1 |
--------------------------------------------------------------------------- |
2 |
Gentoo Weekly Newsletter |
3 |
http://www.gentoo.org/news/en/gwn/current.xml |
4 |
This is the Gentoo Weekly Newsletter for the week of 25 April 2005. |
5 |
--------------------------------------------------------------------------- |
6 |
|
7 |
============== |
8 |
1. Gentoo News |
9 |
============== |
10 |
|
11 |
Project Dolphin: Experimental rescue CD |
12 |
--------------------------------------- |
13 |
|
14 |
Benjamin Judas[1] announced last Friday that the release-engineering team |
15 |
has created a new experimental subproject called "Project Dolphin" in |
16 |
order to provide a feature-enhanced LiveCD version targeted at system |
17 |
rescue. Much like the unofficial French SysRescueCD[2] that is also based |
18 |
on the Gentoo LiveCD, Project Dolphin aims at offering all the tools |
19 |
needed for the recovery of broken installations, failing harddisks or |
20 |
other systems in need of rescue. |
21 |
|
22 |
1. beejay@g.o |
23 |
2. http://www.sysresccd.org/ |
24 |
|
25 |
Figure 1.1: Project Dolphin - LiveCD for rescue missions |
26 |
http://www.gentoo.org/images/gwn/20050425_pd.png |
27 |
|
28 |
Highlights of the CD include zsh, samba, bacula, mc, dar, mutt, xfsdump, |
29 |
ide-smart, netcat, nmap, chrootkit, partimage, ncftp, centericq, |
30 |
bind-tools, alsa-utils, mpg321. A very early test ISO image, actively |
31 |
soliciting testers, has been made available in the experimental section of |
32 |
the Gentoo mirrors[3] for download, in the /experimental/x86/livecd/x86 |
33 |
path. Users are strongly encouraged to submit comments to a freshly |
34 |
introduced meta-bug[4], either to report problems or to request feature |
35 |
additions. Thanks a lot for your support! |
36 |
|
37 |
3. http://www.gentoo.org/main/en/mirrors.xml |
38 |
4. http://bugs.gentoo.org/show_bug.cgi?id=90053 |
39 |
|
40 |
International Gentoo mailing list additions |
41 |
------------------------------------------- |
42 |
|
43 |
Two new mailing lists have been made available last week: The Dutch |
44 |
version of the Gentoo Weekly Newsletter is now distributed in plain text |
45 |
version via e-mail, at gentoo-gwn-nl@g.o, shortly after being |
46 |
translated from the English original. As all other newsletter lists, it is |
47 |
for distribution only. Dutch and Flemish speaking readers of the GWN can |
48 |
subscribe to the new list by sending an e-mail to |
49 |
gentoo-gwn-nl-subscribe@g.o and following the instructions in the |
50 |
confirmation message they'll receive. |
51 |
|
52 |
A regular support and discussion list has been set up for all Russian |
53 |
Gentoo users, as Konstantin V. Arkhipov[5] announced last week. |
54 |
gentoo-user-ru@g.o can be subscribed by sending a blank message to |
55 |
gentoo-user-ru-subscribe@g.o. A full list of official Gentoo |
56 |
mailing lists, both English and non-English ones, is available along with |
57 |
usage instructions at the mailing list page[6]. |
58 |
|
59 |
5. voxus@g.o |
60 |
6. http://www.gentoo.org/main/en/lists.xml |
61 |
|
62 |
======================== |
63 |
2. Developer of the week |
64 |
======================== |
65 |
|
66 |
"Gentoo is Zen applied to software" -- Patrick Lauer (bonsaikitten) |
67 |
------------------------------------------------------------------- |
68 |
|
69 |
Figure 2.1: Patrick Lauer aka Bonsaikitten |
70 |
http://www.gentoo.org/images/gwn/20050425_bonsaikitten.jpg |
71 |
|
72 |
This week's featured developer is bonsaikitten[7], who goes by the name |
73 |
Patrick Lauer in real life. He has no allegiance pledged to any particular |
