subsystem gains support for AV1 stateful decoding, and CUDA/GL interop copy paths in &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;cudaupload&lt;/code&gt; and &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;cudadownload&lt;/code&gt; are fixed. WebRTC components gain the ability to specify custom headers for signalling servers and negotiate H.264 profile and level for encoded input. Various memory leaks, build issues, and race conditions were resolved.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://curl.se/&quot;&gt;curl&lt;/a&gt; 8.19.0&lt;/strong&gt;: This release addresses four security vulnerabilities and provides new features like initial support for MQTTS and fractional values for &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;--limit-rate&lt;/code&gt; and &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;--max-filesize&lt;/code&gt;. Support for OpenSSL-QUIC was dropped. A potential NULL dereference in &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;Curl_h1_req_parse_read()&lt;/code&gt; was fixed along with a potential out-of-bounds read in OpenSSL debug logging. The build now enables NTLM authentication for compatibility with certain Exchange Server endpoints.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://systemd.io/&quot;&gt;systemd&lt;/a&gt; 259.3 &amp;amp; 259.5&lt;/strong&gt;: The 259.5 update had a notable fix  and corrected &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;systemd-update-helper&lt;/code&gt; from incorrectly skipping &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;systemctl disable&lt;/code&gt; during package removal. A new &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;clean-state&lt;/code&gt; command is introduced and triggered automatically at the end of any transaction installing unit files. The &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;systemd-container&lt;/code&gt; subpackage now requires &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;libarchive&lt;/code&gt; instead of &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;tar&lt;/code&gt; for archive handling. Additional &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;systemd-update-helper&lt;/code&gt; fixes address &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;do_install_units()&lt;/code&gt; incorrectly returning an error when no units need preset, and the &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;clean-state&lt;/code&gt; command itself is corrected to remove the full state directory rather than just a subdirectory. The 259.3 was a major version upgrade. The &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;libcap&lt;/code&gt; dependency was removed entirely, with its system call wrappers reimplemented directly in systemd.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://gnupg.org/&quot;&gt;GnuPG&lt;/a&gt; 2.5.18&lt;/strong&gt;: This update adds support for deleting composite secret keys in &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;gpg-agent&lt;/code&gt; and fixes armor parsing when no CRC is found. A recent regression in &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;pkdecrypt&lt;/code&gt; with TPM RSA keys is resolved, and &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;scdaemon&lt;/code&gt; adds support for D-Trust Card 6.1/6.4. The &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;dirmngr&lt;/code&gt; key server search now prints all UID records for a key, which fixes a regression dating back to 2015.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.mesa3d.org/&quot;&gt;Mesa&lt;/a&gt; 26.0.2&lt;/strong&gt;: The release fixes visual corruption on RDNA 4 in DX11/DXVK titles like &lt;a href=&quot;https://store.steampowered.com/app/360430/Mafia_III_Definitive_Edition/&quot;&gt;Mafia III&lt;/a&gt;, a GPU hang with PS epilogs and secondary command buffers, and missing L2 cache invalidation with streamout on GFX12. A &lt;a href=&quot;https://store.steampowered.com/app/730/CounterStrike_2/&quot;&gt;Counter-Strike 2&lt;/a&gt; visual glitch regression on Intel A770 is resolved. The &lt;a href=&quot;https://docs.mesa3d.org/drivers/panfrost.html&quot;&gt;Panfrost&lt;/a&gt; Bifrost compiler fixes a failure from incorrect vectorization and spill placement issues. An OpenGL VRAM memory leak when setting uniform variables is corrected. X11 shared memory attachment checks are added across drisw, EGL, GLX, and Vulkan WSI paths to prevent allocation failures.