Language Selection

English French German Italian Portuguese Spanish

Linux Mint 20 Release Date & Features

Filed under
Linux

Well, that’s what this post is here to tell you. We will keep this roundup of Linux Mint 20 features and updates up-to-date as development happens until June, its expected release month.

What do we about Linux Mint 20 so far?

Read more

Also: Linux Mint 20 Doing Away With 32-Bit Support

Linux Mint 20 Codenamed “Ulyana,” Will Be Based on Ubuntu 20.04

  • Linux Mint 20 Codenamed “Ulyana,” Will Be Based on Ubuntu 20.04 LTS

    Announced earlier this year along with the LMDE 4 release, the Linux Mint 20 operating system will be released sometime this summer and will be based on the upcoming Ubuntu 20.04 LTS (Focal Fossa) operating system, due for release on April 23rd, 2020.

    The Linux Mint project continues the tradition of naming new Linux Mint releases alphabetically, and they revealed today in their monthly newsletter that Linux Mint 20 will be dubbed as “Ulyana.”

    Besides revealing the codename, the team also confirmed the fact that Linux Mint 20 will ship with the same three flavors we’re used until now, namely Cinnamon, MATE and Xfce, as well as the fact that it’ll be a 64-bit only release.

Linux Mint 20 Codename “Ulyana”! What’s News in Linux Mint 20?

  • Linux Mint 20 Codename “Ulyana”! What’s News in Linux Mint 20?

    Linux Mint 20: The team developers announced that the latest version of Linux Mint 20 going to be released a few months. Linux Mint 20 is officially code-named as “Ulyana“. Linux Mint 20 is developed based on the Ubuntu 20.04 LTS version. The team also said that the Linux Mint 20 will have many new software tweaks and hardware boost!

Linux Mint 20 is 64-bit only, based on Ubuntu 20.04

  • Linux Mint 20 is 64-bit only, based on Ubuntu 20.04, and named 'Ulyana'

    Linux Mint is great operating system. It is based on the excellent Ubuntu and features three great desktop environment options -- Cinnamon, MATE and Xfce. While it is a smart choice for Linux beginners, it is also good for experts too.

    Today, we learn some new details about the upcoming Linux Mint 20. While most of the newly revealed information is positive, there is one thing that is sure to upset many Linux Mint users.

More in the original post

  • Monthly News – March 2020

    Many thanks to all of you for your support and for your donations. LMDE 4 took longer than we anticipated but we managed to add many new features into it and significantly close the gap with the Ubuntu release. Now that it’s released we’re focusing on the new development cycle and the upcoming Ubuntu 20.04 package base.

    LMDE 3 EOL

    LMDE 3 will reach EOL (End-Of-Life) on July 1st 2020. Past that date the repositories will continue to work but the release will no longer receive bug fixes and security updates from Linux Mint.

    To upgrade LMDE 3 to LMDE 4 read “How to upgrade to LMDE 4“.

    Mint 20, codename Ulyana

    The codename for Linux Mint 20 is Ulyana.

    Linux Mint 20 will be based on Ubuntu 20.04 and feature 3 editions: Cinnamon, MATE and Xfce.

    Unlike previous releases, it will only be available in 64-bit.

Linux Mint 20 Ulyana ISOs will only be available in 64-bit

  • Linux Mint 20 Ulyana ISOs will only be available in 64-bit

    Clem Lefebvre, head of the Linux Mint project, has announced that Linux Mint 20 will carry the codename Ulyana and that 32-bit ISOs will be dropped. This will see some aging computers lose support. While the 32-bit ISO will be dropped, 32-bit packages, where necessary, will still be available to those with a 64-bit install.

    If you still need a 32-bit Linux Mint ISO, you’ll either have to stay with Linux Mint 19.3 until it loses support in 2023, or you can switch to the newly released LMDE 4 which will receive the latest Linux Mint software such as Cinnamon. The decision to drop 32-bit ISOs in Linux Mint 20 was first revealed last summer when Canonical decided to remove support from Ubuntu 19.10. As Linux Mint uses Ubuntu as a base, it makes sense for Linux Mint 20 to follow suit in dropping support.

The Next Linux Mint Version Will Be Called Ulyana

  • The Next Linux Mint Version Will Be Called Ulyana, Launch Only in 64-Bit

    But the biggest change, however, is the migration to 64-bit exclusively, as beginning with this new release, Linux Mint officially drops 32-bit versions.

    Going forward, Linux Mint will continue to be available in 64-bit only.

    The new Linux Mint 20 will be based on Ubuntu 20.04, the team also revealed, and will land in three different versions, namely Cinnamon, MATE, and Xfce.

    Additionally, there is also important news for those currently running the latest version. LMDE will officially reach the end of support in July, which means that after this date, devices not yet upgraded to version 4 will no longer receive updates – of course, these systems will continue to run normally, but the lack of security updates and bug fixes make them more prone to issues and cyberattacks.