74 |
faction of Gentoo devhood, but likes to work on a bit of everything. Since |
75 |
late 2004 he is also a regular contributor to the GWN, in particular the |
76 |
gentoo-dev mailing list summaries and this column, the dev-of-the-week, |
77 |
are usually authored by him. |
78 |
|
79 |
7. patrick@g.o |
80 |
|
81 |
Patrick operates the gentooexperimental.org[8] server, offering ressources |
82 |
for weird and unfinished ideas, including (but not limited to) tinderbox, |
83 |
the script repository[9] and future (web-)rsync replacement candidates. |
84 |
Planet Gentoo was first hosted on Patrick's server before being moved onto |
85 |
official hardware managed by the Gentoo infrastructure team. |
86 |
|
87 |
8. http://gentooexperimental.org |
88 |
9. |
89 |
|
90 |
During the day he's a student of Computer Science at the RWTH Aachen, |
91 |
Germany, where he has started writing his thesis on "anonymous networks", |
92 |
leaving precious little time for everything else, but after four and a |
93 |
half years at the university he feels ready to move on. His computing |
94 |
environment is a room full of crummy old hardware, a Quad Xeon, two |
95 |
Athlons, and (courtesy of the CS faculty of his university) a 16-CPU |
96 |
cluster. |
97 |
|
98 |
He is a user of blackbox, firefox, licq, sometimes konqueror, and -- due |
99 |
to vendor lock-in -- evolution, which seems to get less useful with every |
100 |
revision, "as do all gnomes and trolls," says Patrick. He likes to work in |
101 |
Python, but other languages are no problem, either - "unless they are |
102 |
called Java and need longish incantations for every single statement." |
103 |
When the weather permits he can be found mountainbiking in the woods and |
104 |
fields around Aachen. He also enjoys good food, good (Belgian) beer, and |
105 |
the presence of preferably highly intelligent and sexy women (although the |
106 |
latter does not happen as often as desired). His motto is borrowed from |
107 |
Alfred Lord Tennyson: "It is better to have loved and lost than never to |
108 |
have loved at all." |
109 |
|
110 |
========================= |
111 |
3. Heard in the community |
112 |
========================= |
113 |
|
114 |
gentoo-dev |
115 |
---------- |
116 |
|
117 |
Some new xorg ebuilds |
118 |
|
119 |
For all those that desparately need the newest and most bleeding edge |
120 |
stuff, Donnie Berkholz[10] has put some new xorg ebuilds in portage. Bug |
121 |
reports are appreciated. Especially the 6.8.99.* snapshots might be |
122 |
interesting to try out - but be warned, it might break ... |
123 |
|
124 |
10. spyderous@g.o |
125 |
|
126 |
* new xorg ebuilds [11] |
127 |
11. http://thread.gmane.org/gmane.linux.gentoo.devel/27145 |
128 |
|
129 |
|
130 |
Category rename |
131 |
|
132 |
Since there are many proxies (but not all of them www only), the www-proxy |
133 |
category might be renamed to net-proxy. All the SOCKS, www, ftp etc. |
134 |
proxies will then be easy to find in their new category. |
135 |
|
136 |
* Category rename [12] |
137 |
12. http://thread.gmane.org/gmane.linux.gentoo.devel/27153 |
138 |
|
139 |
|
140 |
Gentoo as a development platform |
141 |
|
142 |
Daniel Drake[13] starts a discussion on how to use Gentoo as a development |
143 |
platform where you usually have to pull in various fixes from CVS. How do |
144 |
you keep everything under portage's control while still being able to fix |
145 |
things? Does portage support live CVS ebuilds in a sane fashion? Read on |
146 |
to find out more. |
147 |
|
148 |
13. dsd@g.o |
149 |
|
150 |
* Gentoo as development platform [14] |
151 |