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://gtk.org/&quot;&gt;GTK3&lt;/a&gt; 3.24.52&lt;/strong&gt;: This update fixes a Firefox crash at &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;gdk_wayland_drag_context_manage_dnd()&lt;/code&gt; when a toplevel Wayland surface is missing, and resolves wild strobing in multi-window mode. A refresh rate calculation overflow on 32-bit targets is corrected, and recolored icon images are no longer constantly reloaded. Accessibility events for unfocused &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;GtkTreeView&lt;/code&gt; widgets are fixed, and XKB initialization failures on Wayland are now handled more gracefully.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://github.com/stefanberger/libtpms&quot;&gt;libtpms&lt;/a&gt; 0.10.2&lt;/strong&gt;: This update fixes a memory leak by freeing the KDF context and resolves incorrect IV retrieval when using OpenSSL 3.0 or later. A build fix for compatibility with newer glibc is also included. For Tumbleweed users running TPM-based virtualization with &lt;a href=&quot;https://www.qemu.org/&quot;&gt;QEMU&lt;/a&gt; or &lt;a href=&quot;https://github.com/stefanberger/swtpm&quot;&gt;swtpm&lt;/a&gt;, this is a security-relevant update.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://xfs.wiki.kernel.org/&quot;&gt;xfsprogs&lt;/a&gt; 6.18.0&lt;/strong&gt;: This update spans three releases. The &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;mkfs.xfs&lt;/code&gt; tool gains several improvements including the ability to configure desired maximum atomic write sizes, AG size alignment based on atomic write capabilities, autodetection of log stripe unit for external log devices, and new default features enabled out of the box with a 2025 LTS config file. Zoned filesystem support is refined with fixes for zone capacity checks on sequential zones and improved default maximum open zones. The &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;proto&lt;/code&gt; subsystem adds the ability to populate a filesystem directly from a directory. &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;xfs_scrub&lt;/code&gt; removes its EXPERIMENTAL warnings and fixes a null pointer crash in &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;scrub_render_ino_descr&lt;/code&gt;. Cross-architecture log CRC mismatches between i386 and other architectures are corrected, and &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;libxfs&lt;/code&gt; gains support for reproducible filesystems using deterministic time and seed values. Deprecated sysctl knobs and mount options are removed. The Python dependency is also dropped from the main package since the &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;xfs_protofile&lt;/code&gt; script is not essential.&lt;/p&gt;

&lt;h2 id=&quot;security-updates&quot;&gt;Security Updates&lt;/h2&gt;

&lt;h3 id=&quot;python-31115&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://www.python.org/&quot;&gt;Python&lt;/a&gt; 3.11.15&lt;/strong&gt;:&lt;/h3&gt;
&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-11468.html&quot;&gt;CVE-2025-11468&lt;/a&gt;&lt;/strong&gt;: Fixes a header injection flaw in email header folding where long comments with unfoldable characters could allow injecting headers into email messages.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-12084.html&quot;&gt;CVE-2025-12084&lt;/a&gt;&lt;/strong&gt;: Addresses quadratic complexity that could lead to denial of service when processing deeply nested documents.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-6075.html&quot;&gt;CVE-2025-6075&lt;/a&gt;&lt;/strong&gt;: Resolves a performance degradation in &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;os.path.expandvars()&lt;/code&gt; when user-controlled values are passed for environment variable expansion.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-2297.html&quot;&gt;CVE-2026-2297&lt;/a&gt;&lt;/strong&gt;: Fixes an issue where CPython’s import hook for legacy .pyc files did not trigger sys.audit handlers and could potentially allow a security monitoring bypass.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;bind-92021&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://bind9.readthedocs.io&quot;&gt;bind&lt;/a&gt; 9.20.21&lt;/strong&gt;:&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-1519.html&quot;&gt;CVE-2026-1519&lt;/a&gt;&lt;/strong&gt;: Fixes a flaw that could potentially lead to denial of service.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-3104.html&quot;&gt;CVE-2026-3104&lt;/a&gt;&lt;/strong&gt;: Addresses a memory leak that could cause unbounded memory growth and an out-of-memory condition.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-3119.html&quot;&gt;CVE-2026-3119&lt;/a&gt;&lt;/strong&gt;: Resolves an issue where an authenticated query could cause a termination unexpectedly.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-3591.html&quot;&gt;CVE-2026-3591&lt;/a&gt;&lt;/strong&gt;: Fixes a use-after-return flaw that could allow an attacker to bypass ACL restrictions via crafted DNS requests.