DistroWatch Weekly |
| Tip Jar |
If you've enjoyed this week's issue of DistroWatch Weekly, please consider sending us a tip. (Tips this week: 0, value: US$0.00) |
|
|
|
 bc1qxes3k2wq3uqzr074tkwwjmwfe63z70gwzfu4lx  lnurl1dp68gurn8ghj7ampd3kx2ar0veekzar0wd5xjtnrdakj7tnhv4kxctttdehhwm30d3h82unvwqhhxarpw3jkc7tzw4ex6cfexyfua2nr  86fA3qPTeQtNb2k1vLwEQaAp3XxkvvvXt69gSG5LGunXXikK9koPWZaRQgfFPBPWhMgXjPjccy9LA9xRFchPWQAnPvxh5Le paypal.me/distrowatchweekly • patreon.com/distrowatch |
|
| Extended Lifecycle Support by TuxCare |
|
|
| Reader Comments • Jump to last comment |
1 • Linux Mint 22 (by penguinx86 on 2024-07-29 02:01:59 GMT from United States)
I installed Linux Mint 22 Xfce Edition. The install process went smoothly and everything works great! No problems detecting my wifi adapter.
2 • Linux Mint Upgrades (by Sam Crawford on 2024-07-29 04:16:38 GMT from United States)
This morning I upgraded two LM 21.3 machines to LM 22 and the upgrades went well with the only exception is that some of the Flatpak app configurations were lost and I had to set them up again when I opened the apps.
I also installed LM 22 from a USB drive to a laptop yesterday and everything went well.
Overall I'm pleased with the results.
3 • Automatic updates (by Guido on 2024-07-29 06:36:29 GMT from Philippines)
Does your home computer have automatic updates enabled? Yes, because I use Snaps, which receive automatic updates. This means I cannot influence the browser updates. It should be similar with Flatpaks. But neither is active at the kernel level.
4 • systemd feature "Automatic boot assessment" (by Mark Rijckenberg on 2024-07-29 06:56:48 GMT from Finland)
GNU/Linux distributions can protect themselves against Crowdstrike crashes by enabling the systemd feature "Automatic boot assessment". This feature is being enabled on NixOS unstable and will be available to "NixOS Unstable" users in the coming days.
See https://systemd.io/AUTOMATIC_BOOT_ASSESSMENT/
5 • Linux Mint 22 (by kc1di on 2024-07-29 11:06:48 GMT from United States)
Did a fresh install of Mint 22 and all works well on my t-450 machine. only problems were a couple of third party programs i use, which I install via ppa's did not work ppa's need updating so will have to wait until that happens. But Mint itself is running smooth and stable. Good release.
6 • Automatic Updates - No* & Mint (by Bernie on 2024-07-29 15:20:12 GMT from France)
No* ...and yes... I picked up the nasty habit of installing all recommended updates every time. Simply because I don't know every piece of software on my computer and would hate to be left unsecured by not updating. After-all, I'm an amateur user, not a full blown system admin. So No, not automatic, I used to wait a week, check the forums and manually authorize all the updates. Then I got lazy, still waited a week but didn't do any of the research. Finally, earlier this year, a kernel update for Mint 21 broke my system... a week or so after it was released. Turns out the problem was a well documented AMD Ryzen bug, my system recognized my hardware and yet still proposed the incompatible update. Now I'm back to my wait a week and see habit. When I brought that point up in a user chat, I was just told to "git gud". I'd also like to point out that earlier this year, I received a proposed update for Intel microcode... on that same AMD laptop.
Seconday point, when I first started with Mint (14? 17?) I don't remember ever having as many issues getting my hardware to work as with Mint 21. Sure I'm not running a business computer anymore but my hardware's easily 5 years old.
Mint's great, I learned a lot, but those unneeded updates are starting to make me look elsewhere for my next OS. Something with either better or minimal update support so I know what's expected of me but this in-between stuff really rubbing me the wrong way.