14. http://thread.gmane.org/gmane.linux.gentoo.devel/27088 |
152 |
|
153 |
|
154 |
Apache problems |
155 |
|
156 |
As some of you might have noticed, the Gentoo Apache team has done some |
157 |
quite extensive changes to the newest versions of Apache. This was done |
158 |
for various reasons, including (but not limited to) easier maintenance. |
159 |
This has caused various problems since there is no easy migration path, |
160 |
and most users don't want to throw away their apache config and start from |
161 |
scratch. Because of this the newest versions are package.mask'ed until |
162 |
this situation is resolved. |
163 |
|
164 |
* package.mask'ing the new apache ebuilds [15] |
165 |
* new apache stuff in testing[16] |
166 |
15. http://thread.gmane.org/gmane.linux.gentoo.devel/27071 |
167 |
16. http://thread.gmane.org/gmane.linux.gentoo.devel/27208 |
168 |
|
169 |
|
170 |
======================= |
171 |
4. Gentoo International |
172 |
======================= |
173 |
|
174 |
Switzerland: Pentoo - Gentoo-based intrusion detection LiveCD |
175 |
------------------------------------------------------------- |
176 |
|
177 |
"Pentoo"[17] is an acronym for "PENetration on genTOO". It is based on |
178 |
kernel version 2.6.10, uses the Gnome desktop environment, and aims to |
179 |
provide a complete platform for intrusion detection, penetration-testing |
180 |
and security assessment. The content of the LiveCD can be updated, |
181 |
allowing for up-to-date fingerprint and vulnerability databases, for tools |
182 |
that require regular updates like the Nessus plugins, or scanner |
183 |
fingerprint files, metasploit etc. Users can optionaly store data on USB |
184 |
sticks for non-volatile storage support. Pentoo's author, Michael |
185 |
Zanetta[18], emphasizes that "it has to be considered beta as I have not |
186 |
much time to test it carefully," so feedback and comments are very |
187 |
welcome, at bugs@××××××.ch. A roadmap for the project[19] is available, |
188 |
too. |
189 |
|
190 |
17. http://www.netsc.ch/pentoo/ |
191 |
18. grimmlin@××××××.ch |
192 |
19. http://www.netsc.ch/pentoo/project.txt |
193 |
|
194 |
Figure 4.1: Penetration testing based on Gentoo: Swiss 'Pentoo' |
195 |
http://www.gentoo.org/images/gwn/20050425_pentoo.png |
196 |
|
197 |
====================== |
198 |
5. Gentoo in the press |
199 |
====================== |
200 |
|
201 |
Somos libres (25 April 2005, in Spanish) |
202 |
---------------------------------------- |
203 |
|
204 |
Today's edition of the Peruvian "Free and Open Software User Group" |
205 |
website at Somos Libres has an interview with Daniel Oliveira,[20] one of |
206 |
the heads of the Gentoo spin-off project Ututo[21] developed at and around |
207 |
the university of Buenos Aires in neighboring Argentina. Oliveira, who |
208 |
represents a core team of 37 developers busy pushing Ututo to individual |
209 |
users, but also into municipal services and small and medium enterprises |
210 |
in Argentina, explains the history and the current status of the project. |
211 |
|
212 |
20. http://somoslibres.org/modules.php?name=News&file=article&sid=518 |
213 |
21. https://e.ututo.org.ar/indexes.html |
214 |
|
215 |
=========================== |
216 |
6. Moves, adds, and changes |
217 |
=========================== |
218 |
|
219 |
Moves |
220 |
----- |
221 |
|
222 |
The following developers recently left the Gentoo team: |
223 |
|
224 |
* None this week |
225 |
|
226 |
Adds |
227 |
---- |
228 |
|
229 |
The following developers recently joined the Gentoo Linux team: |
230 |
|
231 |
* Herbie Hopkins (Herbs) - AMD64 |
232 |
|
233 |
Changes |
234 |