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;linux-kernel-6198&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://www.kernel.org/&quot;&gt;Linux kernel&lt;/a&gt; 6.19.8:&lt;/strong&gt;:&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-23230.html&quot;&gt;CVE-2026-23230&lt;/a&gt;&lt;/strong&gt;: Fixes a vulnerability in the ksmbd kernel SMB server.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-23220.html&quot;&gt;CVE-2026-23220&lt;/a&gt;&lt;/strong&gt;: Addresses an infinite loop caused by next_smb2_rc in ksmbd.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-23226.html&quot;&gt;CVE-2026-23226&lt;/a&gt;&lt;/strong&gt;: Resolves a missing lock to protect ksmbd channel list.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-23228.html&quot;&gt;CVE-2026-23228&lt;/a&gt;&lt;/strong&gt;: Fixes a leak of active_num_conn in the ksmbd SMB server.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-71231.html&quot;&gt;CVE-2025-71231&lt;/a&gt;&lt;/strong&gt;: Addresses an out-of-bounds index in the crypto IAA driver.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-23222.html&quot;&gt;CVE-2026-23222&lt;/a&gt;&lt;/strong&gt;: Fixes a memory allocation issue in the crypto OMAP driver.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-23229.html&quot;&gt;CVE-2026-23229&lt;/a&gt;&lt;/strong&gt;: Resolves a missing spinlock protection in the crypto virtio driver.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-71237.html&quot;&gt;CVE-2025-71237&lt;/a&gt;&lt;/strong&gt;: Fixes a potential block overflow in nilfs2 that could cause corruption.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-71230.html&quot;&gt;CVE-2025-71230&lt;/a&gt;&lt;/strong&gt;: Addresses an issue where HFS superblock info was not always cleaned up properly.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-71229.html&quot;&gt;CVE-2025-71229&lt;/a&gt;&lt;/strong&gt;: Resolves an alignment fault in the rtw88 WiFi driver.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-71236.html&quot;&gt;CVE-2025-71236&lt;/a&gt;&lt;/strong&gt;: Fixes missing validation before freeing resources in the qla2xxx SCSI driver.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-71235.html&quot;&gt;CVE-2025-71235&lt;/a&gt;&lt;/strong&gt;: Addresses a module unload race condition in the qla2xxx SCSI driver.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-71232.html&quot;&gt;CVE-2025-71232&lt;/a&gt;&lt;/strong&gt;: Resolves a memory leak in an error path in the qla2xxx SCSI driver.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-23225.html&quot;&gt;CVE-2026-23225&lt;/a&gt;&lt;/strong&gt;: Fixes an incorrect CID ownership assumption in the scheduler mmcid subsystem.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-23221.html&quot;&gt;CVE-2026-23221&lt;/a&gt;&lt;/strong&gt;: Addresses a use-after-free in the fsl-mc bus driver override handling.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-23224.html&quot;&gt;CVE-2026-23224&lt;/a&gt;&lt;/strong&gt;: Resolves a use-after-free in erofs for file-backed mounts.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-23223.html&quot;&gt;CVE-2026-23223&lt;/a&gt;&lt;/strong&gt;: Fixes a use-after-free in XFS btree block owner checking.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-23227.html&quot;&gt;CVE-2026-23227&lt;/a&gt;&lt;/strong&gt;: Addresses a missing lock protection in the Exynos VIDI DRM driver.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-71233.html&quot;&gt;CVE-2025-71233&lt;/a&gt;&lt;/strong&gt;: Resolves an issue with asynchronous sub-group creation in PCI endpoint.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-71234.html&quot;&gt;CVE-2025-71234&lt;/a&gt;&lt;/strong&gt;: Fixes a slab out-of-bounds access in the rtl8xxxu WiFi driver.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-71238.html&quot;&gt;CVE-2025-71238&lt;/a&gt;&lt;/strong&gt;: Addresses a double-free in the qla2xxx SCSI driver’s bsg_done handler.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-23236.html&quot;&gt;CVE-2026-23236&lt;/a&gt;&lt;/strong&gt;: Fixes improper ioctl memory copy in the smscufx framebuffer driver.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-23235.html&quot;&gt;CVE-2026-23235&lt;/a&gt;&lt;/strong&gt;: Resolves an out-of-bounds access in f2fs sysfs attribute handling.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-23234.html&quot;&gt;CVE-2026-23234&lt;/a&gt;&lt;/strong&gt;: Addresses a use-after-free in f2fs write end I/O handling.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;libtpms-0102&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://github.com/stefanberger/libtpms&quot;&gt;libtpms&lt;/a&gt; 0.10.2&lt;/strong&gt;:&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-21444.html&quot;&gt;CVE-2026-21444&lt;/a&gt;&lt;/strong&gt;: Fixes a flaw in libtpms that weakened encryption and decryption.