Linux Mint 20 Codenamed Ulyana & More

  • Linux Mint 20 Codenamed Ulyana & More

    The news came on the last day of the month from Linux Mint. The new version of Linux Mint which is Linux Mint 20 will be called Ulyana. Linux Mint release post has not released anything other than the name. But a simple google search shows the word “Ulyana” comes from the Russian origin and it means Youthful. Linux Mint 20 “Ulyana” will be based on the upcoming Ubuntu release, 20.04 “Focal Fossa”. Focal Fossa is scheduled to be released on 23rd of this month.

Fossbytes coverage

  • Linux Mint 20 “Ulyana”: All New Features And Release Date

    Linux Mint is undoubtedly one of the best beginner-friendly and tough competitors of the most famous Ubuntu Linux. One of the reasons can be credited to its upstream codebase. Since Linux Mint is an Ubuntu-based distro, it uses the codebase of the latest Ubuntu long term support version.

    After ending 2019 with the release of Linux Mint 19.3, the Linux Mint team is ready to roll out its first version in 2020. As already revealed in their monthly blog, the upcoming Linux Mint 20 will be based on the next Ubuntu 20.4 LTS. So, in this article, I’m going to discuss everything about the new changes and release date of Mint 20.

Linux Mint 20: New features, Release date, and more

  • Linux Mint 20: New features, Release date, and more

    Unlike the previous releases, Linux Mint 20 will only be available for 64-bit machines. The current long-term support (LTS) release Linux Mint 19.3 ‘Tricia’ was released in December 2019.

    For the uninitiated, LTS releases get support for a more extended period than the short-term versions. Linux Mint follows Ubuntu’s footsteps when it comes to supporting the LTS editions that will get five years of support and are considered as enterprise-grade releases. Linux Mint 19 will continue getting support until 2023, and the Linux Mint 20 will be supported until 2025.

    Codename ‘Ulyana’

    Ever since the very first version of Linux Mint codenamed ‘Ada’ was released back in 2006, all new versions belonging to a new series (such as 18.x or 9.x) are given feminine code names that start with the next letter of the alphabet. Every name except ‘Sarah’ for Linux Mint 18 ends with the letter ‘a’, making the names sound pleasant to the ears.

    For instance, the last 4 LTS releases of Linux Mint 19 based on Ubuntu 18.04 have been named with nicknames starting with the letter ‘T’ – Tara, Tessa, Tina, and Tricia. Naturally, it follows that the next 4 LTS releases of Linux Mint 20 will have names that start with the letter ‘U’.

Linux Mint votes no on Snap packages, APT to block snapd...

  • Linux Mint votes no on Snap packages, APT to block snapd installs

    The Linux Mint distribution team put out another of their monthly updates, and this month was quite interesting.

    In the past the Linux Mint team had been quite vocal about Snaps, the next-generation Linux packaging system backed by Ubuntu maker Canonical. Like Flatpak, they're trying to redefine how Linux users install packages. The main issue here it seems, is that Snaps are more locked-down and it pushes Ubuntu directly.

    Mint's founder Clément Lefèbvre has said that with Linux Mint 20, they will push back firmly against Snaps. Currently in Ubuntu, which Mint builds off, Chromium is an empty package which installs a Snap (info) so the Mint team will ensure it tells you why and how to go and get Chromium yourself. Additionally, by default APT on Mint will not let snapd get installed but you will be able to do so manually.

    NVIDIA users rejoice! NVIDIA Optimus is to get better Mint support, with their included applet being able to show your GPU and select what card to use from the menu.

Snapping at Canonical's Snap

  • Snapping at Canonical's Snap: Linux Mint team says no to Ubuntu store 'backdoor'

    The developers of Linux Mint have expressed concern with Canonical's Snap Store and the way it is forced on Ubuntu users who try to install popular packages like the Chromium web browser.

    Linux Mint has editions based on either Ubuntu or Debian, so Canonical's decisions have a direct impact on the open-source operating system. Linux Mint 20, expected this month, is based on Ubuntu 20.04 LTS.

    The Snap store is an alternative to traditional deb packages for installing applications, and one which Canonical promotes as superior. The approach is different, using container technology, and you can find a full technical explanation here.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Security and Proprietary Issues

  • Surprise Capital One court decision spells trouble for incident response

    Break in case of emergency: Language is everything. Delineate clearly in all written comms between a ‘potential incident’ - and an actual one. Don’t start turning one of the hundreds of security events you see into a ‘security incident’ before the most essential facts are understood. Halpert’s threshold for incidents that need to be covered by legal privilege are: a) An incident that gives rise to an obligation to notify a regulator, or a contractual obligation to notify a business partner; or b) An incident that exposed trade secrets or otherwise would affect the share price of a company; or c) An incident that would cause significant reputational hit to the company; or d) An incident in which a crime is committed.

