Claude Desktop 1.3109.0 (patch release 3)
This release provides Claude Desktop version 1.3109.0 pre-patched for Linux.
Installation Options
Arch Linux (AUR)
yay -S claude-desktop-binDebian/Ubuntu (APT Repository — recommended)
curl -fsSL https://patrickjaja.github.io/claude-desktop-bin/install.sh | sudo bash
sudo apt install claude-desktop-binDebian/Ubuntu (manual .deb)
# x86_64
sudo apt install ./claude-desktop-bin_1.3109.0-3_amd64.deb
# ARM64
sudo apt install ./claude-desktop-bin_1.3109.0-3_arm64.debFedora/RHEL (RPM Repository — recommended)
curl -fsSL https://patrickjaja.github.io/claude-desktop-bin/install-rpm.sh | sudo bash
sudo dnf install claude-desktop-binFedora/RHEL (manual .rpm)
# x86_64
sudo dnf install ./claude-desktop-bin-1.3109.0-3.x86_64.rpm
# ARM64
sudo dnf install ./claude-desktop-bin-1.3109.0-3.aarch64.rpmNixOS / Nix
nix run github:patrickjaja/claude-desktop-binAppImage (Any Distro)
# x86_64
chmod +x Claude_Desktop-1.3109.0-x86_64.AppImage
./Claude_Desktop-1.3109.0-x86_64.AppImage
# ARM64
chmod +x Claude_Desktop-1.3109.0-aarch64.AppImage
./Claude_Desktop-1.3109.0-aarch64.AppImageUpdate existing AppImage (delta download — only changed blocks):
appimageupdatetool Claude_Desktop-*-x86_64.AppImage # Or from within the AppImage: ./Claude_Desktop-*-x86_64.AppImage --appimage-update
Checksums
| File | SHA256 |
|---|---|
| Tarball | 908e5306cfddf1208aae03bc52f5330130e5e6693f2bc25c30b7ca7321805769
|
| AppImage (x86_64) | 02928e3e9fd4431d0f29618791cac7a2f71c1eeea732eb1d8d44399977d3e574
|
| AppImage (aarch64) | 5f80d62dd1a35bf01a56b8cc8a2a9496752eb0af2002b4eb4b4602af5fe27824
|
| Debian (amd64) | 1a43549b5404be18c00692c0eb0edafd0f249796ba8971d9aca123844ca58e25
|
| Debian (arm64) | 28514955f22ce15aec2fe7bb7b099163a3a30c8a085ebd4bada7ac28313b9de3
|
| RPM (x86_64) | 355dc80eb982d212198eb0e1f56d23616ca8abe1403b31c584b86ce9d80a1523
|
| RPM (aarch64) | 0b8aef5c09a1d22e9848ffc1e5a47d5e55fc1348c000cd9cbf043a4612d198f4
|
Changes since last release
Fixed
- All computer-use tools returning
Unknown tool: [object Object]: Upstream reordered thehandleToolCall(toolName, input, sessionCtx)parameters. OurLINUX_HANDLER_INJECTION_JStemplate used hardcodede/t/rmatching the old order wheretwas the tool name. After the upstream swap,tbecame the session context object, causing every tool dispatch to hit thedefaultbranch and stringify the object. - Fix: Replaced hardcoded single-letter param references with placeholders (
__TOOL_NAME__,__INPUT__,__SESSION__) that are dynamically substituted with the captured minified parameter names from the regex match at patch time. This makes the injection resilient to future parameter renamings or reorderings. eseSet false-positive "already applied": Upstream added"linux"to an unrelated Set (not the computer-use gateBmA). Initial fix detected it as "already applied" and skipped the realBmASet, leavingSdA()returningfalseon Linux — computer-use MCP server never registered (0 tools). Fixed: always apply to all["darwin","win32"]Sets first, only fall back to "already applied" if zero unpatched Sets remain.