7 • Crowdstrike crashes (by lincoln on 2024-07-29 18:08:45 GMT from Brazil)
It's amazing how people and institutions are fooled by sellers of "firewalls", "antivirus systems", ..., "intrusion detection systems", relying on solutions that don't actually address the root cause of the problem: the bugs in critical software or the software engineering deficiencies that generate them. How can they assess its quality and security if the code is not available for auditing? How can they trust a notoriously bug-ridden operating system like Windows to serve as the basis for mission-critical services? Would they trust that a silver tape (CrowdStrike code) could turn a faulty airplane/ship/car into something safe for their family or society?
Even today, I have to listen to the common excuse that all software has bugs because it was created by human and is therefore potentially vulnerable. How can so-called security experts ignore the fact that formally/mathematically proven correct software is extremely secure? Many are even unaware of sel4 (https://sel4.systems/). And when confronted, they claim that the costs of formal software development lead them to choose software with bugs and weak legal contract protections. Is it really true that the cost of service interruptions and licenses for buggy software is lower than creating formally proven open source software in the first place? Or is this just another version of the maxim: create problems to sell solutions?
8 • CrowdStrike (by Canned Ham on 2024-07-29 18:10:11 GMT from United States)
We had an issue when we upgraded our RHEL 9 systems which run CrowdStrike from RHEL 9.3 to 9.4 and those systems failed to boot after restarting them. I ended up having run with an older kernel -- the at-the-time latest falcon-sensor was not compatible with the *newer* kernel in 9.4 -- or have an *older* version of falcon-sensor installed.
Fortunately this was caused by OS updates, which only affected a few servers at a time, and not an automatic update of the falcon-sensor code.
So, yes, CrowdStrike can bork linux boxes, too, because it has. Just on a much smaller scale.
9 • Reviews (by grindstone on 2024-07-29 19:03:58 GMT from United States)
Appreciate the mention of how many ports are open by default. Have often wished a similar comment was present for all reviews.
10 • Torrent Downloads Section Is Skimpy (by Bob Smith on 2024-07-29 19:59:21 GMT from Guam)
I wish the DistroWatch "Torrent Downloads" area included all the torrents from the distros they advertise... but sadly, the torrent downloads section is skimpy.
11 • Torrents (by Jesse on 2024-07-29 20:02:52 GMT from Canada)
@10: It would be nice if more distributions provided torrents, but most have switched away from torrent options in favour of CDNs these days.
12 • Software Engineering was: Crowdstrike crashes (by Bruce Fowler on 2024-07-29 22:35:45 GMT from United States)
@7 Follow the dollars, just like everything else today. Quality engineering costs money, and the beancounters would just rather take a chance. A good engineer is one who takes into consideration everything that could possibly go wrong.
13 • Software Engineering (by lincoln on 2024-07-29 23:30:08 GMT from Brazil)
@12 "Follow the dollars, just like everything else today." Unfortunately, I believe that this logic in the software world is summed up in the dilemma: what will generate more money, correct software or software with bugs that repeatedly requires new purchases or subscriptions?
14 • Auto Updates (by scuzzy on 2024-07-29 23:47:28 GMT from United States)
As far as auto updates go - you are an idiot if you have them enabled on live production servers.
I always test first, then if OK run backups on live, then install updates, then take backups again, and then make sure test & live are in sync.
15 • @12: (by dragonmouth on 2024-07-30 10:50:52 GMT from United States)
" A good engineer is one who takes into consideration everything that could possibly go wrong. " Judging from TV programs like "Engineering Disasters" and "Engineering Catastrophes", there aren't too many "good engineers". :-)
The ratio of users to software developers is 10,000 to 1, if not higher. 10,000 can discover problems with a program faster than 1 can fix them. NO software developer can foresee ALL the causes that may make a program fail. There are just too many variables, most of them external to the program and very localized (can only happen in one or two installations).