------- |
235 |
|
236 |
The following developers recently changed roles within the Gentoo Linux |
237 |
project: |
238 |
|
239 |
* None this week |
240 |
|
241 |
================== |
242 |
7. Gentoo security |
243 |
================== |
244 |
|
245 |
phpMyAdmin: Cross-site scripting vulnerability |
246 |
---------------------------------------------- |
247 |
|
248 |
phpMyAdmin is vulnerable to a cross-site scripting attack. |
249 |
|
250 |
For more information, please see the GLSA Announcement[22] |
251 |
|
252 |
22. http://www.gentoo.org/security/en/glsa/glsa-200504-08.xml |
253 |
|
254 |
Axel: Vulnerability in HTTP redirection handling |
255 |
------------------------------------------------ |
256 |
|
257 |
A buffer overflow vulnerability has been found in Axel which could lead to |
258 |
the execution of arbitrary code. |
259 |
|
260 |
For more information, please see the GLSA Announcement[23] |
261 |
|
262 |
23. http://www.gentoo.org/security/en/glsa/glsa-200504-09.xml |
263 |
|
264 |
Gld: Remote execution of arbitrary code |
265 |
--------------------------------------- |
266 |
|
267 |
Gld contains several serious vulnerabilities, potentially resulting in the |
268 |
execution of arbitrary code as the root user. |
269 |
|
270 |
For more information, please see the GLSA Announcement[24] |
271 |
|
272 |
24. http://www.gentoo.org/security/en/glsa/glsa-200504-10.xml |
273 |
|
274 |
JunkBuster: Multiple vulnerabilities |
275 |
------------------------------------ |
276 |
|
277 |
JunkBuster is vulnerable to a heap corruption vulnerability, and under |
278 |
certain configurations may allow an attacker to modify settings. |
279 |
|
280 |
For more information, please see the GLSA Announcement[25] |
281 |
|
282 |
25. http://www.gentoo.org/security/en/glsa/glsa-200504-11.xml |
283 |
|
284 |
rsnapshot: Local privilege escalation |
285 |
------------------------------------- |
286 |
|
287 |
rsnapshot allows a local user to take ownership of local files, resulting |
288 |
in privilege escalation. |
289 |
|
290 |
For more information, please see the GLSA Announcement[26] |
291 |
|
292 |
26. http://www.gentoo.org/security/en/glsa/glsa-200504-12.xml |
293 |
|
294 |
OpenOffice.Org: DOC document Heap Overflow |
295 |
------------------------------------------ |
296 |
|
297 |
OpenOffice.Org is vulnerable to a heap overflow when processing DOC |
298 |
documents, which could lead to arbitrary code execution. |
299 |
|
300 |
For more information, please see the GLSA Announcement[27] |
301 |
|
302 |
27. http://www.gentoo.org/security/en/glsa/glsa-200504-13.xml |
303 |
|
304 |
monkeyd: Multiple vulnerabilities |
305 |
--------------------------------- |
306 |
|
307 |
Format string and Denial of Service vulnerabilities have been discovered |
308 |
in the monkeyd HTTP server, potentially resulting in the execution of |
309 |
arbitrary code. |
310 |
|
311 |
For more information, please see the GLSA Announcement[28] |
312 |
|
313 |
28. http://www.gentoo.org/security/en/glsa/glsa-200504-14.xml |
314 |
|
315 |
PHP: Multiple vulnerabilities |
316 |
----------------------------- |
317 |
|
318 |
Several vulnerabilities were found and fixed in PHP image handling |
319 |
functions, potentially resulting in Denial of Service conditions or the |
320 |
remote execution of arbitrary code. |
321 |
|
322 |
For more information, please see the GLSA Announcement[29] |
323 |
|
324 |
29. http://www.gentoo.org/security/en/glsa/glsa-200504-15.xml |
325 |
|
326 |
CVS: Multiple vulnerabilities |
327 |
----------------------------- |
328 |
|
329 |
Several serious vulnerabilities have been found in CVS, which may allow an |
