Gentoo Archives: gentoo-gwn

From: Ulrich Plate <plate@g.o>
To: gentoo-gwn@l.g.o
Subject: [gentoo-gwn] Gentoo Weekly Newsletter 25 April 2005
Date: Mon, 25 Apr 2005 23:26:21
Message-Id: 20050426012745.28413e29.plate@gentoo.org
1 ---------------------------------------------------------------------------
2 Gentoo Weekly Newsletter
3 http://www.gentoo.org/news/en/gwn/current.xml
4 This is the Gentoo Weekly Newsletter for the week of 25 April 2005.
5 ---------------------------------------------------------------------------
6
7 ==============
8 1. Gentoo News
9 ==============
10
11 Project Dolphin: Experimental rescue CD
12 ---------------------------------------
13
14 Benjamin Judas[1] announced last Friday that the release-engineering team
15 has created a new experimental subproject called "Project Dolphin" in
16 order to provide a feature-enhanced LiveCD version targeted at system
17 rescue. Much like the unofficial French SysRescueCD[2] that is also based
18 on the Gentoo LiveCD, Project Dolphin aims at offering all the tools
19 needed for the recovery of broken installations, failing harddisks or
20 other systems in need of rescue.
21
22 1. beejay@g.o
23 2. http://www.sysresccd.org/
24
25 Figure 1.1: Project Dolphin - LiveCD for rescue missions
26 http://www.gentoo.org/images/gwn/20050425_pd.png
27
28 Highlights of the CD include zsh, samba, bacula, mc, dar, mutt, xfsdump,
29 ide-smart, netcat, nmap, chrootkit, partimage, ncftp, centericq,
30 bind-tools, alsa-utils, mpg321. A very early test ISO image, actively
31 soliciting testers, has been made available in the experimental section of
32 the Gentoo mirrors[3] for download, in the /experimental/x86/livecd/x86
33 path. Users are strongly encouraged to submit comments to a freshly
34 introduced meta-bug[4], either to report problems or to request feature
35 additions. Thanks a lot for your support!
36
37 3. http://www.gentoo.org/main/en/mirrors.xml
38 4. http://bugs.gentoo.org/show_bug.cgi?id=90053
39
40 International Gentoo mailing list additions
41 -------------------------------------------
42
43 Two new mailing lists have been made available last week: The Dutch
44 version of the Gentoo Weekly Newsletter is now distributed in plain text
45 version via e-mail, at gentoo-gwn-nl@g.o, shortly after being
46 translated from the English original. As all other newsletter lists, it is
47 for distribution only. Dutch and Flemish speaking readers of the GWN can
48 subscribe to the new list by sending an e-mail to
49 gentoo-gwn-nl-subscribe@g.o and following the instructions in the
50 confirmation message they'll receive.
51
52 A regular support and discussion list has been set up for all Russian
53 Gentoo users, as Konstantin V. Arkhipov[5] announced last week.
54 gentoo-user-ru@g.o can be subscribed by sending a blank message to
55 gentoo-user-ru-subscribe@g.o. A full list of official Gentoo
56 mailing lists, both English and non-English ones, is available along with
57 usage instructions at the mailing list page[6].
58
59 5. voxus@g.o
60 6. http://www.gentoo.org/main/en/lists.xml
61
62 ========================
63 2. Developer of the week
64 ========================
65
66 "Gentoo is Zen applied to software" -- Patrick Lauer (bonsaikitten)
67 -------------------------------------------------------------------
68
69 Figure 2.1: Patrick Lauer aka Bonsaikitten
70 http://www.gentoo.org/images/gwn/20050425_bonsaikitten.jpg
71
72 This week's featured developer is bonsaikitten[7], who goes by the name
73 Patrick Lauer in real life. He has no allegiance pledged to any particular
74 faction of Gentoo devhood, but likes to work on a bit of everything. Since
75 late 2004 he is also a regular contributor to the GWN, in particular the
76 gentoo-dev mailing list summaries and this column, the dev-of-the-week,
77 are usually authored by him.
78
79 7. patrick@g.o
80
81 Patrick operates the gentooexperimental.org[8] server, offering ressources
82 for weird and unfinished ideas, including (but not limited to) tinderbox,
83 the script repository[9] and future (web-)rsync replacement candidates.