16 • Good engineers are rarely this good. (by Mark B on 2024-07-30 14:33:51 GMT from United Kingdom)
In a 2015 article from FastCompany.com it said this: "...how much work the software does is not what makes it remarkable. What makes it remarkable is how well the software works. This software never crashes. It never needs to be re-booted. This software is bug-free. It is perfect, as perfect as human beings have achieved. Consider these stats : the last three versions of the program — each 420,000 lines long-had just one error each. The last 11 versions of this software had a total of 17 errors. Commercial programs of equivalent complexity would have 5,000 errors."
It was referring to the software running the Space Shuttle.
It went on to say: "The group writes software this good because that's how good it has to be. Every time it fires up the shuttle, their software is controlling a $4 billion piece of equipment, the lives of a half-dozen astronauts, and the dreams of the nation. Even the smallest error in space can have enormous consequences: the orbiting space shuttle travels at 17,500 miles per hour; a bug that causes a timing problem of just two-thirds of a second puts the space shuttle three miles off course. Contrast this, for example, with something from a few years ago on Ubuntu's own website stating there were 135,000 outstanding bugs in the OS. Makes you think, doesn't it?
17 • Wayland (by Michael on 2024-07-30 16:12:26 GMT from Belgium)
Please think about introducing keyboard-layouts for Wayland. In Belgium we have AZERTY. I like to test Wayland
18 • Crowdstrike crashes (by Much Derper on 2024-07-30 19:49:00 GMT from United States)
The reason why so many people and institutions install various AV and similar software often has more to do with regulations like PCI DSS than with them being fooled into it. And while AV software is controversial in some circles (there are plenty good arguments that they actually increase attack surface of the system), the truth is that security is not just (or even less so) about features, but also (and even more so) about processes. If we're talking personal systems, where end user is also the administrator - the user that doesn't download random crap from Internet and always uses minimal privileges required may not need AV software, but even with all its flaws an AV monitor can really save a user that has no self-discipline on an exactly the same OS, be it Windows or Linux. Considering an organization cannot know with 100% certainty how disciplined each and every one of its employees are, it makes perfect sense they'd rather take the risk of AV software causing outage th!
an bet on its employees never making the mistake of opening a legit-looking infected attachment in an email. Hence the regulations like PCI DSS, that really are there because of the lowest common denominator of a corporate/government computer user.
19 • Crowdstrike crashes (by lincoln on 2024-07-30 22:43:13 GMT from Brazil)
@18: "Considering an organization cannot know with 100% certainty how disciplined each and every one of its employees are, it makes perfect sense they'd rather take the risk of AV software causing outage th! an bet on its employees never making the mistake of opening a legit-looking infected attachment in an email."
A bug-free and secure software stack is not compromised by an infected attachment in an email or random crap from the Internet. By denying access to those random malicious bits to the filesystem and sockets, providing a uid dedicated to process ID (ensuring that nothing is running under the uid, prohibiting kill(), ptrace(), fork()), setting the desired limits on memory allocation and other resource allocation, and the respective isolation of the resource (including processor timing channels and cache channels).
References:
Verified Protection Model of the seL4 Microkernel Experience Report: seL4 Formally Verifying a High-Performance Microkernel Refinement in the formal verification of the seL4 microkernel seL4 Enforces Integrity seL4: Formal Verification of an Operating-System Kernel seL4: from General Purpose to a Proof of Information Flow Enforcement From L3 to seL4 What Have We Learnt in 20 Years of L4 Microkernels? The Last Mile An Empirical Study of Timing Channels on seL4 The seL4 Microkernel An Introduction
20 • @6 : Automatic Updates - No* & Mint (by Kazlu on 2024-07-31 09:06:01 GMT from France)
I'm interested in your experience because I have similar concerns for my next OS. I am considering a change whenever I need it, meaning I will not change until it breaks or falls out of support. But I always keep an eye on what could suit me.
Regarding your broken Mint 21: has Timeshift be of any help to repair the system? Maybe switching to LMDE, and therefore a Debian base, could help being provided with more conservative updates while keeping the excellent Mint software layer?