330 |
attacker to remotely compromise a CVS server or cause a DoS. |
331 |
|
332 |
For more information, please see the GLSA Announcement[30] |
333 |
|
334 |
30. http://www.gentoo.org/security/en/glsa/glsa-200504-16.xml |
335 |
|
336 |
XV: Multiple vulnerabilities |
337 |
---------------------------- |
338 |
|
339 |
Multiple vulnerabilities have been discovered in XV, potentially resulting |
340 |
in the execution of arbitrary code. |
341 |
|
342 |
For more information, please see the GLSA Announcement[31] |
343 |
|
344 |
31. http://www.gentoo.org/security/en/glsa/glsa-200504-17.xml |
345 |
|
346 |
Mozilla Firefox, Mozilla Suite: Multiple vulnerabilities |
347 |
-------------------------------------------------------- |
348 |
|
349 |
New Mozilla Firefox and Mozilla Suite releases fix new security |
350 |
vulnerabilities, including memory disclosure and various ways of executing |
351 |
JavaScript code with elevated privileges. |
352 |
|
353 |
For more information, please see the GLSA Announcement[32] |
354 |
|
355 |
32. http://www.gentoo.org/security/en/glsa/glsa-200504-18.xml |
356 |
|
357 |
MPlayer: Two heap overflow vulnerabilities |
358 |
------------------------------------------ |
359 |
|
360 |
Two vulnerabilities have been found in MPlayer which could lead to the |
361 |
remote execution of arbitrary code. |
362 |
|
363 |
For more information, please see the GLSA Announcement[33] |
364 |
|
365 |
33. http://www.gentoo.org/security/en/glsa/glsa-200504-19.xml |
366 |
|
367 |
openMosixview: Insecure temporary file creation |
368 |
----------------------------------------------- |
369 |
|
370 |
openMosixview and the openMosixcollector daemon are vulnerable to symlink |
371 |
attacks, potentially allowing a local user to overwrite arbitrary files. |
372 |
|
373 |
For more information, please see the GLSA Announcement[34] |
374 |
|
375 |
34. http://www.gentoo.org/security/en/glsa/glsa-200504-20.xml |
376 |
|
377 |
RealPlayer, Helix Player: Buffer overflow vulnerability |
378 |
------------------------------------------------------- |
379 |
|
380 |
RealPlayer and Helix Player are vulnerable to a buffer overflow that could |
381 |
lead to remote execution of arbitrary code. |
382 |
|
383 |
For more information, please see the GLSA Announcement[35] |
384 |
|
385 |
35. http://www.gentoo.org/security/en/glsa/glsa-200504-21.xml |
386 |
|
387 |
KDE kimgio: PCX handling buffer overflow |
388 |
---------------------------------------- |
389 |
|
390 |
KDE fails to properly validate input when handling PCX images, potentially |
391 |
resulting in the execution of arbitrary code. |
392 |
|
393 |
For more information, please see the GLSA Announcement[36] |
394 |
|
395 |
36. http://www.gentoo.org/security/en/glsa/glsa-200504-22.xml |
396 |
|
397 |
Kommander: Insecure remote script execution |
398 |
------------------------------------------- |
399 |
|
400 |
Kommander executes remote scripts without confirmation, potentially |
401 |
resulting in the execution of arbitrary code. |
402 |
|
403 |
For more information, please see the GLSA Announcement[37] |
404 |
|
405 |
37. http://www.gentoo.org/security/en/glsa/glsa-200504-23.xml |
406 |
|
407 |
=========== |
408 |
8. Bugzilla |
409 |
=========== |
410 |
|
411 |
Summary |
412 |
------- |
413 |
|
414 |
* Statistics |
415 |
* Closed bug ranking |
416 |
* New bug rankings |
417 |
|
418 |
Statistics |
419 |
---------- |
420 |
|
421 |
The Gentoo community uses Bugzilla (bugs.gentoo.org[38]) to record and |
422 |
track bugs, notifications, suggestions and other interactions with the |
423 |
development team. Between 17 April 2005 and 24 April 2005, activity on the |
