Yesterday, just over a day after will be published which Plasma has a security flaw, KDE Community had already created patches to fix the vulnerability. The first to install them were users of KDE neon, an operating system developed by the KDE community that uses special repositories. Kubuntu users, who by default use the official repositories, still have to wait, unless we do what They have published a few minutes ago.
Kubuntu has already delivered the patch to Canonical and now it is Mark Shuttleworth's company who has to review them and publish them in the official repositories. If we want to install them without waiting another minute, we have two options that share an action: add a repository, among which we will have to choose the one for Kubuntu updates or its Backports repository. Below you have more information about it.
Table of Contents
Add a repository to fix the Plasma bug
backports
El Backports repository KDE can be much more interesting, but it is also more "dangerous", in quotes. The danger is that we will install software like new versions of Plasma, KDE Applications or KDE Frameworks first, which means that we use less tested and stable software. The good news is that these types of security updates also arrive before the official repositories. We can install it by opening a terminal and typing these commands:
sudo add-apt-repository ppa:kubuntu-ppa/backports
updates
On the other hand, we have the Kubuntu update repository. Basically it is a repository where we will first test everything that Kubuntu has prepared. On their website they give as an example that Kubuntu 15.10 users were able to test Plasma 5.4.2 from Plasma 5.4.1 before the packages were delivered to the Ubuntu update repository. In other words, it is a shortcut. This is the option to choose if we just want to apply the patch sooner. We will add the repository with this command:
sudo add-apt-repository ppa:kubuntu-ppa/ppa
In both cases, after adding the repository we will write these two other commands:
sudo apt update sudo apt full-upgrade
According to security experts, it was not a very serious failure for how difficult it was to exploit, but the KDE Community did not want to risk it. He has repaired it in record time and users can be 100% calm. From here, again: thank you.
Be the first to comment