21 • Crowdstrike crashes (by Much Derper on 2024-07-31 11:47:18 GMT from United States)
@19 that kernel is only a small part of the much larger picture. But even assuming everything is exactly as you say, migrating the whole IT infrastructure will take lots of time and lots of money, it will never happen overnight, especially onto a relatively young OS with barely any software running on it. It will be a lot more of these Crowdstrike-like events for the people paying the bills to agree to pay for that migration. It's never the question of security or reliability, it's always the question of costs. Perceived costs, not real-world ones.
22 • @20 (by Bernie on 2024-08-01 10:21:12 GMT from France)
I never use automated backups. Had several bad experiences years ago and found the software more complicated to configure than simply backing up 2 fold (1 flash drive & 1 cloud) + various externals.
I was able to boot by choosing the previous kernel at boot, easy enough but still an annoyance. And I’m glad it happened to me because I have both my parents Mint computers, they love them but would have been unable to apply that fix should it have affected them. I want to go on a rant but it essentially boils down to Mint being a great experience on business level computers on one hand and then my 5 yr old gaming Asia is only at best 90% functional with only 85% of that being consistent. (Unreliable to non existent Bluetooth for one).
23 • crowdstrike and linux (by ion on 2024-08-01 18:42:00 GMT from Moldova)
things like crowdstrike don't happen on linux cause LINUX HAS BETTER DESIGN since 2014 the solution is ebpf, a virtual machine in linux kernel, SENSITIVE APPS for which can be implemented (think about .net and java, but only for kernel) instead of designing kernel modules
There are security companies who implemented their security solutions as epbf apps, instead of kernel modules, so pretty much nobody cares about crowdstrike on linux, cause there are better solutions.
and epbf is fantastic cause it is maintained by google, facebook and other big companies, and is very safe, so even if you ebpf app is faulty, it will not bring down the kernel when it will crash.
24 • a nice article about ebpf and windows and linux (by ion on 2024-08-01 18:46:08 GMT from Moldova)
https://www.brendangregg.com/blog/2024-07-22/no-more-blue-fridays.html
25 • CrowdStrike (by De Schatberg on 2024-08-02 05:39:00 GMT from The Netherlands)
@23 (by ion from Moldova) "things like crowdstrike don't happen on linux cause LINUX HAS BETTER DESIGN"
With all due respect, people like you and a few others here who don't understand the CrowdStrike problem or the problems with Linux design should stay away from writing comments because they can only end up being ridiculous like yours.
It wasn't bad Windows design that caused the problem, it was a badly written system driver.
Address 0x0 is commonly used as a null pointer to indicate that there is no valid object. Programmers should always check for null pointers before accessing objects or their properties. The programmer didn't check for the null pointer.
Bad drivers can crash any system.
https://heise.cloudimg.io/width/610/q70.png-lossy-70.webp-lossy-70.foil1/_www-heise-de_/imgs/18/4/6/3/7/2/3/0/Unbenannt-495a939d1f257576.png
26 • CrowdStrike (by lincoln on 2024-08-02 20:07:15 GMT from Brazil)
@25 (by De Schatberg )
"With all due respect, people like you and a few others here who don't understand the CrowdStrike problem or the problems with Linux design should stay away from writing comments because they can only end up being ridiculous like yours."
The excerpt above could be an opinion on your own comment.
eBPF/BPF is a virtual machine in the Linux kernel, and its bytecode can be generated by the LLVM compiler from pseudo-C code. This bytecode program goes through a security verifier, ensuring:
"- The program does not crash or otherwise harm the system; - The program always runs to completion; - Programs may not use any uninitialized variables or access memory out of bounds; - Programs must fit within the size requirements of the system."
Therefore, it is evident that in this design, a catastrophic error from a bad drive accessing a null pointer could not crash the entire Linux system, since the eBPF verifier itself would prevent its execution.
References:
https://ebpf.io/what-is-ebpf/ https://www.kernel.org/doc/html/latest/bpf/index.html
27 • Automatic updates (by Andreas on 2024-08-02 20:08:00 GMT from Austria)
My Raspberry machine has unattended-upgrades (8) enabled, so that it automatically downloads and installs security updates, but it's set not to automatically reboot. My desktop and laptop are always manually updated first time after booting.