424 |
site has resulted in: |
425 |
|
426 |
38. http://bugs.gentoo.org |
427 |
|
428 |
* 817 new bugs during this period |
429 |
* 493 bugs closed or resolved during this period |
430 |
* 14 previously closed bugs were reopened this period |
431 |
|
432 |
Of the 8497 currently open bugs: 89 are labeled 'blocker', 231 are labeled |
433 |
'critical', and 628 are labeled 'major'. |
434 |
|
435 |
Closed bug rankings |
436 |
------------------- |
437 |
|
438 |
The developers and teams who have closed the most bugs during this period |
439 |
are: |
440 |
|
441 |
* media-video herd[39], with 44 closed bugs[40] |
442 |
* AMD64 Porting Team[41], with 43 closed bugs[42] |
443 |
* Gentoo Sound Team[43], with 19 closed bugs[44] |
444 |
* Gentoo Security[45], with 18 closed bugs[46] |
445 |
* Jeremy Huddleston[47], with 16 closed bugs[48] |
446 |
* Java team[49], with 13 closed bugs[50] |
447 |
* Gentoo Science Related Packages[51], with 12 closed bugs[52] |
448 |
* Daniel Black[53], with 12 closed bugs[54] |
449 |
39. media-video@g.o |
450 |
40. |
451 |
http://bugs.gentoo.org/buglist.cgi?bug_status=RESOLVED&bug_status=CLOSED&chfield=bug_status&chfieldfrom=2005-04-17&chfieldto=2005-04-24&resolution=FIXED&assigned_to=media-video@g.o |
452 |
41. amd64@g.o |
453 |
42. |
454 |
http://bugs.gentoo.org/buglist.cgi?bug_status=RESOLVED&bug_status=CLOSED&chfield=bug_status&chfieldfrom=2005-04-17&chfieldto=2005-04-24&resolution=FIXED&assigned_to=amd64@g.o |
455 |
43. sound@g.o |
456 |
44. |
457 |
http://bugs.gentoo.org/buglist.cgi?bug_status=RESOLVED&bug_status=CLOSED&chfield=bug_status&chfieldfrom=2005-04-17&chfieldto=2005-04-24&resolution=FIXED&assigned_to=sound@g.o |
458 |
45. security@g.o |
459 |
46. |
460 |
http://bugs.gentoo.org/buglist.cgi?bug_status=RESOLVED&bug_status=CLOSED&chfield=bug_status&chfieldfrom=2005-04-17&chfieldto=2005-04-24&resolution=FIXED&assigned_to=security@g.o |
461 |
47. eradicator@g.o |
462 |
48. |
463 |
http://bugs.gentoo.org/buglist.cgi?bug_status=RESOLVED&bug_status=CLOSED&chfield=bug_status&chfieldfrom=2005-04-17&chfieldto=2005-04-24&resolution=FIXED&assigned_to=eradicator@g.o |
464 |
49. java@g.o |
465 |
50. |
466 |
http://bugs.gentoo.org/buglist.cgi?bug_status=RESOLVED&bug_status=CLOSED&chfield=bug_status&chfieldfrom=2005-04-17&chfieldto=2005-04-24&resolution=FIXED&assigned_to=java@g.o |
467 |
51. sci@g.o |
468 |
52. |
469 |
http://bugs.gentoo.org/buglist.cgi?bug_status=RESOLVED&bug_status=CLOSED&chfield=bug_status&chfieldfrom=2005-04-17&chfieldto=2005-04-24&resolution=FIXED&assigned_to=sci@g.o |
470 |
53. dragonheart@g.o |
471 |
54. |
472 |
http://bugs.gentoo.org/buglist.cgi?bug_status=RESOLVED&bug_status=CLOSED&chfield=bug_status&chfieldfrom=2005-04-17&chfieldto=2005-04-24&resolution=FIXED&assigned_to=dragonheart@g.o |
473 |
|
474 |
|
475 |
New bug rankings |
476 |
---------------- |
477 |
|
478 |
The developers and teams who have been assigned the most new bugs during |
479 |
this period are: |
480 |
|
481 |
* Gentoo Linux bug wranglers[55], with 19 new bugs[56] |
482 |
* Mozilla Gentoo Team[57], with 13 new bugs[58] |
483 |
* media-video herd[59], with 13 new bugs[60] |
484 |
* Gentoo Sound Team[61], with 11 new bugs[62] |
485 |
* Jeremy Huddleston[63], with 11 new bugs[64] |
486 |
* Television related Applications in Gentoo's Portage[65], with 10 new |
487 |
bugs[66] |
488 |
* Gentoo KDE team[67], with 9 new bugs[68] |
489 |
* Gentoo Linux Gnome Desktop Team[69], with 9 new bugs[70] |
490 |
55. bug-wranglers@g.o |
491 |
56. |
492 |
http://bugs.gentoo.org/buglist.cgi?bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&chfield=assigned_to&chfieldfrom=2005-04-17&chfieldto=2005-04-24&assigned_to=bug-wranglers@g.o |