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;libvncserver&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://github.com/LibVNC/libvncserver&quot;&gt;LibVNCServer&lt;/a&gt;&lt;/strong&gt;:&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-32853.html&quot;&gt;CVE-2026-32853&lt;/a&gt;&lt;/strong&gt;: Fixes a vulnerability where a crafted message could lead to information disclosure or denial of service.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-32854.html&quot;&gt;CVE-2026-32854&lt;/a&gt;&lt;/strong&gt;: Addresses an issue where crafted requests could cause a denial of service.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;freeipmi-1617&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://www.gnu.org/software/freeipmi/index.html&quot;&gt;freeipmi&lt;/a&gt; 1.6.17&lt;/strong&gt;:&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-33554.html&quot;&gt;CVE-2026-33554&lt;/a&gt;&lt;/strong&gt;: Resolves improper memory handling and data validation that could lead to stack buffer overflows and acceptance of malformed payloads.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;nghttp2-1681&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://nghttp2.org/&quot;&gt;nghttp2&lt;/a&gt; 1.68.1&lt;/strong&gt;:&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-27135.html&quot;&gt;CVE-2026-27135&lt;/a&gt;&lt;/strong&gt;: Addresses a vulnerability that fixes an assertion failure from missing state validation.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;inkscape-71215&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://inkscape.org/&quot;&gt;inkscape&lt;/a&gt; 7.1.2.15&lt;/strong&gt;:&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-24481.html&quot;&gt;CVE-2026-24481&lt;/a&gt;&lt;/strong&gt;: Fixes a heap information disclosure when processing malformed PSD files.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25794.html&quot;&gt;CVE-2026-25794&lt;/a&gt;&lt;/strong&gt;: Addresses a heap buffer overflow via integer overflow when writing images with large dimensions.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25796.html&quot;&gt;CVE-2026-25796&lt;/a&gt;&lt;/strong&gt;: Resolves a memory leak that could be exploited for denial of service.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25637.html&quot;&gt;CVE-2026-25637&lt;/a&gt;&lt;/strong&gt;: Fixes a memory leak in the ASHLAR image writer that could lead to denial of service.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25576.html&quot;&gt;CVE-2026-25576&lt;/a&gt;&lt;/strong&gt;: Addresses a heap buffer over-read in multiple raw image format handlers potentially disclosing sensitive information.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-26983.html&quot;&gt;CVE-2026-26983&lt;/a&gt;&lt;/strong&gt;: Fixes a NULL pointer dereference in the MSL interpreter that could cause a crash.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-26284.html&quot;&gt;CVE-2026-26284&lt;/a&gt;&lt;/strong&gt;: Resolves a use-after-free that could lead to denial of service or code execution.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-26283.html&quot;&gt;CVE-2026-26283&lt;/a&gt;&lt;/strong&gt;: Addresses an infinite loop in the JPEG encoder that could cause denial of service.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25965.html&quot;&gt;CVE-2026-25965&lt;/a&gt;&lt;/strong&gt;: Fixes a path traversal that could allow reading arbitrary files on the system.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25967.html&quot;&gt;CVE-2026-25967&lt;/a&gt;&lt;/strong&gt;: Addresses improper encoding or escaping of output that could allow arbitrary command execution.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25989.html&quot;&gt;CVE-2026-25989&lt;/a&gt;&lt;/strong&gt;: Fixes an integer overflow in the internal SVG decoder that could cause denial of service.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25968.html&quot;&gt;CVE-2026-25968&lt;/a&gt;&lt;/strong&gt;: Resolves a memory leak in coders that write raw pixel data potentially leading to denial of service.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-24485.html&quot;&gt;CVE-2026-24485&lt;/a&gt;&lt;/strong&gt;: Addresses an out-of-bounds read that could cause a crash.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25985.html&quot;&gt;CVE-2026-25985&lt;/a&gt;&lt;/strong&gt;: Fixes unbounded resource allocation in the SVG decoder that could lead to denial of service.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25987.html&quot;&gt;CVE-2026-25987&lt;/a&gt;&lt;/strong&gt;: Resolves an integer overflow in the SVG decoder potentially causing denial of service.