28 • CrowdStrike (by De Schatberg on 2024-08-02 21:58:00 GMT from The Netherlands)
@26 (by lincoln from Brazil) "Therefore, it is evident that in this design, a catastrophic error from a bad drive accessing a null pointer could not crash the entire Linux system..."
Obviously, you're missing the point. It is irrelevant whether the OS itself is affected when the critical application starts to fail. It is the application crash that matters.
If that system was that great, everyone would be using it, but companies still rely on dos, windows 3.1, and OS/2.
29 • CrowdStrike (by lincoln on 2024-08-02 22:27:06 GMT from Brazil)
@28 (by De Schatberg from The Netherlands)
"Obviously, you're missing the point."[2]
If only the CrowdStrike code had failed, there wouldn't have been the biggest disruption in history to essential services around the world. The big problem was that the Windows operating system was not resilient and did not continue to support essential services.
"If that system was that great, everyone would be using it, but companies still rely on dos, windows 3.1, and OS/2."
That must be why the last three operating systems are the most used on servers.
30 • @29 (by Noname on 2024-08-03 00:00:16 GMT from United States)
CrowdStrike was not just a Windows issue. It messes up with Linux kernel too. That's just a bad C++ programming. Those 3 ancient OSs are stil in use by German railways, American airlines, American post, etc.
Number of Comments: 30
Display mode: DWW Only • Comments Only • Both DWW and Comments
| | |
| TUXEDO |

TUXEDO Computers - Linux Hardware in a tailor made suite Choose from a wide range of laptops and PCs in various sizes and shapes at TUXEDOComputers.com. Every machine comes pre-installed and ready-to-run with Linux. Full 24 months of warranty and lifetime support included!
Learn more about our full service package and all benefits from buying at TUXEDO.
|
Archives |
| • Issue 1152 (2025-12-15): OpenBSD 7.8, filtering websites, Jolla working on a Linux phone, Germany saves money with Linux, Ubuntu to package AMD tools, Fedora demonstrates AI troubleshooting, Haiku packages Go language |
| • Issue 1151 (2025-12-08): FreeBSD 15.0, fun command line tricks, Canonical presents plans for Ubutnu 26.04, SparkyLinux updates CDE packages, Redox OS gets modesetting driver |
| • Issue 1150 (2025-12-01): Gnoppix 25_10, exploring if distributions matter, openSUSE updates tumbleweed's boot loader, Fedora plans better handling of broken packages, Plasma to become Wayland-only, FreeBSD publishes status report |
| • Issue 1149 (2025-11-24): MX Linux 25, why are video drivers special, systemd experiments with musl, Debian Libre Live publishes new media, Xubuntu reviews website hack |
| • Issue 1148 (2025-11-17): Zorin OS 18, deleting a file with an unusual name, NetBSD experiments with sandboxing, postmarketOS unifies its documentation, OpenBSD refines upgrades, Canonical offers 15 years of support for Ubuntu |
| • Issue 1147 (2025-11-10): Fedora 43, the size and stability of the Linux kernel, Debian introducing Rust to APT, Redox ports web engine, Kubuntu website off-line, Mint creates new troubleshooting tools, FreeBSD improves reproducible builds, Flatpak development resumes |
| • Issue 1146 (2025-11-03): StartOS 0.4.0, testing piped commands, Ubuntu Unity seeks help, Canonical offers Ubuntu credentials, Red Hat partners with NVIDIA, SUSE to bundle AI agent with SLE 16 |
| • Issue 1145 (2025-10-27): Linux Mint 7 "LMDE", advice for new Linux users, AlmaLinux to offer Btrfs, KDE launches Plasma 6.5, Fedora accepts contributions written by AI, Ubuntu 25.10 fails to install automatic updates |