84 Planet Gentoo was first hosted on Patrick's server before being moved onto
85 official hardware managed by the Gentoo infrastructure team.
86
87 8. http://gentooexperimental.org
88 9.
89
90 During the day he's a student of Computer Science at the RWTH Aachen,
91 Germany, where he has started writing his thesis on "anonymous networks",
92 leaving precious little time for everything else, but after four and a
93 half years at the university he feels ready to move on. His computing
94 environment is a room full of crummy old hardware, a Quad Xeon, two
95 Athlons, and (courtesy of the CS faculty of his university) a 16-CPU
96 cluster.
97
98 He is a user of blackbox, firefox, licq, sometimes konqueror, and -- due
99 to vendor lock-in -- evolution, which seems to get less useful with every
100 revision, "as do all gnomes and trolls," says Patrick. He likes to work in
101 Python, but other languages are no problem, either - "unless they are
102 called Java and need longish incantations for every single statement."
103 When the weather permits he can be found mountainbiking in the woods and
104 fields around Aachen. He also enjoys good food, good (Belgian) beer, and
105 the presence of preferably highly intelligent and sexy women (although the
106 latter does not happen as often as desired). His motto is borrowed from
107 Alfred Lord Tennyson: "It is better to have loved and lost than never to
108 have loved at all."
109
110 =========================
111 3. Heard in the community
112 =========================
113
114 gentoo-dev
115 ----------
116
117 Some new xorg ebuilds
118
119 For all those that desparately need the newest and most bleeding edge
120 stuff, Donnie Berkholz[10] has put some new xorg ebuilds in portage. Bug
121 reports are appreciated. Especially the 6.8.99.* snapshots might be
122 interesting to try out - but be warned, it might break ...
123
124 10. spyderous@g.o
125
126 * new xorg ebuilds [11]
127 11. http://thread.gmane.org/gmane.linux.gentoo.devel/27145
128
129
130 Category rename
131
132 Since there are many proxies (but not all of them www only), the www-proxy
133 category might be renamed to net-proxy. All the SOCKS, www, ftp etc.
134 proxies will then be easy to find in their new category.
135
136 * Category rename [12]
137 12. http://thread.gmane.org/gmane.linux.gentoo.devel/27153
138
139
140 Gentoo as a development platform
141
142 Daniel Drake[13] starts a discussion on how to use Gentoo as a development
143 platform where you usually have to pull in various fixes from CVS. How do
144 you keep everything under portage's control while still being able to fix
145 things? Does portage support live CVS ebuilds in a sane fashion? Read on
146 to find out more.
147
148 13. dsd@g.o
149
150 * Gentoo as development platform [14]
151 14. http://thread.gmane.org/gmane.linux.gentoo.devel/27088
152
153
154 Apache problems
155
156 As some of you might have noticed, the Gentoo Apache team has done some
157 quite extensive changes to the newest versions of Apache. This was done
158 for various reasons, including (but not limited to) easier maintenance.
159 This has caused various problems since there is no easy migration path,
160 and most users don't want to throw away their apache config and start from
161 scratch. Because of this the newest versions are package.mask'ed until
162 this situation is resolved.
163
164 * package.mask'ing the new apache ebuilds [15]
165 * new apache stuff in testing[16]
166 15. http://thread.gmane.org/gmane.linux.gentoo.devel/27071
167 16. http://thread.gmane.org/gmane.linux.gentoo.devel/27208
168
169
170 =======================
171 4. Gentoo International
172 =======================
173
174 Switzerland: Pentoo - Gentoo-based intrusion detection LiveCD
175 -------------------------------------------------------------
176
177 "Pentoo"[17] is an acronym for "PENetration on genTOO". It is based on
178 kernel version 2.6.10, uses the Gnome desktop environment, and aims to
179 provide a complete platform for intrusion detection, penetration-testing
180 and security assessment. The content of the LiveCD can be updated,
181 allowing for up-to-date fingerprint and vulnerability databases, for tools
182 that require regular updates like the Nessus plugins, or scanner
183 fingerprint files, metasploit etc. Users can optionaly store data on USB
184 sticks for non-volatile storage support. Pentoo's author, Michael
185 Zanetta[18], emphasizes that "it has to be considered beta as I have not
186 much time to test it carefully," so feedback and comments are very
187 welcome, at bugs@××××××.ch. A roadmap for the project[19] is available,
188 too.
