5
Sync Updates for Week 20, 2024
(discuss.getsol.us)
This summary is generated with ChatGPT and edited by me
Here's the latest update for this week:
System Update Measures:
- We've implemented safety measures to ensure system updates won't break your system, regardless of the last update. An in-depth breakdown of last week's issues will be provided later. We're working on further steps to ensure everyone transitions to a fully
/usr
Merged system safely. Thanks for your patience.
Kernel Updates:
- The Current branch kernel has been updated to 6.8.10.
- The LTS branch kernel has been updated to 6.6.31.
- The build time for these kernels now derives from the
SOURCE_DATE_EPOCH
.
KDE Frameworks Update:
- KDE Frameworks have been updated to 6.2.0. These are 72 addon libraries to Qt providing commonly needed functionalities.
LibreOffice Icon Theme:
- Previously, LibreOffice on Budgie used the Sifr Dark icon theme by default, causing unreadable icons with a light theme. Now, LibreOffice defaults to the colored Elementary icons, ensuring readability across all editions of Solus.
Boot Loader Management Tool:
- Over at Serpent, Ikey has been developing blsforme, a replacement for clr-boot-manager. blsforme is a tool and library for the Boot Loader Specification, progressing swiftly towards Solus 5. This change addresses several issues associated with clr-boot-manager.
GLib CVE Fix and Application Crashes:
- The recent GLib CVE fix revealed other bugs causing crashes in Inkscape, gedit, HandBrake, and possibly other programs when vala-panel-appmenu is installed. We've backported a patch to GLib to fix these issues.
Security Updates:
- git: Updated to 2.45.1-128, including fixes for CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, and CVE-2024-32465.
- libxml2: Updated to 2.12.7-48, addressing CVE-2024-34459.
- Chromium-based browsers: Updated to address zero-day flaws CVE-2024-4761 and CVE-2024-4947. If you're using Brave, Opera, Vivaldi, or any Chromium-based browser, ensure these updates are applied due to known exploits.