Language Selection

English French German Italian Portuguese Spanish

Gentoo Linux 2006.1 Unleashed

Filed under
Gentoo

ALBUQUERQUE, New Mexico., Aug. 30th -The Gentoo Release Engineering team proudly announces the release of Gentoo Linux 2006.1, the second release of the year. It builds on the strength of previous releases with several improvements. Featuring all of Gentoo's well-documented advantages in flexibility, performance and portability, this release is now available on all supported architectures. It is a compelling choice for people desiring a flexible, powerful community-based Linux distribution.

The 2006.1 release features many highlights that improve upon 2006.0. The AMD64, HPPA, x86, 32- and 64-bit PowerPC releases are built with and include GCC 4.1, a great improvement over version 3.4 used for 2006.0. Also included are the GNU C library version 2.4 and Gentoo's baselayout 1.12.1, with improved system startup scripts. Alpha, x86 and AMD64 also feature a new profile layout, with separate sub-profiles for desktop and server systems. This makes customization much easier as the profile defaults can be pre-tuned to the type of system being used.

The Gentoo Linux Installer for the x86 and AMD64 platforms now features a networkless install mode, with a more streamlined configuration interface making a typical installation quicker and easier than ever. It also includes new and improved partitioning code that can make better use of existing partition setups with unusual arrangements and improved error handling to minimize the chances of damaged partition tables.

For the Alpha platform, the InstallCD now features the option to use a serial console for installation with minimal effort, and the stages are once again unified into one set for LinuxThreads and NPTL systems. The compiler used has been upgraded to GCC version 3.4.6, and it includes an updated glibc, to allow the unified stages for LinuxThreads and NPTL.

The SPARC release includes several improvements over 2006.0, including InstallCD support for systems with more than 4GB of memory and an updated toolchain bringing fixes for various compilation problems. Also new is InstallCD and kernel support for the new UltraSPARC T1 processor used in the Sun T1000 and T2000 systems.

Gentoo Linux 2006.1 now brings official support for the dual-core G5 processor on the PPC platform, support for the serial console on Apple Xserve machines and improved support for installation from a FireWire disk. Official stages are built for 64- and 32-bit userlands on generic PPC64, POWER5 and PowerPC 970 (G5) platforms, and GRP packages are available for the latest KDE, Gnome and XFCE releases on all of the above configurations.

Gentoo is also offering experimental stages for SuperH, the embedded processor developed by Hitachi in the early 1990s and most notably found in the SEGA DreamCast and several models of HP PDA. The port presently supports, and was developed on, the LanTANK system, with support for more systems planned in the future.

About Gentoo Linux

Gentoo is committed to producing a high-quality open source
distribution, the latest release of which can always be found at
More information regarding
this release can be found on the Gentoo Release Engineering team's
project page.

You may obtain Gentoo Linux 2006.1 via our bouncer system
, or if you prefer, contribute
to the available bandwidth using our BitTorrent tracker
.

Press Contact:
Christel Dahlskjaer, pr@gentoo.org -- +44 8447790812

More in Tux Machines

Tidelift Backed by Former Red Hat Chairman and CEO Matthew Szulik

  • Open source startup Tidelift snags $15 mln Series A
    Boston-based Tidelift, an open source startup, has secured $15 million in Series A funding. General Catalyst, Foundry Group and former Red Hat Chairman and CEO Matthew Szulik led the round. In conjunction with the funding, Larry Bohn, managing director at General Catalyst, Ryan McIntyre, co-founder and managing director at Foundry Group and Szulik have all joined Tidelift’s board of directors.
  • Tidelift raises $15M to find paying gigs for open-source developers maintaining key projects
    Tidelift wants to give open-source developers a way to earn some money for contributing to important open-source projects and while helping the companies that are using those projects in key parts of their business, and it just raised $15 million to build those connections. General Catalyst, Foundry Group, and former Red Hat CEO Matthew Szulik co-led the Series A founding round into the Boston-based startup, the first time the 17-person company has taken financing, said Donald Fischer, co-founder and CEO of Tidelift. The other co-founders — Havoc Pennington, Jeremy Katz, and Luis Villa — share a wealth of open-source experience across companies like Red Hat and organizations like The Wikimedia Foundation and the Mozilla Foundation.
  • Tidelift Raises $15M Series A To Make Open Source Work Better--For Everyone

today's howto

Linux and CPU Security

  • 22 essential security commands for Linux
    There are many aspects to security on Linux systems – from setting up accounts to ensuring that legitimate users have no more privilege than they need to do their jobs. This is look at some of the most essential security commands for day-to-day work on Linux systems.
  • CVE-2018-3639: Spectre Variant 4 Vulnerability Affects the Linux Kernel
    A Spectre variant 4 vulnerability has been identified in the Linux kernel and represents a very dangerous threat to all affected machines. All system administrators are urged to apply the latest updates as soon as possible to mitigate any possible impact.
  • Spectre Number 4, STEP RIGHT UP!
    In the continuing saga of Meltdown and Spectre (tl;dr: G4/7400, G3 and likely earlier 60x PowerPCs don't seem vulnerable at all; G4/7450 and G5 are so far affected by Spectre while Meltdown has not been confirmed, but IBM documentation implies "big" POWER4 and up are vulnerable to both) is now Spectre variant 4. In this variant, the fundamental issue of getting the CPU to speculatively execute code it mistakenly predicts will be executed and observing the effects on cache timing is still present, but here the trick has to do with executing a downstream memory load operation speculatively before other store operations that the load does not depend on. If the CPU is convinced to speculatively execute down this victim path incorrectly, it will revert the stores and the register load when the mispredict is discovered, but the loaded address will remain in the L1 cache and be observable through means similar to those in other Spectre-type attacks.

Microsoft EEE and FUD Against FOSS and GNU/Linux (or GPL)