  • Judge rules Capital One must hand over Mandiant's forensic data breach report

    It’s a significant ruling that effectively affords the attorneys suing Capital One with a breakdown of which bank behaviors were successful, and which failed. It’s common for Fortune 500 companies to keep incident response firms like Mandiant on retainer, though it’s rare for those firms’ insights on high profile breaches to be made public. Similar rulings in the future could provide aggrieved customers with ammunition to seek higher pay-outs in court.

  • Retrotech: The Novell NetWare Experience

    In the simplest terms possible, NetWare was a dedicated network operating system. It was designed around fast and reliable network operations at the expense of almost everything else. Novell had invested massive amounts of research in figuring out how to do fast I/O and minimizing any delays from hardware related sources. The end result was a very lean system that remained stable and performant with a large number of clients attached. As networking was Novell's bread and butter, NetWare had excellent support for everything: clients were available for DOS, Windows, UNIX, Macintosh, OS/2 and probably other platforms I've never even heard of.

    The early history of NetWare is very muddled, and pre-2.0 versions have been lost to time. This compounded with poor documentation has made it very difficult to trace the early history of the product. However, while NetWare was not the first (or only) network product for IBM PCs, it quickly became the largest, displacing IBM's PC Network, and laughed at Microsoft's LAN Manager, and IBM OS/2 LAN Server.

    While NetWare did compete on UNIX, Sun had already gotten their foot in the door by porting NFS and making it the de-facto solution for all UNIXs of the era, as well as Linux. Meanwhile, Apple held onto AppleTalk which itself survived well into the early 2000s when NetWare had already disappeared into the aether. The explosion of Wintel PCs throughout the 90s had given NetWare a market position that should have been very difficult to dislodge.

    The full story of NetWare's fall from grace is a story for another time, but I do want to go into the more technical aspects that were both the boon and bane of NetWare. Much of NetWare's success can be attributed to its own IPX protocol which made networking plug and play and drastically lowered latencies compared to NetBIOS or even TCP/IP.

  • Polish malspam pushes ZLoader malware

    When enabling macros on the malicious Excel spreadsheet, the victim host retrieved the ZLoader DLL as shown in the previous section, saved the DLL to the victim's Documents folder, and ran it using rundll32.exe.

  • Microsoft Defender SmartScreen is hurting independent developers

    But what is SmartScreen?

    SmartScreen collects installation data from all Windows users in order to establish “reputation”. If the program does not have an established good reputation, you get this big warning message. By this time most users have deleted the .exe already thinking it is a malware, but SmartScreen can be bypassed by clicking on “More info” then “Run anyway”.

    The digital signature racket

    But let’s say you bite the bullet, you buy yourself an overpriced piece of prime numbers generated by a computer, sign your code and re-publish your application. You can now start getting users to install your app right? Wrong.

    But how do you build reputation? First of all, Microsoft needs to be able to gather information on who has published the app, and this is done by a code signing certificate. The most obvious implication is that unsigned apps will always trigger SmartScreen. The more insidious implication is that acquiring a code signing certificate is a big expense for an individual developer. There is currently no “Let’s Encrypt” equivalent to code signing certificates; so you have to purchase it from trusted authorities. The price range is wide but a certificate only valid for a year will typically go for about $100.

  • #Privacy: Michigan State University struck by ransomware attack

    It remains unclear as to how and when the attack happened, and what the ransom demand is.

    NetWalker is one of twelve ransomware gangs who threaten to publish data in revenge if organisations refuse to pay the ransom demand.

    MSU have not official disclosed the incident, however, an MSU spokesperson, Dan Olsen shared the following statement to EdScoop: “We are aware of a possible intrusion and we are actively looking into it.”

  • MSU: We won't pay [attacker] demanding ransom, threatening university over records

    University officials believe the latest breach occurred on Memorial Day and took relevant computer systems offline within hours of the intrusion, according to a news release. It compromised data associated with the Department of Physics and Astronomy, and information technology teams are coordinating with law enforcement to understand the scope of the breach. Investigators are notifying and providing support to affected MSU affiliates as they are identified.

    The cybersecurity breach, known as a ransomware attack, first became public May 27 when a [cr]acker-affiliated blog posted screenshots of files allegedly belonging to MSU affiliates. Images circulating on social media include a redacted passport and a list of transactions related to physics and astronomy projects. They also show a countdown clock that warns of “secret data publication” less than one week from when the screenshots were taken.

  • Michigan State target of ransomware attack threatening to release university data

    The ransom demanded was not specified, but the ransomware gang is prepared to release the university's documents.

