#Deepin

Linux deepin 15.4 beta | Esthétique - Y'a du nouveau!

peertube.blablalinux.be/w/nLT1

2025-05-17

ACTU : #Deepin Desktop #retiré d'#openSUSE pour raison de sécurité

youtube.com/watch?v=4dLSE1-iC4

2025-05-14
#YouTube - https://www.youtube.com/@SwitchedtoLinux/videos

#Odysee - https://odysee.com/@switchedtolinux:0?view=content

#Rumble - https://rumble.com/c/SwitchedToLinux/videos

#Bitchute - https://www.bitchute.com/channel/uf9hzD216LX0

*Videos may take a considerable amount of time to post. If it is not present, it will be, soon(tm).

ALL HAIL THE VAN PANTHERS!!!

!!! NOTE !!! Switched To Linux is, “written by a broad spectrum computer consultant to help people learn more about the Linux platform.” This account is a supporter of @switchedtolinux and provides convenience posts of thumbnails art, videos and streams.

<<Posts may contain hashtags as content may pertain to many distributions and/or related material/topics. Posts may be reposted, boosted, shared, etc. by bots and/or other accounts and are done so at the discretion of the bots/accounts that perform those actions. This account is not responsible for the action(s) of those bots and/or accounts. Therefore, Offended Discretion is advised.>>

#SwitchedToLinux #Linux #Windows #Mac #AltTech #FOSS #YouTube #Odysee #Rumble #BitChute #Locals #DLive #Twitch #FactCheckTrue #Fediverse #Fedi22 #Fedi23 #Fedi24 #BigTech #OpenSUSE #Deepin
2025-05-14
#YouTube - https://www.youtube.com/@SwitchedtoLinux/videos

#Odysee - https://odysee.com/@switchedtolinux:0?view=content

#Rumble - https://rumble.com/c/SwitchedToLinux/videos

#Bitchute - https://www.bitchute.com/channel/uf9hzD216LX0

*Videos may take a considerable amount of time to post. If it is not present, it will be, soon(tm).

ALL HAIL THE VAN PANTHERS!!!

!!! NOTE !!! Switched To Linux is, “written by a broad spectrum computer consultant to help people learn more about the Linux platform.” This account is a supporter of @switchedtolinux@fosstodon.org and provides convenience posts of thumbnails art, videos and streams.



#SwitchedToLinux #Linux #Windows #Mac #AltTech #FOSS #YouTube #Odysee #Rumble #BitChute #Locals #DLive #Twitch #FactCheckTrue #Fediverse #Fedi22 #Fedi23 #Fedi24 #BigTech #OpenSUSE #Deepin
Grub :verified:Grub_09@mastodon.uno
2025-05-13

openSUSE ha deciso di escludere i pacchetti del desktop cinese Deepin per ragioni di sicurezza e poca trasparenza continua a leggere.....
#opensuse #deepin
miamammausalinux.org/2025/05/o

openSUSE is dropping support for the Deepin Desktop Environment due to security concerns and bypassing of openSUSE's security review.

news.itsfoss.com/opensuse-deep

#openSUSE #Deepin #Linux #FOSS

knoppixknoppix95
2025-05-11

has removed Deepin Desktop from its repositories due to security concerns and maintenance issues, including a package that bypassed security protocols.

While users can still choose Deepin Desktop, openSUSE advises against it due to potential risks.

Stay updated on security news, upgrade your system, and avoid Deepin Desktop for now.

news.itsfoss.com/opensuse-deep

🏁⚡Omar Two Tone⚡🏁:verified:omartwotone@ioc.exchange
2025-05-10

Removal of #deepin desktop from openSUSE due to packaging policy violation 👇🤔🧐
(I'm not a user of none of them, but it's interesting that the team of a distro opted for these actions on a software that was only suspicious because of its chinese origin)

security.opensuse.org/2025/05/

2025-05-10

🛑 Due to security policy violations and a packaging bypass, #openSUSE is removing the #Deepin #Desktop from Tumbleweed and Leap 16.0. Read the full story: linuxiac.com/opensuse-removes-

Dendrobatus AzureusDendrobatus_Azureus@bsd.cafe
2025-05-09

@rl_dane
According to the openSUSE team the people were made perfectly aware of what they were circumventing; it was put in plain English.