| • Issue 1144 (2025-10-20): Kubuntu 25.10, creating and restoring encrypted backups, Fedora team debates AI, FSF plans free software for phones, ReactOS addresses newer drivers, Xubuntu reacts to website attack |
| • Issue 1143 (2025-10-13): openSUSE 16.0 Leap, safest source for new applications, Redox introduces performance improvements, TrueNAS Connect available for testing, Flatpaks do not work on Ubuntu 25.10, Kamarada plans to switch its base, Solus enters new epoch, Frugalware discontinued |
| • Issue 1142 (2025-10-06): Linux Kamarada 15.6, managing ZIP files with SQLite, F-Droid warns of impact of Android lockdown, Alpine moves ahead with merged /usr, Cinnamon gets a redesigned application menu |
| • Issue 1141 (2025-09-29): KDE Linux and GNOME OS, finding mobile flavours of Linux, Murena to offer phones with kill switches, Redox OS running on a smartphone, Artix drops GNOME |
| • Issue 1140 (2025-09-22): NetBSD 10.1, avoiding AI services, AlmaLinux enables CRB repository, Haiku improves disk access performance, Mageia addresses service outage, GNOME 49 released, Linux introduces multikernel support |
| • Issue 1139 (2025-09-15): EasyOS 7.0, Linux and central authority, FreeBSD running Plasma 6 on Wayland, GNOME restores X11 support temporarily, openSUSE dropping BCacheFS in new kernels |
| • Issue 1138 (2025-09-08): Shebang 25.8, LibreELEC 12.2.0, Debian GNU/Hurd 2025, the importance of software updates, AerynOS introduces package sets, postmarketOS encourages patching upstream, openSUSE extends Leap support, Debian refreshes Trixie media |
| • Issue 1137 (2025-09-01): Tribblix 0m37, malware scanners flagging Linux ISO files, KDE introduces first-run setup wizard, CalyxOS plans update prior to infrastructure overhaul, FreeBSD publishes status report |
| • Issue 1136 (2025-08-25): CalyxOS 6.8.20, distros for running containers, Arch Linux website under attack,illumos Cafe launched, CachyOS creates web dashboard for repositories |
| • Issue 1135 (2025-08-18): Debian 13, Proton, WINE, Wayland, and Wayback, Debian GNU/Hurd 2025, KDE gets advanced Liquid Glass, Haiku improves authentication tools |
| • Issue 1134 (2025-08-11): Rhino Linux 2025.3, thoughts on malware in the AUR, Fedora brings hammered websites back on-line, NetBSD reveals features for version 11, Ubuntu swaps some command line tools for 25.10, AlmaLinux improves NVIDIA support |
| • Issue 1133 (2025-08-04): Expirion Linux 6.0, running Plasma on Linux Mint, finding distros which support X11, Debian addresses 22 year old bug, FreeBSD discusses potential issues with pkgbase, CDE ported to OpenBSD, Btrfs corruption bug hitting Fedora users, more malware found in Arch User Repository |
| • Issue 1132 (2025-07-28): deepin 25, wars in the open source community, proposal to have Fedora enable Flathub repository, FreeBSD plans desktop install option, Wayback gets its first release |
| • Issue 1131 (2025-07-21): HeliumOS 10.0, settling on one distro, Mint plans new releases, Arch discovers malware in AUR, Plasma Bigscreen returns, Clear Linux discontinued |
| • Issue 1130 (2025-07-14): openSUSE MicroOS and RefreshOS, sharing aliases between computers, Bazzite makes Bazaar its default Flatpak store, Alpine plans Wayback release, Wayland and X11 benchmarked, Red Hat offers additional developer licenses, openSUSE seeks feedback from ARM users, Ubuntu 24.10 reaches the end of its life |
| • Issue 1129 (2025-07-07): GLF OS Omnislash, the worst Linux distro, Alpine introduces Wayback, Fedora drops plans to stop i686 support, AlmaLinux builds EPEL repository for older CPUs, Ubuntu dropping existing RISC-V device support, Rhino partners with UBports, PCLinuxOS recovering from website outage |