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25966.html&quot;&gt;CVE-2026-25966&lt;/a&gt;&lt;/strong&gt;: Addresses a security policy bypass via fd: pseudo-filenames allowing stdin/stdout access.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25799.html&quot;&gt;CVE-2026-25799&lt;/a&gt;&lt;/strong&gt;: Fixes an out-of-bounds read that could disclose memory contents.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25798.html&quot;&gt;CVE-2026-25798&lt;/a&gt;&lt;/strong&gt;: Resolves an out-of-bounds read potentially leading to information disclosure or a crash.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25795.html&quot;&gt;CVE-2026-25795&lt;/a&gt;&lt;/strong&gt;: Fixes a NULL pointer dereference that could cause a denial of service.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-26066.html&quot;&gt;CVE-2026-26066&lt;/a&gt;&lt;/strong&gt;: Addresses resource exhaustion when writing IPTCTEXT that could lead to denial of service.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25638.html&quot;&gt;CVE-2026-25638&lt;/a&gt;&lt;/strong&gt;: Resolves a memory leak that could be exploited for denial of service.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25797.html&quot;&gt;CVE-2026-25797&lt;/a&gt;&lt;/strong&gt;: Fixes a code injection issue that could allow arbitrary code execution.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25897.html&quot;&gt;CVE-2026-25897&lt;/a&gt;&lt;/strong&gt;: Addresses a heap buffer overflow in the sun decoder potentially causing a crash.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25970.html&quot;&gt;CVE-2026-25970&lt;/a&gt;&lt;/strong&gt;: Resolves a memory leak that could lead to denial of service via image processing.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25982.html&quot;&gt;CVE-2026-25982&lt;/a&gt;&lt;/strong&gt;: Fixes a use-after-free that could lead to denial of service or code execution.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25983.html&quot;&gt;CVE-2026-25983&lt;/a&gt;&lt;/strong&gt;: Addresses an out-of-bounds read in the PCD coder that could disclose memory contents.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25898.html&quot;&gt;CVE-2026-25898&lt;/a&gt;&lt;/strong&gt;: Resolves an out-of-bounds read that could cause a crash or information disclosure.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25971.html&quot;&gt;CVE-2026-25971&lt;/a&gt;&lt;/strong&gt;: Fixes a memory leak in the text coder that could lead to denial of service.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25988.html&quot;&gt;CVE-2026-25988&lt;/a&gt;&lt;/strong&gt;: Addresses a use-after-free in the meta coder potentially allowing code execution.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25969.html&quot;&gt;CVE-2026-25969&lt;/a&gt;&lt;/strong&gt;: Resolves a memory leak that could lead to denial of service via image processing.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25986.html&quot;&gt;CVE-2026-25986&lt;/a&gt;&lt;/strong&gt;: Fixes a vulnerability that could lead to denial of service when processing crafted images.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;expat-275&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://github.com/libexpat&quot;&gt;expat&lt;/a&gt; 2.7.5&lt;/strong&gt;:&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-32776.html&quot;&gt;CVE-2026-32776&lt;/a&gt;&lt;/strong&gt;: Fixes a NULL pointer when handling empty external parameter entity content.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-32777.html&quot;&gt;CVE-2026-32777&lt;/a&gt;&lt;/strong&gt;: Addresses an infinite loop that could lead to denial of service.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-32778.html&quot;&gt;CVE-2026-32778&lt;/a&gt;&lt;/strong&gt;: Resolves a NULL pointer after an earlier out-of-memory condition.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;tigervnc&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://tigervnc.org/&quot;&gt;TigerVNC&lt;/a&gt;&lt;/strong&gt;:&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-34352.html&quot;&gt;CVE-2026-34352&lt;/a&gt;&lt;/strong&gt;: Fixes incorrect permissions that could allow other users to observe or manipulate screen contents, or cause a crash.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;clamav-152&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://www.clamav.net/&quot;&gt;clamav&lt;/a&gt; 1.5.2&lt;/strong&gt;:&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-20031.html&quot;&gt;CVE-2026-20031&lt;/a&gt;&lt;/strong&gt;: Fixes an error handling bug that could crash the program and cause a denial of service.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;freerdp-3241&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://www.freerdp.com/&quot;&gt;FreeRDP&lt;/a&gt; 3.24.1&lt;/strong&gt;:&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-29774.html&quot;&gt;CVE-2026-29774&lt;/a&gt;&lt;/strong&gt;: Fixes a client-side heap buffer overflow.