Language Selection

English French German Italian Portuguese Spanish

Devuan 2.0 Reaches Beta, Debian Without Systemd & Now Based On Stretch

Filed under
Debian

It's been a while since last having anything to report on Devuan, the Debian derivative focused on "init freedom" by shipping the Debian packages without any dependence on systemd. But just in time for Valentine's Day, Devuan 2.0 Beta is now available.

Devuan 1.0 was released last year and based on the Debian Jessie package set while the Devuan 2.0 development is tracking Debian Stretch. Thus with the switch to Devuan 2.0 comes a lot of upstream package updates while this distribution remains committed to shipping without systemd and still providing a GNU/Linux desktop experience.

Read more

More in Tux Machines

Android Leftovers

Security Leftovers, Mostly 'Spectre' and 'Meltdown' Related

  • More Meltdown/Spectre Variants
  • Spectre V2 & Meltdown Linux Fixes Might Get Disabled For Atom N270 & Other In-Order CPUs
    There's a suggestion/proposal to disable the Spectre Variant Two and Meltdown mitigation by default with the Linux kernel for in-order CPUs. If you have an old netbook still in use or the other once popular devices powered by the Intel Atom N270 or other in-order processors, there may be some reprieve when upgrading kernels in the future to get the Spectre/Meltdown mitigation disabled by default since these CPUs aren't vulnerable to attack but having the mitigation in place can be costly performance-wise.
  • Linux 4.17 Lands Initial Spectre V4 "Speculative Store Bypass" For POWER CPUs
    Following yesterday's public disclosure of Spectre Variant Four, a.k.a. Speculative Store Bypass, the Intel/AMD mitigation work immediately landed while overnight the POWER CPU patch landed.
  • New Variant Of Spectre And Meltdown CPU Flaw Found; Fix Affects Performance
  • Ubuntu 18.04 LTS Gets First Kernel Update with Patch for Spectre Variant 4 Flaw
    Canonical released the first kernel security update for its Ubuntu 18.04 LTS (Bionic Beaver) operating system to fix a security issue that affects this release of Ubuntu and its derivatives. As you can imagine, the kernel security update patches the Ubuntu 18.04 LTS (Bionic Beaver) operating system against the recently disclosed Speculative Store Buffer Bypass (SSBB) side-channel vulnerability, also known as Spectre Variant 4 or CVE-2018-3639, which could let a local attacker expose sensitive information in vulnerable systems.
  • RHEL and CentOS Linux 7 Receive Mitigations for Spectre Variant 4 Vulnerability
    As promised earlier this week, Red Hat released software mitigations for all of its affected products against the recently disclosed Spectre Variant 4 security vulnerability that also affects its derivatives, including CentOS Linux. On May 21, 2018, security researchers from Google Project Zero and Microsoft Security Response Center have publicly disclosed two new variants of the industry-wide issue known as Spectre, variants 3a and 4. The latter, Spectre Variant 4, is identified as CVE-2018-3639 and appears to have an important security impact on any Linux-based operating system, including all of its Red Hat's products and its derivatives, such as CentOS Linux.

LXQt 0.13 Desktop Environment Officially Released, It's Coming to Lubuntu 18.10

For starters, all of LXQt's components are now ready to be built against the recently released Qt 5.11 application framework, and out-of-source-builds are now mandatory. LXQt 0.13.0 also disabled the menu-cached functionality, making it optional from now on in both the panel and runner, thus preventing memory leaks and avoiding any issues that may occur when shutting down or restarting LXQt. Read more

GCC vs. LLVM Clang vs. AOCC Compilers On AMD Threadripper

Given recent improvements to AMD Zen (znver1) with LLVM, the new AMD AOCC 1.2 compiler release, and GCC 8.1 having premiered just weeks ago, here is a fresh look at the performance of six different C/C++ code compilers when testing the performance of the resulting binaries on an AMD Threadripper 1950X system. Read more