189
190 17. http://www.netsc.ch/pentoo/
191 18. grimmlin@××××××.ch
192 19. http://www.netsc.ch/pentoo/project.txt
193
194 Figure 4.1: Penetration testing based on Gentoo: Swiss 'Pentoo'
195 http://www.gentoo.org/images/gwn/20050425_pentoo.png
196
197 ======================
198 5. Gentoo in the press
199 ======================
200
201 Somos libres (25 April 2005, in Spanish)
202 ----------------------------------------
203
204 Today's edition of the Peruvian "Free and Open Software User Group"
205 website at Somos Libres has an interview with Daniel Oliveira,[20] one of
206 the heads of the Gentoo spin-off project Ututo[21] developed at and around
207 the university of Buenos Aires in neighboring Argentina. Oliveira, who
208 represents a core team of 37 developers busy pushing Ututo to individual
209 users, but also into municipal services and small and medium enterprises
210 in Argentina, explains the history and the current status of the project.
211
212 20. http://somoslibres.org/modules.php?name=News&file=article&sid=518
213 21. https://e.ututo.org.ar/indexes.html
214
215 ===========================
216 6. Moves, adds, and changes
217 ===========================
218
219 Moves
220 -----
221
222 The following developers recently left the Gentoo team:
223
224 * None this week
225
226 Adds
227 ----
228
229 The following developers recently joined the Gentoo Linux team:
230
231 * Herbie Hopkins (Herbs) - AMD64
232
233 Changes
234 -------
235
236 The following developers recently changed roles within the Gentoo Linux
237 project:
238
239 * None this week
240
241 ==================
242 7. Gentoo security
243 ==================
244
245 phpMyAdmin: Cross-site scripting vulnerability
246 ----------------------------------------------
247
248 phpMyAdmin is vulnerable to a cross-site scripting attack.
249
250 For more information, please see the GLSA Announcement[22]
251
252 22. http://www.gentoo.org/security/en/glsa/glsa-200504-08.xml
253
254 Axel: Vulnerability in HTTP redirection handling
255 ------------------------------------------------
256
257 A buffer overflow vulnerability has been found in Axel which could lead to
258 the execution of arbitrary code.
259
260 For more information, please see the GLSA Announcement[23]
261
262 23. http://www.gentoo.org/security/en/glsa/glsa-200504-09.xml
263
264 Gld: Remote execution of arbitrary code
265 ---------------------------------------
266
267 Gld contains several serious vulnerabilities, potentially resulting in the
268 execution of arbitrary code as the root user.
269
270 For more information, please see the GLSA Announcement[24]
271
272 24. http://www.gentoo.org/security/en/glsa/glsa-200504-10.xml
273
274 JunkBuster: Multiple vulnerabilities
275 ------------------------------------
276
277 JunkBuster is vulnerable to a heap corruption vulnerability, and under
278 certain configurations may allow an attacker to modify settings.
279
280 For more information, please see the GLSA Announcement[25]
281
282 25. http://www.gentoo.org/security/en/glsa/glsa-200504-11.xml
283
284 rsnapshot: Local privilege escalation
285 -------------------------------------
286
287 rsnapshot allows a local user to take ownership of local files, resulting
288 in privilege escalation.
289
290 For more information, please see the GLSA Announcement[26]
291
292 26. http://www.gentoo.org/security/en/glsa/glsa-200504-12.xml
293
294 OpenOffice.Org: DOC document Heap Overflow
295 ------------------------------------------
296
297 OpenOffice.Org is vulnerable to a heap overflow when processing DOC
298 documents, which could lead to arbitrary code execution.
299
300 For more information, please see the GLSA Announcement[27]
301
302 27. http://www.gentoo.org/security/en/glsa/glsa-200504-13.xml
303
304 monkeyd: Multiple vulnerabilities
305 ---------------------------------
306
307 Format string and Denial of Service vulnerabilities have been discovered
308 in the monkeyd HTTP server, potentially resulting in the execution of
309 arbitrary code.