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-29775.html&quot;&gt;CVE-2026-29775&lt;/a&gt;&lt;/strong&gt;: Addresses an off-by-one boundary check in the bitmap cache subsystem that could cause out-of-bounds read/write.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-29776.html&quot;&gt;CVE-2026-29776&lt;/a&gt;&lt;/strong&gt;: Resolves an integer underflow that could lead to a crash.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-31806.html&quot;&gt;CVE-2026-31806&lt;/a&gt;&lt;/strong&gt;: Fixes a heap buffer overflow caused by unchecked bitmap dimensions from a malicious server.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-31883.html&quot;&gt;CVE-2026-31883&lt;/a&gt;&lt;/strong&gt;: Addresses a size_t underflow leading to a heap buffer overflow via the RDPSND channel.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-31884.html&quot;&gt;CVE-2026-31884&lt;/a&gt;&lt;/strong&gt;: Resolves a division-by-zero in the ADPCM decoders when nBlockAlign is 0, causing a crash.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-31885.html&quot;&gt;CVE-2026-31885&lt;/a&gt;&lt;/strong&gt;: Fixes an out-of-bounds read in the ADPCM decoders due to missing predictor and step_index bounds checks.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;giflib&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://github.com/mirrorer/giflib&quot;&gt;giflib&lt;/a&gt;&lt;/strong&gt;:&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-23868.html&quot;&gt;CVE-2026-23868&lt;/a&gt;&lt;/strong&gt;: Fixes a double-free vulnerability from a shallow copy that could lead to memory corruption.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;curl-8190&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://curl.se/&quot;&gt;curl&lt;/a&gt; 8.19.0&lt;/strong&gt;:&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-1965.html&quot;&gt;CVE-2026-1965&lt;/a&gt;&lt;/strong&gt;: Fixes bad reuse of HTTP Negotiate connections that could lead to authentication bypass with wrong credentials.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-3783.html&quot;&gt;CVE-2026-3783&lt;/a&gt;&lt;/strong&gt;: Addresses a token leak when following redirects with netrc credentials.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-3784.html&quot;&gt;CVE-2026-3784&lt;/a&gt;&lt;/strong&gt;: Resolves wrong proxy connection reuse with different credentials, potentially exposing authenticated sessions.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-3805.html&quot;&gt;CVE-2026-3805&lt;/a&gt;&lt;/strong&gt;: Fixes a use-after-free in SMB connection reuse that could lead to a crash or potential code execution.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;qemu-1022&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://wiki.qemu.org/&quot;&gt;QEMU&lt;/a&gt; 10.2.2&lt;/strong&gt;:&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-2243.html&quot;&gt;CVE-2026-2243&lt;/a&gt;&lt;/strong&gt;: Fixes an out-of-bounds read in QEMU’s VMDK image handling that could lead to information disclosure or denial of service.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-3196.html&quot;&gt;CVE-2026-3196&lt;/a&gt;&lt;/strong&gt;: Addresses an integer overflow that could allow a malicious guest to cause unbounded memory allocation and denial of service on the host.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;udisks2&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://www.freedesktop.org/wiki/Software/udisks/&quot;&gt;udisks2&lt;/a&gt;&lt;/strong&gt;:&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-26104.html&quot;&gt;CVE-2026-26104&lt;/a&gt;&lt;/strong&gt;: Fixes a missing authorization check that allowed unprivileged users to back up LUKS encryption headers and potentially expose sensitive cryptographic metadata.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-26103.html&quot;&gt;CVE-2026-26103&lt;/a&gt;&lt;/strong&gt;: Addresses a missing authorization check that allowed unprivileged users to restore LUKS encryption headers, which could potentially render encrypted volumes inaccessible.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;gvfs-1582&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://wiki.gnome.org/Projects/gvfs&quot;&gt;GVFS&lt;/a&gt; 1.58.2&lt;/strong&gt;:&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-28296.html&quot;&gt;CVE-2026-28296&lt;/a&gt;&lt;/strong&gt;: Fixes a CRLF injection flaw in the FTP backend that could allow a remote attacker to inject arbitrary FTP commands via crafted file paths.