| • Issue 1128 (2025-06-30): AxOS 25.06, AlmaLinux OS 10.0, transferring Flaptak bundles to off-line computers, Ubuntu to boost Intel graphics performance, Fedora considers dropping i686 packages, SDesk switches from SELinux to AppArmor |
| • Issue 1127 (2025-06-23): LastOSLinux 2025-05-25, most unique Linux distro, Haiku stabilises, KDE publishes Plasma 6.4, Arch splits Plasma packages, Slackware infrastructure migrating |
| • Issue 1126 (2025-06-16): SDesk 2025.05.06, renewed interest in Ubuntu Touch, a BASIC device running NetBSD, Ubuntu dropping X11 GNOME session, GNOME increases dependency on systemd, Google holding back Pixel source code, Nitrux changing its desktop, EFF turns 35 |
| • Issue 1125 (2025-06-09): RHEL 10, distributions likely to survive a decade, Murena partners with more hardware makers, GNOME tests its own distro on real hardware, Redox ports GTK and X11, Mint provides fingerprint authentication |
| • Issue 1124 (2025-06-02): Picking up a Pico, tips for protecting privacy, Rhino tests Plasma desktop, Arch installer supports snapshots, new features from UBports, Ubuntu tests monthly snapshots |
| • Issue 1123 (2025-05-26): CRUX 3.8, preventing a laptop from sleeping, FreeBSD improves laptop support, Fedora confirms GNOME X11 session being dropped, HardenedBSD introduces Rust in userland build, KDE developing a virtual machine manager |
| • Issue 1122 (2025-05-19): GoboLinux 017.01, RHEL 10.0 and Debian 12 updates, openSUSE retires YaST, running X11 apps on Wayland |
| • Issue 1121 (2025-05-12): Bluefin 41, custom file manager actions, openSUSE joins End of 10 while dropping Deepin desktop, Fedora offers tips for building atomic distros, Ubuntu considers replacing sudo with sudo-rs |
| • Issue 1120 (2025-05-05): CachyOS 250330, what it means when a distro breaks, Kali updates repository key, Trinity receives an update, UBports tests directory encryption, Gentoo faces losing key infrastructure |
| • Issue 1119 (2025-04-28): Ubuntu MATE 25.04, what is missing from Linux, CachyOS ships OCCT, Debian enters soft freeze, Fedora discusses removing X11 session from GNOME, Murena plans business services, NetBSD on a Wii |
| • Issue 1118 (2025-04-21): Fedora 42, strange characters in Vim, Nitrux introduces new package tools, Fedora extends reproducibility efforts, PINE64 updates multiple devices running Debian |
| • Issue 1117 (2025-04-14): Shebang 25.0, EndeavourOS 2025.03.19, running applications from other distros on the desktop, Debian gets APT upgrade, Mint introduces OEM options for LMDE, postmarketOS packages GNOME 48 and COSMIC, Redox testing USB support |
| • Issue 1116 (2025-04-07): The Sense HAT, Android and mobile operating systems, FreeBSD improves on laptops, openSUSE publishes many new updates, Fedora appoints new Project Leader, UBports testing VoLTE |
| • Issue 1115 (2025-03-31): GrapheneOS 2025, the rise of portable package formats, MidnightBSD and openSUSE experiment with new package management features, Plank dock reborn, key infrastructure projects lose funding, postmarketOS to focus on reliability |
| • Issue 1114 (2025-03-24): Bazzite 41, checking which processes are writing to disk, Rocky unveils new Hardened branch, GNOME 48 released, generating images for the Raspberry Pi |
| • Issue 1113 (2025-03-17): MocaccinoOS 1.8.1, how to contribute to open source, Murena extends on-line installer, Garuda tests COSMIC edition, Ubuntu to replace coreutils with Rust alternatives, Chimera Linux drops RISC-V builds |
| • Issue 1112 (2025-03-10): Solus 4.7, distros which work with Secure Boot, UBports publishes bug fix, postmarketOS considers a new name, Debian running on Android |
| • Issue 1111 (2025-03-03): Orbitiny 0.01, the effect of Ubuntu Core Desktop, Gentoo offers disk images, elementary OS invites feature ideas, FreeBSD starts PinePhone Pro port, Mint warns of upcoming Firefox issue |