493 |
57. mozilla@g.o |
494 |
58. |
495 |
http://bugs.gentoo.org/buglist.cgi?bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&chfield=assigned_to&chfieldfrom=2005-04-17&chfieldto=2005-04-24&assigned_to=mozilla@g.o |
496 |
59. media-video@g.o |
497 |
60. |
498 |
http://bugs.gentoo.org/buglist.cgi?bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&chfield=assigned_to&chfieldfrom=2005-04-17&chfieldto=2005-04-24&assigned_to=media-video@g.o |
499 |
61. sound@g.o |
500 |
62. |
501 |
http://bugs.gentoo.org/buglist.cgi?bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&chfield=assigned_to&chfieldfrom=2005-04-17&chfieldto=2005-04-24&assigned_to=sound@g.o |
502 |
63. eradicator@g.o |
503 |
64. |
504 |
http://bugs.gentoo.org/buglist.cgi?bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&chfield=assigned_to&chfieldfrom=2005-04-17&chfieldto=2005-04-24&assigned_to=eradicator@g.o |
505 |
65. media-tv@g.o |
506 |
66. |
507 |
http://bugs.gentoo.org/buglist.cgi?bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&chfield=assigned_to&chfieldfrom=2005-04-17&chfieldto=2005-04-24&assigned_to=media-tv@g.o |
508 |
67. kde@g.o |
509 |
68. |
510 |
http://bugs.gentoo.org/buglist.cgi?bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&chfield=assigned_to&chfieldfrom=2005-04-17&chfieldto=2005-04-24&assigned_to=kde@g.o |
511 |
69. gnome@g.o |
512 |
70. |
513 |
http://bugs.gentoo.org/buglist.cgi?bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&chfield=assigned_to&chfieldfrom=2005-04-17&chfieldto=2005-04-24&assigned_to=gnome@g.o |
514 |
|
515 |
|
516 |
=============== |
517 |
9. GWN feedback |
518 |
=============== |
519 |
|
520 |
Please send us your feedback[71] and help make the GWN better. |
521 |
|
522 |
71. gwn-feedback@g.o |
523 |
|
524 |
================================ |
525 |
10. GWN subscription information |
526 |
================================ |
527 |
|
528 |
To subscribe to the Gentoo Weekly Newsletter, send a blank email to |
529 |
gentoo-gwn-subscribe@g.o. |
530 |
|
531 |
To unsubscribe to the Gentoo Weekly Newsletter, send a blank email to |
532 |
gentoo-gwn-unsubscribe@g.o from the email address you are |
533 |
subscribed under. |
534 |
|
535 |
=================== |
536 |
11. Other languages |
537 |
=================== |
538 |
|
539 |
The Gentoo Weekly Newsletter is also available in the following languages: |
540 |
|
541 |
* Danish[72] |
542 |
* Dutch[73] |
543 |
* English[74] |
544 |
* German[75] |
545 |
* French[76] |
546 |
* Japanese[77] |
547 |
* Italian[78] |
548 |
* Polish[79] |
549 |
* Portuguese (Brazil)[80] |
550 |
* Portuguese (Portugal)[81] |
551 |
* Russian[82] |
552 |
* Spanish[83] |
553 |
* Turkish[84] |
554 |
72. http://www.gentoo.org/news/da/gwn/gwn.xml |
555 |
73. http://www.gentoo.org/news/nl/gwn/gwn.xml |
556 |
74. http://www.gentoo.org/news/en/gwn/gwn.xml |
557 |
75. http://www.gentoo.org/news/de/gwn/gwn.xml |
558 |
76. http://www.gentoo.org/news/fr/gwn/gwn.xml |
559 |
77. http://www.gentoo.org/news/ja/gwn/gwn.xml |
560 |
78. http://www.gentoo.org/news/it/gwn/gwn.xml |
561 |
79. http://www.gentoo.org/news/pl/gwn/gwn.xml |
562 |
80. http://www.gentoo.org/news/pt_br/gwn/gwn.xml |
563 |
81. http://www.gentoo.org/news/pt/gwn/gwn.xml |
564 |
82. http://www.gentoo.org/news/ru/gwn/gwn.xml |
565 |
83. http://www.gentoo.org/news/es/gwn/gwn.xml |
566 |
84. http://www.gentoo.org/news/tr/gwn/gwn.xml |
567 |
|
568 |
|
569 |
Ulrich Plate <plate@g.o> - Editor |
570 |
Patrick Lauer <patrick@g.o> - Author |
571 |
|
572 |
-- |
573 |
gentoo-gwn@g.o mailing list |