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;python-tornado6&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://pypi.org/project/tornado/&quot;&gt;python-tornado6&lt;/a&gt;&lt;/strong&gt;&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-31958.html&quot;&gt;CVE-2026-31958&lt;/a&gt;&lt;/strong&gt;: Fixes a denial-of-service vulnerability where requests with thousands of parts could cause excessive CPU consumption.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;libjxl-0112&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://github.com/libjxl/libjxl&quot;&gt;libjxl&lt;/a&gt; 0.11.2&lt;/strong&gt;:&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-1837.html&quot;&gt;CVE-2026-1837&lt;/a&gt;&lt;/strong&gt;: Fixes a memory corruption issue when processing crafted grayscale images with LCMS2 that could potentially lead to code execution or information disclosure.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;util-linux&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://github.com/util-linux/util-linux&quot;&gt;util-linux&lt;/a&gt;&lt;/strong&gt;:&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-3184.html&quot;&gt;CVE-2026-3184&lt;/a&gt;&lt;/strong&gt;: Addresses improper hostname canonicalization that could allow bypass of host-based PAM access control rules.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;sdbootutil&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://github.com/openSUSE/sdbootutil&quot;&gt;sdbootutil&lt;/a&gt;&lt;/strong&gt;:&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25701.html&quot;&gt;CVE-2026-25701&lt;/a&gt;&lt;/strong&gt;: Fixes an insecure temporary file vulnerability that could allow local users to access private information or manipulate boot configuration data.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;imagemagick-71217&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://imagemagick.org/index.php&quot;&gt;ImageMagick&lt;/a&gt; 7.1.2.17&lt;/strong&gt;:&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-32259.html&quot;&gt;CVE-2026-32259&lt;/a&gt;&lt;/strong&gt;: Fixes a stack-based buffer overflow when a memory allocation fails that could potentially allow writes past the end of a buffer.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;graphicsmagick&quot;&gt;&lt;strong&gt;&lt;a href=&quot;http://www.graphicsmagick.org/&quot;&gt;GraphicsMagick&lt;/a&gt;&lt;/strong&gt;:&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25799.html&quot;&gt;CVE-2026-25799&lt;/a&gt;&lt;/strong&gt;: Provides a fix that could lead to a crash and denial of service.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-28690.html&quot;&gt;CVE-2026-28690&lt;/a&gt;&lt;/strong&gt;: Fixes a stack buffer overflow vulnerability that could lead to a crash or potential code execution.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-30883.html&quot;&gt;CVE-2026-30883&lt;/a&gt;&lt;/strong&gt;: Addresses a heap overflow when encoding a PNG image with an extremely large image profile.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;libsoup2&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://gitlab.gnome.org/GNOME/libsoup.git&quot;&gt;libsoup2&lt;/a&gt;&lt;/strong&gt;:&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-1760.html&quot;&gt;CVE-2026-1760&lt;/a&gt;&lt;/strong&gt;: Fixes improper handling of HTTP requests combining certain headers that could lead to HTTP request smuggling and potential denial of service.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-1467.html&quot;&gt;CVE-2026-1467&lt;/a&gt;&lt;/strong&gt;: Addresses a lack of input sanitization that could lead to unintended or unauthorized HTTP requests.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-1539.html&quot;&gt;CVE-2026-1539&lt;/a&gt;&lt;/strong&gt;: Resolves proxy authentication credentials being leaked via the Proxy-Authorization header when handling HTTP redirects.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-0716.html&quot;&gt;CVE-2026-0716&lt;/a&gt;&lt;/strong&gt;: Fixes a flaw in WebSocket frame processing that could cause out-of-bounds memory reads, potentially leading to memory exposure or a crash.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;freetype2-2142&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://freetype.org&quot;&gt;freetype2&lt;/a&gt; 2.14.2&lt;/strong&gt;:&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-23865.html&quot;&gt;CVE-2026-23865&lt;/a&gt;&lt;/strong&gt;: Fixes an integer overflow in the FreeType library that could allow an out-of-bounds read when parsing OpenType variable fonts.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;exiv2-0288&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://github.com/Exiv2/exiv2&quot;&gt;exiv2&lt;/a&gt; 0.28.8&lt;/strong&gt;:&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-25884.html&quot;&gt;CVE-2026-25884&lt;/a&gt;&lt;/strong&gt;: Fixes an out-of-bounds read in the CRW image parser when processing crafted image files.