Language Selection

English French German Italian Portuguese Spanish

Surviving a GNOME Update in SuSE 10

Filed under
SUSE
HowTos

Part I - Living it

Bottom line #1: Don't make a System Update blindly.
Bottom line #2: Don't make non-security updates "just because you can".

With a supplementary GNOME repository added (see this one) and all my usual repositories "on" (see this article), I proceeded to a "System Update" (from YaST).

Bad idea. Really.

What happened after upgrading from GNOME 2.12.0 to GNOME 2.12.2?
(I also got nice icons from Tango, but that was a good one!)

Full Story.

More in Tux Machines

Mozilla: Openwashing, Things Gateway, and San Francisco All Hands Meeting

Red Hat News and More on the Negative Results

Android Leftovers

Canonical Releases AMD Microcode Updates for All Ubuntu Users to Fix Spectre V2

The Spectre microprocessor side-channel vulnerabilities were publicly disclosed earlier this year and discovered to affect billions of devices made in the past two decades. Unearthed by Jann Horn of Google Project Zero, the second variant (CVE-2017-5715) of the Spectre vulnerability is described as a branch target injection attack. The security vulnerability affects all microprocessors that use branch prediction and speculative execution function, and it can allow unauthorized memory reads via side-channel attacks if the system isn't patched. For example, a local attacker could use it to expose sensitive information, including kernel memory. Read more