310
311 For more information, please see the GLSA Announcement[28]
312
313 28. http://www.gentoo.org/security/en/glsa/glsa-200504-14.xml
314
315 PHP: Multiple vulnerabilities
316 -----------------------------
317
318 Several vulnerabilities were found and fixed in PHP image handling
319 functions, potentially resulting in Denial of Service conditions or the
320 remote execution of arbitrary code.
321
322 For more information, please see the GLSA Announcement[29]
323
324 29. http://www.gentoo.org/security/en/glsa/glsa-200504-15.xml
325
326 CVS: Multiple vulnerabilities
327 -----------------------------
328
329 Several serious vulnerabilities have been found in CVS, which may allow an
330 attacker to remotely compromise a CVS server or cause a DoS.
331
332 For more information, please see the GLSA Announcement[30]
333
334 30. http://www.gentoo.org/security/en/glsa/glsa-200504-16.xml
335
336 XV: Multiple vulnerabilities
337 ----------------------------
338
339 Multiple vulnerabilities have been discovered in XV, potentially resulting
340 in the execution of arbitrary code.
341
342 For more information, please see the GLSA Announcement[31]
343
344 31. http://www.gentoo.org/security/en/glsa/glsa-200504-17.xml
345
346 Mozilla Firefox, Mozilla Suite: Multiple vulnerabilities
347 --------------------------------------------------------
348
349 New Mozilla Firefox and Mozilla Suite releases fix new security
350 vulnerabilities, including memory disclosure and various ways of executing
351 JavaScript code with elevated privileges.
352
353 For more information, please see the GLSA Announcement[32]
354
355 32. http://www.gentoo.org/security/en/glsa/glsa-200504-18.xml
356
357 MPlayer: Two heap overflow vulnerabilities
358 ------------------------------------------
359
360 Two vulnerabilities have been found in MPlayer which could lead to the
361 remote execution of arbitrary code.
362
363 For more information, please see the GLSA Announcement[33]
364
365 33. http://www.gentoo.org/security/en/glsa/glsa-200504-19.xml
366
367 openMosixview: Insecure temporary file creation
368 -----------------------------------------------
369
370 openMosixview and the openMosixcollector daemon are vulnerable to symlink
371 attacks, potentially allowing a local user to overwrite arbitrary files.
372
373 For more information, please see the GLSA Announcement[34]
374
375 34. http://www.gentoo.org/security/en/glsa/glsa-200504-20.xml
376
377 RealPlayer, Helix Player: Buffer overflow vulnerability
378 -------------------------------------------------------
379
380 RealPlayer and Helix Player are vulnerable to a buffer overflow that could
381 lead to remote execution of arbitrary code.
382
383 For more information, please see the GLSA Announcement[35]
384
385 35. http://www.gentoo.org/security/en/glsa/glsa-200504-21.xml
386
387 KDE kimgio: PCX handling buffer overflow
388 ----------------------------------------
389
390 KDE fails to properly validate input when handling PCX images, potentially
391 resulting in the execution of arbitrary code.
392
393 For more information, please see the GLSA Announcement[36]
394
395 36. http://www.gentoo.org/security/en/glsa/glsa-200504-22.xml
396
397 Kommander: Insecure remote script execution
398 -------------------------------------------
399
400 Kommander executes remote scripts without confirmation, potentially
401 resulting in the execution of arbitrary code.
402
403 For more information, please see the GLSA Announcement[37]
404
405 37. http://www.gentoo.org/security/en/glsa/glsa-200504-23.xml
406
407 ===========
408 8. Bugzilla
409 ===========
410
411 Summary
412 -------
413
414 * Statistics
415 * Closed bug ranking
416 * New bug rankings
417
418 Statistics
419 ----------
420
421 The Gentoo community uses Bugzilla (bugs.gentoo.org[38]) to record and
422 track bugs, notifications, suggestions and other interactions with the
423 development team. Between 17 April 2005 and 24 April 2005, activity on the
424 site has resulted in:
425
426 38. http://bugs.gentoo.org
427
428 * 817 new bugs during this period
429 * 493 bugs closed or resolved during this period
430 * 14 previously closed bugs were reopened this period
431
432 Of the 8497 currently open bugs: 89 are labeled 'blocker', 231 are labeled
433 'critical', and 628 are labeled 'major'.
