Skip Navigation

Sync Updates for Week 20, 2024

This summary is generated with ChatGPT and edited by me

Here's the latest update for this week:

System Update Measures:

  • We've implemented safety measures to ensure system updates won't break your system, regardless of the last update. An in-depth breakdown of last week's issues will be provided later. We're working on further steps to ensure everyone transitions to a fully /usr Merged system safely. Thanks for your patience.

Kernel Updates:

  • The Current branch kernel has been updated to 6.8.10.
  • The LTS branch kernel has been updated to 6.6.31.
  • The build time for these kernels now derives from the SOURCE_DATE_EPOCH.

KDE Frameworks Update:

  • KDE Frameworks have been updated to 6.2.0. These are 72 addon libraries to Qt providing commonly needed functionalities.

LibreOffice Icon Theme:

  • Previously, LibreOffice on Budgie used the Sifr Dark icon theme by default, causing unreadable icons with a light theme. Now, LibreOffice defaults to the colored Elementary icons, ensuring readability across all editions of Solus.

Boot Loader Management Tool:

  • Over at Serpent, Ikey has been developing blsforme, a replacement for clr-boot-manager. blsforme is a tool and library for the Boot Loader Specification, progressing swiftly towards Solus 5. This change addresses several issues associated with clr-boot-manager.

GLib CVE Fix and Application Crashes:

  • The recent GLib CVE fix revealed other bugs causing crashes in Inkscape, gedit, HandBrake, and possibly other programs when vala-panel-appmenu is installed. We've backported a patch to GLib to fix these issues.

Security Updates:

  • git: Updated to 2.45.1-128, including fixes for CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, and CVE-2024-32465.
  • libxml2: Updated to 2.12.7-48, addressing CVE-2024-34459.
  • Chromium-based browsers: Updated to address zero-day flaws CVE-2024-4761 and CVE-2024-4947. If you're using Brave, Opera, Vivaldi, or any Chromium-based browser, ensure these updates are applied due to known exploits.
0
0 comments