| • Issue 1110 (2025-02-24): iodeOS 6.0, learning to program, Arch retiring old repositories, openSUSE makes progress on reproducible builds, Fedora is getting more serious about open hardware, Tails changes its install instructions to offer better privacy, Murena's de-Googled tablet goes on sale |
| • Issue 1109 (2025-02-17): Rhino Linux 2025.1, MX Linux 23.5 with Xfce 4.20, replacing X.Org tools with Wayland tools, GhostBSD moving its base to FreeBSD -RELEASE, Redox stabilizes its ABI, UBports testing 24.04, Asahi changing its leadership, OBS in dispute with Fedora |
| • Issue 1108 (2025-02-10): Serpent OS 0.24.6, Aurora, sharing swap between distros, Peppermint tries Void base, GTK removinglegacy technologies, Red Hat plans more AI tools for Fedora, TrueNAS merges its editions |
| • Issue 1107 (2025-02-03): siduction 2024.1.0, timing tasks, Lomiri ported to postmarketOS, Alpine joins Open Collective, a new desktop for Linux called Orbitiny |
| • Issue 1106 (2025-01-27): Adelie Linux 1.0 Beta 6, Pop!_OS 24.04 Alpha 5, detecting whether a process is inside a virtual machine, drawing graphics to NetBSD terminal, Nix ported to FreeBSD, GhostBSD hosting desktop conference |
| • Issue 1105 (2025-01-20): CentOS 10 Stream, old Flatpak bundles in software centres, Haiku ports Iceweasel, Oracle shows off debugging tools, rsync vulnerability patched |
| • Issue 1104 (2025-01-13): DAT Linux 2.0, Silly things to do with a minimal computer, Budgie prepares Wayland only releases, SteamOS coming to third-party devices, Murena upgrades its base |
| • Issue 1103 (2025-01-06): elementary OS 8.0, filtering ads with Pi-hole, Debian testing its installer, Pop!_OS faces delays, Ubuntu Studio upgrades not working, Absolute discontinued |
| • Issue 1102 (2024-12-23): Best distros of 2024, changing a process name, Fedora to expand Btrfs support and releases Asahi Remix 41, openSUSE patches out security sandbox and donations from Bottles while ending support for Leap 15.5 |
| • Issue 1101 (2024-12-16): GhostBSD 24.10.1, sending attachments from the command line, openSUSE shows off GPU assignment tool, UBports publishes security update, Murena launches its first tablet, Xfce 4.20 released |
| • Full list of all issues |
| Star Labs |

Star Labs - Laptops built for Linux.
View our range including the highly anticipated StarFighter. Available with coreboot open-source firmware and a choice of Ubuntu, elementary, Manjaro and more. Visit Star Labs for information, to buy and get support.
|
| Random Distribution | 
Tails
The Amnesic Incognito Live System (Tails) is a Debian-based live DVD/USB with the goal of providing complete Internet anonymity for the user. The product ships with several Internet applications, including web browser, IRC client, mail client and instant messenger, all pre-configured with security in mind and with all traffic anonymised. To achieve this, Incognito uses the Tor network to make Internet traffic very hard to trace.
Status: Active
|
| TUXEDO |

TUXEDO Computers - Linux Hardware in a tailor made suite Choose from a wide range of laptops and PCs in various sizes and shapes at TUXEDOComputers.com. Every machine comes pre-installed and ready-to-run with Linux. Full 24 months of warranty and lifetime support included!
Learn more about our full service package and all benefits from buying at TUXEDO.
|
| Star Labs |

Star Labs - Laptops built for Linux.
View our range including the highly anticipated StarFighter. Available with coreboot open-source firmware and a choice of Ubuntu, elementary, Manjaro and more. Visit Star Labs for information, to buy and get support.
|
|