434
435 Closed bug rankings
436 -------------------
437
438 The developers and teams who have closed the most bugs during this period
439 are:
440
441 * media-video herd[39], with 44 closed bugs[40]
442 * AMD64 Porting Team[41], with 43 closed bugs[42]
443 * Gentoo Sound Team[43], with 19 closed bugs[44]
444 * Gentoo Security[45], with 18 closed bugs[46]
445 * Jeremy Huddleston[47], with 16 closed bugs[48]
446 * Java team[49], with 13 closed bugs[50]
447 * Gentoo Science Related Packages[51], with 12 closed bugs[52]
448 * Daniel Black[53], with 12 closed bugs[54]
449 39. media-video@g.o
450 40.
451 http://bugs.gentoo.org/buglist.cgi?bug_status=RESOLVED&bug_status=CLOSED&chfield=bug_status&chfieldfrom=2005-04-17&chfieldto=2005-04-24&resolution=FIXED&assigned_to=media-video@g.o
452 41. amd64@g.o
453 42.
454 http://bugs.gentoo.org/buglist.cgi?bug_status=RESOLVED&bug_status=CLOSED&chfield=bug_status&chfieldfrom=2005-04-17&chfieldto=2005-04-24&resolution=FIXED&assigned_to=amd64@g.o
455 43. sound@g.o
456 44.
457 http://bugs.gentoo.org/buglist.cgi?bug_status=RESOLVED&bug_status=CLOSED&chfield=bug_status&chfieldfrom=2005-04-17&chfieldto=2005-04-24&resolution=FIXED&assigned_to=sound@g.o
458 45. security@g.o
459 46.
460 http://bugs.gentoo.org/buglist.cgi?bug_status=RESOLVED&bug_status=CLOSED&chfield=bug_status&chfieldfrom=2005-04-17&chfieldto=2005-04-24&resolution=FIXED&assigned_to=security@g.o
461 47. eradicator@g.o
462 48.
463 http://bugs.gentoo.org/buglist.cgi?bug_status=RESOLVED&bug_status=CLOSED&chfield=bug_status&chfieldfrom=2005-04-17&chfieldto=2005-04-24&resolution=FIXED&assigned_to=eradicator@g.o
464 49. java@g.o
465 50.
466 http://bugs.gentoo.org/buglist.cgi?bug_status=RESOLVED&bug_status=CLOSED&chfield=bug_status&chfieldfrom=2005-04-17&chfieldto=2005-04-24&resolution=FIXED&assigned_to=java@g.o
467 51. sci@g.o
468 52.
469 http://bugs.gentoo.org/buglist.cgi?bug_status=RESOLVED&bug_status=CLOSED&chfield=bug_status&chfieldfrom=2005-04-17&chfieldto=2005-04-24&resolution=FIXED&assigned_to=sci@g.o
470 53. dragonheart@g.o
471 54.
472 http://bugs.gentoo.org/buglist.cgi?bug_status=RESOLVED&bug_status=CLOSED&chfield=bug_status&chfieldfrom=2005-04-17&chfieldto=2005-04-24&resolution=FIXED&assigned_to=dragonheart@g.o
473
474
475 New bug rankings
476 ----------------
477
478 The developers and teams who have been assigned the most new bugs during
479 this period are:
480
481 * Gentoo Linux bug wranglers[55], with 19 new bugs[56]
482 * Mozilla Gentoo Team[57], with 13 new bugs[58]
483 * media-video herd[59], with 13 new bugs[60]
484 * Gentoo Sound Team[61], with 11 new bugs[62]
485 * Jeremy Huddleston[63], with 11 new bugs[64]
486 * Television related Applications in Gentoo's Portage[65], with 10 new
487 bugs[66]
488 * Gentoo KDE team[67], with 9 new bugs[68]
489 * Gentoo Linux Gnome Desktop Team[69], with 9 new bugs[70]
490 55. bug-wranglers@g.o
491 56.
