Gentoo Logo

Gentoo Weekly Newsletter: 23 October 2006

Content:

1.  Gentoo news

Gentoo Linux certified on Sun Fire T1000/T2000

Gentoo Linux 2006.1 for SPARC is one of only two Linux distributions that have been certified by Sun to run on their Sun Fire Servers with CoolThreads. These servers utilize the new UltraSPARC T1 processor. Sun has worked with the Gentoo/SPARC team to ensure support of their latest servers in Gentoo Linux. Many thanks to Sun for also donating a Sun Fire T2000 server for the Foundation to use to further development on Gentoo/SPARC.

2.  Heard in the community

forums.gentoo.org

Idea: Gentoo Automated Error Reporting/Resolution Client

ThinkingInBinary posted an idea for an automated error reporting system to help out developers and users. The client would collect information after a crash and submit it to the developers. Besides automatically collecting data for the developers, the client could also give step-by-step instructions to the user if the problem has already been resolved.

gentoo-user

want to ditch kopete

Roy Wright couldn't get rid of kopete-3.5.5-r1. When he tried to delete it, portage insisted on bringing it back and it prevented him from updating world. As a workaround, Neil Bothwick proposed:

Code Listing 2.1: Adding kopete to package.provided

# mkdir -p /etc/portage/profile
# echo "kde-base/kopete-3.5.5-r1" >>/etc/portage/profile/package.provided

Roy reported the problem solved, but wondered what he'd done. User bn explained that he'd convinced portage that kopete was installed even though it wasn't. Harm Geerts pointed out that this was a workaround rather than a solution and that it might come back to haunt Roy someday in the future.

xorg-server update problem

james was trying to emerge xorg-server-1.1.1-r1. Compiling failed with "Cannot write to '/usr/share/X11/xkb/compiled'". /usr/share/X11/xkb/compiled was a symlink to /var/lib/xkb, a non-existent file.

Alan McKinnon noted that running "equery belongs /var/lib/xkb" on his system showed the file to have been installed by xkbcomp and suggested recompiling it. James reported problem solved.

gentoo-dev

vim syntax global use flag

Caleb Cushing has suggested adding a vim-syntax global use flag to allow users to more easily manage vim syntax ebuilds. For example, such a use flag when set would make it so that when one installed x11-wm/fluxbox it would also install app-vim/fluxbox-syntax as a dependency. The idea met with positive reactions and Mike Kelly has opened a bug report to track the progress of implementing this on the about 12 affected packages.

support for i386

Mike Frysinger has brought to the attention of Gentoo developers that the i386 sub-architecture is facing a difficult future. Starting with glibc-2.6, upstream plans to require TLS and the i386 lacks the atomic instructions required to support it. Debate is being had as to what support, if any, Gentoo will be able to offer when this change occurs. While glibc-2.5 can continue to be used (which has relevance to Release Engineering which makes use of CHOST="i386-*" for its builds), once an exploit of glibc-2.5 comes along, it could spell the end of i386.

3.  Gentoo developer moves

Moves

The following developers recently left the Gentoo project:

  • Denis Dupeyron (calchan)

Adds

The following developers recently joined the Gentoo project:

  • Matti Bickel (mabi) PPC
  • Piotr Jaroszyński (peper) voip/mozilla
  • Jurek Bartuszek (jurek) dotnet

Changes

The following developers recently changed roles within the Gentoo project:

  • none this week

4.  Gentoo security

Seamonkey: Multiple vulnerabilities

The Seamonkey project has reported multiple security vulnerabilities in the application.

For more information, please see the GLSA Announcement

CAPI4Hylafax fax receiver: Execution of arbitrary code

CAPI4Hylafax allows remote attackers to execute arbitrary commands.

For more information, please see the GLSA Announcement

Mozilla Network Security Service (NSS): RSA signature forgery

NSS fails to properly validate PKCS #1 v1.5 signatures.

For more information, please see the GLSA Announcement

Python: Buffer Overflow

A buffer overflow in Python's "repr()" function can be exploited to cause a Denial of Service and potentially allows the execution of arbitrary code.

For more information, please see the GLSA Announcement

Cscope: Multiple buffer overflows

Cscope is vulnerable to multiple buffer overflows that could lead to the execution of arbitrary code.

For more information, please see the GLSA Announcement

libmusicbrainz: Multiple buffer overflows

Multiple buffer overflows have been found in libmusicbrainz, which could lead to a Denial of Service or possibly the execution of arbitrary code.

For more information, please see the GLSA Announcement

5.  Upcoming package removals

This is a list of packages that have been announced to be removed in the future. The package removals come from many locations, including the Treecleaners and various developers.

Last Rites:

Package: Removal date: Contact:
net-misc/klapjack 15 Nov 06 Alberto Suárez López
sys-devel/odinmp 16 Nov 06 Olivier Crete
www-apps/issue-tracker 19 Nov 06 Renat Lumpau
www-apps/back-end 19 Nov 06 Renat Lumpau
app-editors/xwpe 19 Nov 06 Alec Warner
dev-ruby/rudl 20 Nov 06 Diego Pettenò

6.  Bugzilla

Summary

Statistics

The Gentoo community uses Bugzilla (bugs.gentoo.org) to record and track bugs, notifications, suggestions and other interactions with the development team. Between 15 October 2006 and 22 October 2006, activity on the site has resulted in:

  • 901 new bugs during this period
  • 546 bugs closed or resolved during this period
  • 26 previously closed bugs were reopened this period
  • 159 closed as NEEDINFO/WONTFIX/CANTFIX/INVALID/UPSTREAM during this period
  • 167 bugs marked as duplicates during this period

Of the 11121 currently open bugs: 33 are labeled 'blocker', 116 are labeled 'critical', and 494 are labeled 'major'.

Closed bug rankings

The developers and teams who have closed the most bugs during this period are:

New bug rankings

The developers and teams who have been assigned the most new bugs during this period are:

7.  GWN feedback

Please send us your feedback and help make the GWN better.

8.  GWN subscription information

To subscribe to the Gentoo Weekly Newsletter, send a blank e-mail to gentoo-gwn+subscribe@gentoo.org.

To unsubscribe to the Gentoo Weekly Newsletter, send a blank e-mail to gentoo-gwn+unsubscribe@gentoo.org from the e-mail address you are subscribed under.

9.  Other languages

The Gentoo Weekly Newsletter is also available in the following languages:



Print

Page updated October 23, 2006

Summary: This is the Gentoo Weekly Newsletter for the week of 23 October 2006.

Ulrich Plate
Editor

Chris Atkinson
Author

Josh Saddler
Author

Kyle Bishop
Author

Chris Gianelloni
Author

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.