Language Selection

English French German Italian Portuguese Spanish

Suse 10.1 RC 1 Report

Filed under
Reviews
SUSE
-s

The beta cycle is history! I'm still sweeping up confetti here. OpenSUSE announced the availability of 10.1 release candidate 1 early this morning. I've actually been downloading the deltas lately and even though they come in fairly slow, it is much nicer downloading 300 mbs rather than 3 gigs. I highly recommend that method. I am in the process of downloading the full x86_64 version as well. It's coming in at a snails pace too, but hopefully I will be able to report on it before rc2 comes out. But back to the topic at hand. How did the release candidate do? Will this phase go as planned or will final have to be delayed? Here is my report.

Release Candidate phase implies feature and usually version freezes. As you can see from the small chart below, most applications received a teny number version upgrade, indicating an in-house bug fix or such. Those numbers actually indicate the number of builds, usually. So, if only one number difference, then only one build since the last build. With only 300mb difference in the iso package, we didn't really expect too many big changes.



10.1 beta9     10.1 rc1
Xorg 6.9.0-31 6.9.0-35
kdebase 3.5.1-49 3.5.1-54
gnome 2.12.2-17 2.12.2-18
gcc 4.1.0-10 4.1.0-16
firefox 1.5.0.1-19 1.5.0.1-22
OOo 2.0.2-12 2.0.2-15
kernel 2.6.16-8 2.6.16-20
gimp 2.2.10-16 2.2.10-17
gaim 1.5.0-44 1.5.0-45





In the changelog we find lots and lots of bug fixes and just a few new features. Some highlights include:

  • MozillaFirefox
    • added (optional) plastikfox theme
    • get some more security related patches
    • finally fixed the default proxy configuration by adding a new
      UI option
  • gnome-volume-manager
    • Add gnome-volume-properties back to the Control Center
  • wine
    • upstream 0.9.11
    • Fake dll files created in the system directory to help installers
    • Desktop mode now properly supports multiple processes
    • Several OpenGL fixes
    • Improved ESD audio driver
    • Direct3D 8 and 9 now use the same code
    • More Web browser support
    • Lots of bug fixes
  • banshee
    • Don't show error dialog if there were no errors burning the CD
    • Improved initial import dialog and mimetype detection for importing
    • Check to see if files exist before burning
    • Ensure any files Banshee has open on an iPod are closed before ejecting through HAL
    • Do not try to play audio through Helix that it cannot support
    • Only show the actual track that is playing in the view
  • gdm
    • Update .ICEauthority fixup patch, corrects serious security bug
  • kaffeine
    • Improve gstreamer 0.10 by getting visualization to work
  • kpowersave
    • rereleased official stable version 0.6
      • fixed detailed dialog for machines without CPUFreq support and more than one CPU/Core and/or throttling
      • added fix to be able to fake CPU info
      • fixed compiler warnings
  • kdebase3
    • Fix misplaced %endif
    • update medium->full hinting on a 10.1 update
    • fix possible Konsole crash on session saving/logout
    • fix panel configuration to not always ask to save
    • update media_hal.diff to make it possible that applications like k3b can stop automounting
    • fix wallpaper upgrade bug
  • beagle
    • Add a patch to add indicies to the sqlite database
    • Use cron.daily for running beagle-crawl-system
  • compiz
    • Changed default key-binding for scale plugin to F11
    • Fix darkenBack option in scale plugin
    • Don't start scale effect when some other plugin is running
    • Add flip_move option for only using edge flipping when moving windows
    • Support for screen edge flipping and hot corners
  • kdenetwork3
    • Fix serious bug where Idle status was set instead of Busy
  • xorg-x11
    • Do not use killall within the xdm scripts to avoid to kill xvkbd
      of other running sessions maybe local or remote
    • Avoid error message of not existent device tty0
  • Lots and lots of many many yast fixes
  • Full Changelog Since Beta 9



Some of the outstanding bugs they are still currently working on are:

  • Large scale testing showed a couple of issues especially with update of systems. I would advise everybody to be carefull in updating a system - and not update a production system (see below).
  • The bootloader shows "SUSE Linux 10.1 10.1"
  • Installation of packages from the installation source with rug/zen-installer fails in the installed system. We have put fixed packages (zen-updater, rug, libzypp-zmd-backend) for this on the ftp server, download them from here .
  • Updating from a previous beta tries to delete far too many packages. You should see conflicts for this in the installation proposal.
  • Every update adds another selection to the system
  • Installationsources are not available in the system
  • The YaST2 Xen module is not able to setup a VM.



The install of Suse 10.1 release candidate 1 went really well for me. Most the install would be a rehash if described in full again. It was almost "textbook" except for one little niggle. The downloading of Release Notes worked this time and then the next question concerns Online Updates. We are asked if we'd prefer to configure it now (recommended) or later, with check boxes for sending hardware and "other information" back. I click to configure now and it took quite a while. The clock cursor never did stop turning and switching to a console I could top and see that things were still happening. But this step took a really long time. Then after it reported there was a patch available and installed it (without error), it took another long time to finish whatever it was doing under the gui. But it did finish. That's the main thing.

After install, I didn't see any new eye candy or identify any new applications. The menus were still chocked full o' apps for almost every imaginable task and all but two opened and worked without issue. The two that did give me trouble were Kdetv and Zapping. Zapping froze up and crashed out and kdetv just wouldn't work properly. Maybe it's just me. I never have any luck with those apps anyway. But good ole xawtv performed as always - just almost perfectly.

        

There are all kinds of music programs ranging from merely playing to capture and edit. There wasn't enough screen space here to show all of them. In that same spirit are all the other categories. There are just too many office and internet apps, games, and development tools to list or screenshoot.