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-27631.html&quot;&gt;CVE-2026-27631&lt;/a&gt;&lt;/strong&gt;: Addresses an integer overflow causing an uncaught exception that could lead to a crash and denial of service.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-27596.html&quot;&gt;CVE-2026-27596&lt;/a&gt;&lt;/strong&gt;: Resolves an out-of-bounds read in preview handling that could cause a crash when processing crafted image files.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-54080.html&quot;&gt;CVE-2025-54080&lt;/a&gt;&lt;/strong&gt;: Fixes an out-of-bounds read triggered when writing metadata into a crafted image file, potentially causing a crash.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-55304.html&quot;&gt;CVE-2025-55304&lt;/a&gt;&lt;/strong&gt;: Addresses quadratic performance in ICC profile parsing that could lead to denial of service.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2025-26623.html&quot;&gt;CVE-2025-26623&lt;/a&gt;&lt;/strong&gt;: Resolves a heap buffer overflow when writing metadata into a crafted image file, potentially allowing code execution.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;salt&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://saltproject.io/&quot;&gt;Salt&lt;/a&gt;&lt;/strong&gt;:&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-31958.html&quot;&gt;CVE-2026-31958&lt;/a&gt;&lt;/strong&gt;: Fixes a denial-of-service vulnerability where requests could cause excessive CPU consumption.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;openexr-346&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://openexr.com&quot;&gt;openexr&lt;/a&gt; 3.4.6&lt;/strong&gt;:&lt;/h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.suse.com/security/cve/CVE-2026-27622.html&quot;&gt;CVE-2026-27622&lt;/a&gt;&lt;/strong&gt;: Fixes an out-of-bounds write that could potentially lead to code execution when processing crafted EXR files.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Users are advised to update to the latest versions to mitigate these vulnerabilities.&lt;/p&gt;

&lt;h2 id=&quot;conclusion&quot;&gt;Conclusion&lt;/h2&gt;

&lt;p&gt;March 2026 was a month defined by refinement and security hardening across the &lt;a href=&quot;https://get.opensuse.org/tumbleweed/&quot;&gt;openSUSE Tumbleweed&lt;/a&gt; stack. The three Plasma 6.6 point releases demonstrated KDE’s steady cadence of desktop polish, while the kernel’s progression from 6.19.5 to 6.19.9 kept hardware support and filesystem reliability moving forward. Security was a clear theme throughout the month, with FreeRDP, curl, libsoup2, and the kernel itself all receiving significant CVE attention alongside a broad sweep of image processing fixes across GraphicsMagick, ImageMagick, and exiv2. Under the hood, the jump to libxml2 2.15.2 marked a meaningful step forward in web standards alignment, and GStreamer 1.28.1 pushed multimedia capabilities forward with speech-to-text transcription and AV1 decoding support.&lt;/p&gt;

&lt;h2 id=&quot;slowroll-arrivals&quot;&gt;Slowroll Arrivals&lt;/h2&gt;
&lt;p&gt;Please note that these updates also apply to &lt;a href=&quot;https://en.opensuse.org/openSUSE:Slowroll&quot;&gt;Slowroll&lt;/a&gt; and arrive between an average of 5 to 10 days after being released in Tumbleweed snapshot. This monthly approach has been consistent for many months, ensuring stability and timely enhancements for users. Updated packages for Slowroll are regularly published in emails on &lt;a href=&quot;https://lists.opensuse.org/archives/list/factory@lists.opensuse.org/&quot;&gt;openSUSE Factory mailing list&lt;/a&gt;.&lt;/p&gt;

&lt;h2 id=&quot;contributing-to-opensuse-tumbleweed&quot;&gt;Contributing to openSUSE Tumbleweed&lt;/h2&gt;
&lt;p&gt;Stay updated with the latest snapshots by subscribing to the openSUSE Factory mailing list.
For those Tumbleweed users who want to contribute or want to engage with detailed technological discussions, subscribe to the &lt;a href=&quot;https://lists.opensuse.org/archives/list/factory@lists.opensuse.org/&quot;&gt;openSUSE Factory mailing list &lt;/a&gt;. The openSUSE team encourages users to continue participating through bug reports, feature suggestions and discussions.&lt;/p&gt;

&lt;p&gt;Your contributions and feedback make openSUSE Tumbleweed better with every update. Whether reporting bugs, suggesting features, or participating in community discussions, your involvement is highly valued.&lt;/p&gt;

&lt;meta name=&quot;openSUSE, Open Source, development, Linux, secure operating systems, open source, plasma, Tumbleweed, KDE, Plasma, GNOME, Xfce, Wayland, Gear, Frameworks, FreeRDP, libxml, imagemagick, graphicsmagick, GVFS, zip, bind&quot; content=&quot;HTML,CSS,XML,JavaScript&quot; /&gt;

</content:encoded>
    </item>

  </channel>
</rss>

