[Testing Update] 2026-02-08 - Kernels, KDE Gear, COSMIC, Systemd, Qt6, LibreOffice

5 days 8 hours ago

Hello community, here we have another set of package updates.

Current Promotions Recent News KDE Plasma users with SDDM can now migrate to Plasma Login Manager (click for more details) NVIDIA 590 driver drops Pascal support (click for more details)
  • Manjaro 26.0 Anh-Linh released
  • Manjaro Summit public Alpha now available
  • As of Linux 5.4.302, the 5.4 series is now EOL (End Of Life). Please install 5.10 LTS (Long Term Support) or 5.15 LTS.
  • As of Linux 6.16.12, the 6.16 series is now EOL (End Of Life). Please install 6.18 LTS (Long Term Support) and/or 6.12 LTS.
  • As of Linux 6.17.13, the 6.17 series is now EOL (End Of Life). Please install 6.18 LTS (Long Term Support) and/or 6.12 LTS.
Previous News Finding information easier about Manjaro (click for more details) Notable Package Updates Additional Info Python 3.14 info (click for more details) Info about AUR packages (click for more details)

Get our latest daily developer images now from Github: Plasma, GNOME, XFCE. You can get the latest stable releases of Manjaro from CDN77.

Our current supported kernels

  • linux510 5.10.249
  • linux515 5.15.199
  • linux61 6.1.162
  • linux66 6.6.123
  • linux612 6.12.69
  • linux618 6.18.9
  • linux619 6.19.0-rc8
  • linux61-rt 6.1.158_rt58
  • linux66-rt 6.6.116_rt66
  • linux612-rt 6.12.66_rt15
  • linux617-rt 6.17.5_rt7

Package Changes (2/8/26 05:47 CET)

  • testing core x86_64: 34 new and 35 removed package(s)
  • testing extra x86_64: 1870 new and 2016 removed package(s)
  • testing multilib x86_64: 8 new and 6 removed package(s)

List of changes can be found here

Click to view the poll.

Check if your mirror has already synced:

4 posts - 4 participants

Read full topic

philm

Latin America’s AI Opportunity: From Adoption to Co-Creation Through Open Source

1 week ago

As the general manager of Dronecode Foundation, a Linux Foundation project, I work at the intersection of autonomy and open source. I spend a lot of time thinking about what it takes to move advanced technology from research labs into real-world, safety-critical environments. In the drone ecosystem, whether we are talking about agriculture, infrastructure inspection, disaster response, or public safety, AI only delivers value when it is affordable, adaptable, and trusted. That reality is not unique to drones. It is precisely the challenge facing Latin America today, and it is also the opportunity.

Ramón Roche

Linux Kernel Runtime Guard Reaches 1.0: A Major Milestone for Runtime Kernel Security

1 week ago
by George Whittaker

The Linux security landscape just reached an important milestone. Linux Kernel Runtime Guard (LKRG) has officially hit version 1.0, marking its transition from a long-running experimental project into a mature, production-ready security tool. For administrators and security-conscious users, this release reinforces LKRG’s role as a powerful additional layer of defense for Linux systems.

After years of development, testing, and real-world use, the 1.0 release signals confidence in LKRG’s stability, compatibility, and long-term direction.

What Is LKRG?

LKRG is a loadable kernel module designed to protect the Linux kernel at runtime. Instead of relying solely on compile-time hardening or static security features, LKRG actively monitors the kernel while the system is running. Its goal is to detect unauthorized changes, suspicious behavior, and exploit attempts that target kernel internals.

Because it operates at runtime, LKRG complements existing protections like SELinux, AppArmor, and kernel hardening options rather than replacing them.

Why the 1.0 Release Matters

Reaching version 1.0 is more than a symbolic version bump. It reflects years of refinement and signals that the project has reached a level of maturity suitable for broader adoption.

With this release, LKRG offers:

  • Stable behavior across a wide range of kernel versions

  • Improved reliability under real-world workloads

  • Cleaner internal architecture and reduced overhead

  • Confidence for system administrators deploying it in production environments

For security tooling, especially something operating inside the kernel, stability and predictability are critical, and the 1.0 milestone acknowledges that standard.

How LKRG Protects the Kernel

At a high level, LKRG continuously checks the integrity of critical kernel structures and execution paths. It looks for signs that something has altered kernel memory, process credentials, or execution flow in unexpected ways.

When suspicious activity is detected, LKRG can:

  • Log warnings or alerts

  • Block the offending action

  • Trigger defensive responses based on configuration

This makes it particularly useful for detecting privilege-escalation exploits and post-exploitation activity that might otherwise go unnoticed.

Who Should Consider Using LKRG?

LKRG is especially relevant for:

  • Servers and cloud hosts exposed to untrusted workloads

  • Enterprise systems with strict security requirements

Go to Full Article
George Whittaker