What was not put in plain English is that because of the circumvention they were putting themselves in tremendous risk.

Consider taking two kg of Aurum four kg of Argentum jewelry putting them on your body and then just walking on the street wearing only those jewels, in a street where there are only ladrónes. You're just begging for trouble

#openSUSE #Linux #POSIX #OpenSource #programming
#Deepin #frightmare #Infosec #nightmare #elmStreet

Dendrobatus AzureusDendrobatus_Azureus@bsd.cafe
2025-05-09

For me reading this post took about 10 minutes since I not only read but I also processed and checked references and I tooted about it immediately

It is quite sobering to read something this horrific happening in an Open Source project of this magnitude of volume

This is something you would expect in closed source not open source; it's like a shower with 0° degrees Celsius of water flowing over you 0° in the depth of the coldest Siberian winter

security.opensuse.org/2025/05/

#openSUSE #Linux #POSIX #OpenSource #programming
#Deepin #frightmare #Infosec #nightmare #elmStreet

Dendrobatus AzureusDendrobatus_Azureus@bsd.cafe
2025-05-09

This is where the depth of the deception became clear

>>

The review of this component was also what led us to the discovery of the deepin-feature-enable whitelisting bypass, since we installed the full Deepin desktop environment for the first time in a long time, which triggered the “license agreement” dialog described above. After finding out about this, we decided that it was time to reassess the overall topic of Deepin in openSUSE based on our long-standing experiences.

<<

security.opensuse.org/2025/05/

#openSUSE #Linux #POSIX #OpenSource #programming
#Deepin #WTF #frightmare #Infosec #nightmare #elmStreet

The image displays a screenshot of a text document on a mobile device. The background is dark, with text in white and blue boxes. The main text is in blue boxes and discusses the review of a component related to the Deepin desktop environment, mentioning the discovery of a whitelisting bypass. It also references the installation of the full Deepin desktop environment for the first time in a long time, which triggered a "license agreement" dialog. The text concludes with a decision to reassess the overall topic of Deepin in openSUSE based on long-standing experiences.

The bottom section of the image is in white text and provides a date, "2024-09-02," followed by a description of changes to the "deepin-system-monitor" component. It mentions the addition of a new D-Bus service and new Polkit actions. The text notes that the D-Bus service was accepted despite some quirks and that the review of the Polkit actions was not completed until now. It also mentions a second look at the D-Bus service, which revealed the use of the deprecated "UnixProcess" subject for Polkit authentication in an unsafe way. The bottom of the image includes navigation buttons labeled "III," "O," and "<."

 Ovis2-8B

🌱 Energy used: 0.338 Wh
Dendrobatus AzureusDendrobatus_Azureus@bsd.cafe
2025-05-09

This part I screen capped for accentuation

>>

2024-08-29: deepin-api-proxy: D-Bus Service

After a longer time of standstill regarding Deepin reviews, a request for the addition of deepin-api-proxy arrived. This package greeted us with over two dozen D-Bus configuration files. Again, upstream’s description of what the component is supposed to do was very terse. From looking at the implementation we deduced that the proxy component seems to be related to the renaming of interfaces described in the previous section.

We found a design flaw in the proxy’s design which allowed a local root exploit. You can find the details in a dedicated blog post we published about this not too long ago.

It is noteworthy that the communication with upstream proved very difficult during the coordinated disclosure process we started for this finding. We did not get timely responses, which nearly led us to a one-sided publication of the report, until upstream finally expressed their wish to follow coordinated disclosure at the very last moment.

<<

I now have really seen it all The Good the Bad and the Ugly in Open Source programming

security.opensuse.org/2025/05/

#openSUSE #Linux #POSIX #OpenSource #programming
#Deepin #WTF #frightmare #Infosec #nightmare #elmStreet

The image is a screenshot of a text document with a black background and white text. At the top, there is a status bar showing the time as 16:16, a weather icon indicating cloudy conditions, a temperature of 29 degrees, and a battery icon showing 83% charge. The main text is titled "2024-08-29: deepin-api-proxy: D-Bus Service." It discusses a request for the addition of the deepin-api-proxy package, which included over two dozen D-Bus configuration files. The text mentions that the upstream's description of the component was very terse and that the proxy component seems to be related to the renaming of interfaces described in a previous section. A design flaw in the proxy's design allowed a local root exploit, and details can be found in a dedicated blog post. The communication with upstream was difficult, and timely responses were not received, nearly leading to a one-sided publication of the report. The text concludes with navigation options at the bottom, including a page indicator and navigation arrows.

