Debian Weekly News - email
From: Anthony Towns <aj@azure.humbug.org.au> Date: Wed, 26 Jul 2000 10:44:09 +1000 To: debian-release@lists.debian.org Subject: Test Cycle Three Begins Test Cycle Three has officially begun. The archive has been frozen, and no new packages will be installed until the test cycle ends. Since the last test cycle we have new boot-floppies, a new X, and many new packages. Also included are updated release notes: please be sure to check them to avoid any problems some of the changes may cause in your systems. It is hoped and expected that we will not need to make any further changes to packages between this test cycle and declaring potato stable. As such, security fixes for packages in potato will be made available on security.debian.org and announced on the debian-security-announce mailing list, as they are for the stable release. The main focus of testing for this cycle, then, is to ensure the release notes are as complete and as helpful as possible, and to identify issues that should be fixed in future point releases of potato and in the next Debian release, woody. This test cycle will end in two weeks, roughly the 9th of August. At that point, any additional problems will be added to the release notes, and potato will be declared stable. The official announcement of this, and the first non-virtual release party, is expected to take place at the LinuxWorld Conference and Expo. Testing reports should, as always, be sent to the debian-testing list. Subscription information and archives are available from the Debian homepage. For those who are able to test CD installs, images for the first binary CD for each architecture are available at: http://ftp.debian.org/debian-cd/potato_test-cycle-3/ For people doing network based installs, please point Apt or your preferred dselect method at your local mirror. -- Anthony Towns Acting Release Manager
Date: Tue, 25 Jul 2000 15:51:21 -0400 From: Ben Collins <bcollins@debian.org> To: debian-announce@lists.debian.org Subject: Dedication of the Debian 2.2 release This is the first public announcement of this intention. Some may notice two new files in our archive (or on mirrors) and on the new Test Cycle 3 CD's. This is a dedication of this release to a recently daparted member of our Project, Joel Klecker, who died unexpectedly at age 21. The dedication can be found (and is attached here for completeness) at: http://ftp.debian.org/doc/dedication-2.2.txt You will also find a file with it called dedication-2.2.sigs.tar.gz, which contains close to 200 PGP signatures from our Developers for the dedication.txt. Joel's death was the result of a life long battle with Duchenne Muscular Dystrophy. Information for donations to the Muscular Dystrophy Association can be found here and will be greatly appreciated (please make donations in Joel's name, if you so desire): http://mdausa.org/donate/index.html Sincerely, Ben Collins
From: Joey Hess <joeyh@debian.org> Date: Tue, 25 Jul 2000 17:05:37 -0700 To: Kurt Seifried <seifried@securityportal.com> Cc: debian-devel@lists.debian.org Subject: Linux Distribution Security Report -- disappointing In <http://www.securityportal.com/cover/coverstory20000724.html>, you state: > I have not fully covered Slackware and Debian, with their ridiculously >slow release schedules. I'm very disappointed on two levels: First that you provide such a comprehensive and useful report and yes omit one of the more popular linux distributions[6], and second that you have made such an erroneous assumption about Debian's release methodology. Your main mistake is that you have failed to realize that Debian releases timely security fixes, which are distributed to Debian users via the internet. Users can choose to configure their systems to receive these updates[1]. This makes release intervals orthogonal to whether users receive security fixes. Moreover, Debian has _frequent_ minor releases. These releases consist mostly of security fixes, and they serve to get the security fixes out to fresh Debian installs, plus to anyone who installs from CD and does not set up their system to receive security fixes via the net. You may have missed these releases, since in Debian, "2.1" is a new major release (with an implied "r1"), while "2.1r2" is the first minor release -- an unusual nomenclature compared to the other distributions. Interestingly, minor releases of Debian 2.1 have occurred more frequently than minor releases of Red Hat 6 (which, as you note, "shoves a new version out the door every 6 months like clockwork"). Debian Red Hat 2.1 8 days 2.1r2 167 days 2.1r3 6.0 104 days 161 days 2.1r4 6.1 117 days 175 days 2.1r5 6.2 [ Interestingly, a poster on slashdot has numbers[5] that show that the other distribution you left out (Slackware) also releases just as frequently as Red Hat. ] In light of these problems, I think it would be quite beneficial if you added Debian to your paper. Security announcement since 1998 are archived in both the archives of the debian-security-announce mailing list[3], and on http://security.debian.org/ (which also includes advisories from 1997). So, I dug up some numbers (I read the changelog pointed to by footnote 2, and counted security fixes. This is probably not as accurate as your numbers.) Release Security Advisories 2.1 1 2.1r2 16 2.1r3 19 2.1r4 5 2.1r5 Moving on to the second part of your paper, specific incidents and how quickly distributions responded, I've looked up some data on Debian's responses. Local root exploit in kernel <2.2.15, announced on June 8th. On June 12th, Debian announced[4] it had fixed the hole *before* the exploit was announced, and thus was not vulnerable. fdmount, announced May 22. Debian has never installed it suid, and thus has never been vulnerable (as you noted -- thanks). By the way, I think this section of your paper looked at too few holes to draw any real conclusions from. But Debian seems to have been near the head of the pack in this limited sampling. In closing, I'd like to point out that the current 1 and a half 5 year -- not 2 year as you continually state -- gap between Debian 2.1 and 2.2 is so far an exception, and not -- as you continually imply -- a rule. Major Debian releases: 1.1 6 months 1.2 7 months 1.3 12 months 2.0 8 months 2.1 (19 months?) 2.2 -- see shy jo, fond of lies, damn lies, and statistics [1] (For instructions to configure a Debian system to receive such fixes, see for example, http://security.debian.org/, in the 5th paragraph.) [2] This information from http://ftp.debian.org/debian/dists/stable/Debian2.1r5 [3] https://www.debian.org/Lists-Archives/debian-security-announce-98/threads.html https://www.debian.org/Lists-Archives/debian-security-announce-99/threads.html https://www.debian.org/Lists-Archives/debian-security-announce-00/threads.html [4] https://www.debian.org/security/2000/20000612 [5] http://slashdot.org/comments.pl?sid=00/07/25/1444233&cid=141 [6] I'm not going to argue this in detail, but just see how people reacted to your ommissions on slashdot. Debian has a rather large mindshare, though its market share is less quantifiable. http://slashdot.org/article.pl?sid=00/07/25/1444233&mode=nested
To receive this newsletter weekly in your mailbox, subscribe to the debian-news mailing list.
Back issues of this newsletter are available.
This issue of Debian Weekly News was edited by Joey Hess.