    The NetWalker, a newer form of ransomeware sometimes labeled as Mailto, blog post threatened publication of 'secret' documents dated with a countdown clock with close to a week remaining.

  • Malware Team NetWalker Launches Ransomware Attack Against Weiz

    The Malware team NetWalker launched a new ransomware attack against the Austrian village of Weiz which affected the public service system and leaked a lot of the stolen data from building applications as we are about to read more in the following latest cryptocurrency news.

    According to the cybersecurity firm Panda Security, the Malware team managed to enter the town’s public network through phishing emails related to the Coronavirus pandemic. The subject of the emails which was ‘’information about the coronavirus’’ was used to bait the employees of the public infrastructure of the city into clicking on malicious links which triggered the ransomware.

    Panda Security claims that the ransomware attack belongs to a new version of a ransomware family that spreads by using VBScripts. If the infection is successful, it will spread through the entire windows network to which the infected machine is related. The report details that the ransomware terminates and services under Windows which encrypts files on all available disks thus eliminating the backups.

  • Inside a ransomware gang’s attack toolbox

    The crooks deployed a pirated copy of the Virtual Box virtual machine (VM) software to every computer on the victim’s network, plus a VM file containing a pirated copy of Windows XP, just to have a “walled garden” for their ransomware to sit inside while it did its cryptographic scrambling.

    But that’s far from everything that today’s crooks bring along for a typical attack, as SophosLabs was able to document recently when it stumbled upon a cache of tools belonging to a ransomware gang known as Netwalker.

  • Researchers Dive Into Evolution of Malicious Excel 4.0 Macros

    For more than five months, Lastline security researchers have tracked the evolution of malicious Excel 4.0 (XL4) macros, observing the fast pace at which malware authors change them to stay ahead of security tools.

    A central part of many organizations’ productivity tools, Excel opens the door for phishing attacks where victims are tricked into enabling macros in malicious documents, which can results in the attackers gaining a foothold on the network, in preparation for additional activities.

    During their five-month research, Lastline observed thousands of malicious samples, clustered into waves that provide a comprehensive picture of how the threat has evolved in both sophistication and evasiveness.

  • MSU won't pay ransom to [cr]acker who stole financial documents, personal information

    EdScoop reported the ransomware attack on May 27 and provided screenshots from a blog on the dark web, showing what appear to be a student's passport, MSU financial documents and files from the MSU network, as well as a countdown that had about one week remaining as of May 27.

  • Attackers Target 1M+ WordPress Sites To Harvest Database Credentials

    Attackers were spotted targeting over one million WordPress websites in a campaign over the weekend. The campaign unsuccessfully attempted to exploit old cross-site scripting (XSS) vulnerabilities in WordPress plugins and themes, with the goal of harvesting database credentials.

    The attacks were aiming to download wp-config.php, a file critical to all WordPress installations. The file is located in the root of WordPress file directories and contains websites’ database credentials and connection information, in addition to authentication unique keys and salts. By downloading the sites’ configuration files, an attacker would gain access to the site’s database, where site content and credentials are stored, said researchers with Wordfence who spotted the attack.

    Between May 29 and May 31, researchers observed (and were able to block) over 130 million attacks targeting 1.3 million sites.

  • Denial of service attacks against advocacy groups skyrocket

    Distributed denial-of-service attacks against advocacy organizations increased by 1,120% since a Minneapolis police officer killed George Floyd by kneeling on his neck, sparking demonstrations throughout the U.S.

    In figures published Tuesday, the internet security firm Cloudflare said it blocked more than 135 billion malicious web requests against advocacy sites, compared to less than 30 million blocked requests against U.S. government websites, such as police and military organizations. The company did not disclose which websites were affected, specifically.

Reading about open source in French

English speakers have so many wonderful open source resources that it's easy to forget that communications in English aren't accessible to everyone everywhere. Therefore, I've been looking for great open source resources in Spanish and French, so I can recommend them when the need arises. One I've been looking at recently is LinuxFr.org, which seems to be a fine "agora" for all sorts of interesting conversations in French about open source specifically and open everything else as well. Read more

Open Source Password Manager Bitwarden Introduces Two New Useful Features: Trash Bin & Vault Timeout

Bitwarden is unquestionably one of the best password managers available for Linux. It’s also a cross-platform solution — so you can use it almost anywhere you like. You can also read our review of Bitwarden if you want to explore more about it. Now, coming back to the news. Recently, Bitwarden introduced two new major features that makes it even better. Read more

6 Kubernetes Security Best Practices Every Linux Administrator Should Know

Kubernetes is a popular container orchestration platform used by many professionals around the world. It’s an open-source platform that enables you to manage containerization, providing you with feature-rich controls. However, Kubernetes is not easy to learn and maintain. To properly secure Kubernetes operations, you need to adopt certain best practices. Read more