        

        

Gnome was working rather well this evening. Seems KDE will stay version 3.5.1 and gnome will stay 2.12 for 10.1. XGL Desktop was removed from the Gnome Control Center this time, as I speculate it won't be perfected in time for final release. I did test the display configuration in the GCC to set up xinerama, both cloned and expanded. That worked wonderfully.

        

The developers have been working so hard this release to rewrite the software package management suite. They've had a hard time of it. But I believe their efforts are beginning to pay off. The installation source manager worked wonderfully. I tested the package manager this time and had no problems. It installed and uninstalled without issue. The online update did as one might expect as well. It connected to some preset mirror(s) and downloaded the patch information. I selected a patch to install and it preceded to download and install it. I did experience trouble with the system update still as it reported an error stating that my os version number didn't match my install sources and then the summary screen reported conflicts it could not resolve (even though I had chosen no packages to install). But they are definitely getting there.

        

So, there ya have it. This is a definite release candidate. It's been a long beta cycle, but things are really shaping up quite nicely at this point. Everything was stable and almost everything was working fairly well. I think the look and feel are pretty much in place and we can expect to see very little change from here on out. Release candidate 2 is planned for next week and hopefully they will announce the final on or about the 25th.


More Screenshots Here.

Howto Apply Delta Isos:

This is really so easy that I hesitate to even mention it, but just in case someone needs to know, here's a handy copy and paste for this release:

  1. Have your last version isos available.
  2. Download the difference iso (delta iso).
  3. Open a terminal
  4. Apply the applydeltaiso command.
    • applydeltaiso SUSE-Linux-10.1-beta9-i386-CD1.iso SUSE-Linux-10.1-beta9_RC1-i386-CD1.delta.iso SUSE-Linux-10.1-RC1-i386-CD1.iso
    • applydeltaiso SUSE-Linux-10.1-beta9-i386-CD2.iso SUSE-Linux-10.1-beta9_RC1-i386-CD2.delta.iso SUSE-Linux-10.1-RC1-i386-CD2.iso
    • applydeltaiso SUSE-Linux-10.1-beta9-i386-CD3.iso SUSE-Linux-10.1-beta9_RC1-i386-CD3.delta.iso SUSE-Linux-10.1-RC1-i386-CD3.iso
    • applydeltaiso SUSE-Linux-10.1-beta9-i386-CD4.iso SUSE-Linux-10.1-beta9_RC1-i386-CD4.delta.iso SUSE-Linux-10.1-RC1-i386-CD4.iso
    • applydeltaiso SUSE-Linux-10.1-beta9-i386-CD5.iso SUSE-Linux-10.1-beta9_RC1-i386-CD5.delta.iso SUSE-Linux-10.1-RC1-i386-CD5.iso

More in Tux Machines

Leftovers: OSS

Security Leftovers

  • Security updates for Thursday
  • OpenSSL patches two high-severity flaws
    OpenSSL has released versions 1.0.2h and 1.0.1t of its open source cryptographic library, fixing multiple security vulnerabilities that can lead to traffic being decrypted, denial-of-service attacks, and arbitrary code execution. One of the high-severity vulnerabilities is actually a hybrid of two low-risk bugs and can cause OpenSSL to crash.
  • Linux Foundation Advances Security Efforts via Badging Program
    The Linux Foundation Core Infrastructure Initiative's badging program matures, as the first projects to achieve security badges are announced.
  • Linux Foundation tackles open source security with new badge program
  • WordPress Plugin ‘Ninja Forms’ Security Vulnerability
    FOSS Force has just learned from Wordfence, a security company that focuses on the open source WordPress content management platform, that a popular plugin used by over 500,000 sites, Ninja Forms, contains serious security vulnerabilities.
  • Preparing Your Network for the IoT Revolution
    While there is no denying that IP-based connectivity continues to become more and more pervasive, this is not a fundamentally new thing. What is new is the target audience is changing and connectivity is becoming much more personal. It’s no longer limited to high end technology consumers (watches and drones) but rather, it is showing up in nearly everything from children’s toys to kitchen appliances (yes again) and media devices. The purchasers of these new technology-enabled products are far from security experts, or even security aware. Their primary purchasing requirements are ease of use.
  • regarding embargoes
    Yesterday I jumped the gun committing some patches to LibreSSL. We receive advance copies of the advisory and patches so that when the new OpenSSL ships, we’re ready to ship as well. Between the time we receive advance notice and the public release, we’re supposed to keep this information confidential. This is the embargo. During the embargo time we get patches lined up and a source tree for each cvs branch in a precommit state. Then we wait with our fingers on the trigger. What happened yesterday was I woke up to a couple OpenBSD developers talking about the EBCDIC CVE. Oh, it’s public already? Check the OpenSSL git repo and sure enough, there are a bunch of commits for embargoed issues. Pull the trigger! Pull the trigger! Launch the missiles! Alas, we didn’t look closely enough at the exact issues fixed and had missed the fact that only low severity issues had been made public. The high severity issues were still secret. We were too hasty.
  • Medical Equipment Crashes During Heart Procedure Because of Antivirus Scan [Ed: Windows]
    A critical medical equipment crashed during a heart procedure due to a timely scan triggered by the antivirus software installed on the PC to which the said device was sending data for logging and monitoring.
  • Hotel sector faces cybercrime surge as data breaches start to bite
    Since 2014, things have become a lot more serious with a cross section of mostly US hotels suffering major breaches during Point-of-Sale (POS) terminals. Panda Security lists a string of attacks on big brands including on Trump Hotels, Hilton Worldwide, Hyatt, Starwood, Rosen Hotels & Resorts as well two separate attacks on hotel management outfit White Lodging and another on non-US hotel Mandarin Oriental.

Android Leftovers

today's howtos