492 http://bugs.gentoo.org/buglist.cgi?bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&chfield=assigned_to&chfieldfrom=2005-04-17&chfieldto=2005-04-24&assigned_to=bug-wranglers@g.o
493 57. mozilla@g.o
494 58.
495 http://bugs.gentoo.org/buglist.cgi?bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&chfield=assigned_to&chfieldfrom=2005-04-17&chfieldto=2005-04-24&assigned_to=mozilla@g.o
496 59. media-video@g.o
497 60.
498 http://bugs.gentoo.org/buglist.cgi?bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&chfield=assigned_to&chfieldfrom=2005-04-17&chfieldto=2005-04-24&assigned_to=media-video@g.o
499 61. sound@g.o
500 62.
501 http://bugs.gentoo.org/buglist.cgi?bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&chfield=assigned_to&chfieldfrom=2005-04-17&chfieldto=2005-04-24&assigned_to=sound@g.o
502 63. eradicator@g.o
503 64.
504 http://bugs.gentoo.org/buglist.cgi?bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&chfield=assigned_to&chfieldfrom=2005-04-17&chfieldto=2005-04-24&assigned_to=eradicator@g.o
505 65. media-tv@g.o
506 66.
507 http://bugs.gentoo.org/buglist.cgi?bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&chfield=assigned_to&chfieldfrom=2005-04-17&chfieldto=2005-04-24&assigned_to=media-tv@g.o
508 67. kde@g.o
509 68.
510 http://bugs.gentoo.org/buglist.cgi?bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&chfield=assigned_to&chfieldfrom=2005-04-17&chfieldto=2005-04-24&assigned_to=kde@g.o
511 69. gnome@g.o
512 70.
513 http://bugs.gentoo.org/buglist.cgi?bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&chfield=assigned_to&chfieldfrom=2005-04-17&chfieldto=2005-04-24&assigned_to=gnome@g.o
514
515
516 ===============
517 9. GWN feedback
518 ===============
519
520 Please send us your feedback[71] and help make the GWN better.
521
522 71. gwn-feedback@g.o
523
524 ================================
525 10. GWN subscription information
526 ================================
527
528 To subscribe to the Gentoo Weekly Newsletter, send a blank email to
529 gentoo-gwn-subscribe@g.o.
530
531 To unsubscribe to the Gentoo Weekly Newsletter, send a blank email to
532 gentoo-gwn-unsubscribe@g.o from the email address you are
533 subscribed under.
534
535 ===================
536 11. Other languages
537 ===================
538
539 The Gentoo Weekly Newsletter is also available in the following languages:
540
541 * Danish[72]
542 * Dutch[73]
543 * English[74]
544 * German[75]
545 * French[76]
546 * Japanese[77]
547 * Italian[78]
548 * Polish[79]
549 * Portuguese (Brazil)[80]
550 * Portuguese (Portugal)[81]
551 * Russian[82]
552 * Spanish[83]
553 * Turkish[84]
554 72. http://www.gentoo.org/news/da/gwn/gwn.xml
555 73. http://www.gentoo.org/news/nl/gwn/gwn.xml
556 74. http://www.gentoo.org/news/en/gwn/gwn.xml
557 75. http://www.gentoo.org/news/de/gwn/gwn.xml
558 76. http://www.gentoo.org/news/fr/gwn/gwn.xml
559 77. http://www.gentoo.org/news/ja/gwn/gwn.xml
560 78. http://www.gentoo.org/news/it/gwn/gwn.xml
561 79. http://www.gentoo.org/news/pl/gwn/gwn.xml
562 80. http://www.gentoo.org/news/pt_br/gwn/gwn.xml
563 81. http://www.gentoo.org/news/pt/gwn/gwn.xml
564 82. http://www.gentoo.org/news/ru/gwn/gwn.xml
565 83. http://www.gentoo.org/news/es/gwn/gwn.xml
566 84. http://www.gentoo.org/news/tr/gwn/gwn.xml
567
568
569 Ulrich Plate <plate@g.o> - Editor
570 Patrick Lauer <patrick@g.o> - Author
571
572 --
573 gentoo-gwn@g.o mailing list