 Ovis2-8B

🌱 Energy used: 0.277 Wh
Dendrobatus AzureusDendrobatus_Azureus@bsd.cafe
2025-05-09

More excerpts

>>

Sadly the review of deepin-app-services was another chaotic case, one that is actually still unfinished. Even understanding the purpose of this D-Bus service was difficult, because there wasn’t really any design documentation or purpose description of the component. From looking at the D-Bus service implementation, we judged that it is a kind of system wide configuration store for Deepin. Contrary to most other Deepin D-Bus services, this one is not running as root but as a dedicated unprivileged service user.

<<

This reads like a horror novel but it's actually happening! Unbelievable how this has harmed a distro with many dedicated users!

security.opensuse.org/2025/05/

#openSUSE #Linux #POSIX #OpenSource #programming
#Deepin #wtf #frightmare #Infosec #nightmare #elmStreet

Dendrobatus AzureusDendrobatus_Azureus@bsd.cafe
2025-05-09

The Deepin frightmare

Excerpt from linked site
>>
After reviewing the main D-Bus service, we could not help ourselves but call it a security nightmare. The service methods were not only unauthenticated and thus accessible to all users in the system, but the D-Bus configuration file also allowed anybody to own the D-Bus service path on the system bus, which could lead to impersonation of the daemon. Among other issues, the D-Bus service allowed anybody in the system to create arbitrary new UNIX groups, add arbitrary users to arbitrary groups, set arbitrary users’ Samba passwords or overwrite almost any file on the system by invoking mkfs on them as root, leading to data loss and denial-of-service. The daemon did contain some Polkit authentication code, but it was all found in unused code paths; to top it all off, this code used the deprecated UnixProcess Polkit subject in an unsafe way, which would make it vulnerable to race conditions allowing authentication bypass, if it had been used.
<<

¿WTF?

security.opensuse.org/2025/05/

#openSUSE #Linux #POSIX #OpenSource #programming
#Deepin #WTF #frightmare #Infosec #nightmare #elmStreet

The screencap shows a screenshot of a mobile device displaying a blog post from the SUSE Security Team. The post is titled "Removal of Deepin Desktop from openSUSE due to Packaging Policy Violation" and is authored by Matthias Gerstner, dated May 7, 2025. The post is categorized under the tags #POLKIT, #D-BUS, and #DEEPIN. The table of contents includes sections titled "Introduction" and "Bypass of the openSUSE." The background of the blog post is dark, with white and green text. The device's status bar at the top shows the time as 16:09, the weather as cloudy with a temperature of 29°, and a battery level of 84%. The URL in the browser's address bar is "security.opensuse.org."

 Ovis2-8B

🌱 Energy used: 0.212 Wh
Michael Gisiger :mastodon:gisiger@nerdculture.de
2025-05-09

”According to the #SUSE Security Team, though, DDE's beauty is only skin deep. Beneath the polished surface, it's not pretty at all. The team enumerates a whole list of problems, including claimed abuses of D-Bus and Polkit, but also some very poor design decisions. Some of these represent major security holes“

theregister.com: openSUSE deep sixes #Deepin desktop over security stink

theregister.com/2025/05/09/ope

#Linux

Linuxiaclinuxiac
2025-05-08

openSUSE removes Deepin Desktop after discovering a policy-violating workaround used to bypass required security reviews of sensitive system components.
linuxiac.com/opensuse-removes-

openSUSE removes Deepin Desktop after discovering a policy-violating workaround used to bypass required security reviews of sensitive system components.
Andrew Graves :arch: :linux:graves501@fosstodon.org
2025-05-08

@macberg

Yeah, it's interesting to think about:

When using software intentionally, you always have to be aware of who's generally in charge of the code. Who are also in charge of your data...

People are seemingly waking up from this fever dream of #enshitification and data tracking. Switching to #FOSS and even a different OS.

#Deepin does not seem like a trustworthy project, every time I've heard about it, something sketchy goes on, so it's a very bad example of FOSS :(

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst