Bug#820470: [pkg-ntp-maintainers] Bug#820470: ntp: upstream version ntp-4.2.8p6

2016-05-24 Thread Nicholas Luedtke
This might be potentially closed with updates to the package in stretch.

-- 
Nicholas Luedtke
HPE Linux, Hewlett-Packard Enterprise



signature.asc
Description: OpenPGP digital signature


Bug#794615: 794615

2015-08-04 Thread Nicholas Luedtke

 The link is incorrect. But the text indicates the correct url.
sourceforge.net/projects/ovaldi

-- Nicholas Luedtke Linux for HP Helion OpenStack, Hewlett-Packard


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#738199: 738199

2015-08-04 Thread Nicholas Luedtke

Is this still an ongoing issue?

As I am looking at bringing the MITRE Oval Interpreter (ovaldi) up to 
speed for Debian (by modifying and packaging) I am noticing that there 
have been no OVAL Definitions from Debian for quite some time. I can put 
forth some time in to looking at this, if it is something the community 
would utilize.


Additionally, who in the past has been involved in 
submitting/maintaining the Debian OVAL Repository?


--
Nicholas Luedtke
Linux for HP Helion OpenStack, Hewlett-Packard


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#794615: ITP: ovaldi -- Oval Interpreter

2015-08-04 Thread Nicholas Luedtke

Package: wnpp
Severity: wishlist

Owner: "Nicholas Luedtke" 

* Package name: ovaldi
  Version : 5.10.1.7
  Upstream Author : The MITRE Corporation
* URL : sourceforge.net/projects/ovaldi 
<http://en.gpcf.eu/2048>

* License : MITRE
  Programming Lang: CPP
  Description : Oval Intreperter

The OVAL Interpreter is a freely available reference implementation that 
demonstrates the evaluation of OVAL Definitions. Based on a set of 
Definitions the Interpreter collects system information, evaluates it, 
and generates a detailed OVAL Results file. It has been developed to 
demonstrate the usability of OVAL Definitions and to ensure correct 
syntax and adherence to the OVAL Schemas by definition writers.


IMPORTANT: Please note that the OVAL Interpreter is not an enterprise 
scanning tool; it is a simplistic, command-line interface that has the 
ability to execute OVAL Content on an end system.


ovaldi was previously listed in debian packages but was removed. I have 
simply taken the upstream source, cleaned it, prepared it for debian, 
and packaged it.


--
Nicholas Luedtke
Linux for HP Helion OpenStack, Hewlett-Packard


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#794604: TAG: ovaldi -- Oval Intreperter

2015-08-04 Thread Nicholas Luedtke

Package: wnpp
Severity: wishlist

Owner: "Nicholas Luedtke" 

* Package name: ovaldi
  Version : 5.10.1.7
  Upstream Author : The MITRE Corporation
* URL : sourceforge.net/projects/ovaldi <http://en.gpcf.eu/2048>
* License : MITRE
  Programming Lang: CPP
  Description : Oval Intreperter

The OVAL Interpreter is a freely available reference implementation that 
demonstrates the evaluation of OVAL Definitions. Based on a set of 
Definitions the Interpreter collects system information, evaluates it, 
and generates a detailed OVAL Results file. It has been developed to 
demonstrate the usability of OVAL Definitions and to ensure correct 
syntax and adherence to the OVAL Schemas by definition writers.


IMPORTANT: Please note that the OVAL Interpreter is not an enterprise 
scanning tool; it is a simplistic, command-line interface that has the 
ability to execute OVAL Content on an end system.


ovaldi was previously listed in debian packages but was removed. I have 
simply taken the upstream source, cleaned it, prepared it for debian, 
and packaged it.



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#825964: libconfig watch file produces incomplete output

2016-05-31 Thread Nicholas Luedtke
Package: libconfig
Version: 1.5-0.2
Tags: patch

The watch file for libconfig fails to report all upstream versions. This
is because they have moved to a github repo. Attached is a patch to fix
this. Output from uscan is below.

Uscan with current watch file:
/libconfig-1.5$ uscan --report --verbose
-- Scanning for watchfiles in .
-- Found watchfile in ./debian
-- In debian/watch, processing watchfile line:
   http://www.hyperrealm.com/libconfig/index.html
libconfig-(.+)\.tar\.gz
-- Found the following matching hrefs:
 libconfig-1.5.tar.gz (1.5)
Newest version on remote site is 1.5, local version is 1.5
 => Package is up to date
-- Scan finished

Uscan with change:
/libconfig-1.5$ uscan --report --verbose
-- Scanning for watchfiles in .
-- Found watchfile in ./debian
-- In debian/watch, processing watchfile line:
   https://github.com/hyperrealm/libconfig/releases .*v(\d.*)\.tar\.gz
-- Found the following matching hrefs:
 /hyperrealm/libconfig/archive/v1.6.tar.gz (1.6)
 /hyperrealm/libconfig/archive/v1.5.tar.gz (1.5)
Newest version on remote site is 1.6, local version is 1.5
 => Newer version available from
https://github.com/hyperrealm/libconfig/archive/v1.6.tar.gz
-- Scan finished

-- 
Nicholas Luedtke
HPE Linux, Hewlett-Packard Enterprise
diff -urN /libconfig-1.5/debian/watch /libconfig-1.5/debian/watch
--- /libconfig-1.5/debian/watch	2016-05-31 13:03:47.450249132 -0600
+++ /libconfig-1.5/debian/watch	2016-05-31 13:07:01.654247699 -0600
@@ -1,5 +1,3 @@
 version=3
 
-# Full-site-with-pattern  [Version  [Action]]
-http://www.hyperrealm.com/libconfig/index.html \
-	libconfig-(.+)\.tar\.gz
+https://github.com/hyperrealm/libconfig/releases .*v(\d.*)\.tar\.gz


signature.asc
Description: OpenPGP digital signature


Bug#822997: Fix debian/watch for openssh

2016-04-29 Thread Nicholas Luedtke
Package: openssh
Version: 1:7.2p2-4
Tags: patch

The watch file for openssh has recently stop working possibly due to a
change in the upstream site. Switching from ftp to http solves this
issue. Output from uscan is below and patch is attached.

Uscan with current watchfile:
/openssh-7.2p2$ uscan --report --verbose
-- Scanning for watchfiles in .
-- Found watchfile in ./debian
-- In debian/watch, processing watchfile line:
   opts=pgpsigurlmangle=s/$/.asc/
ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-(.*)\.tar\.gz
uscan warning: In watchfile debian/watch, reading FTP directory
  ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/ failed: 503
Service Unavailable
-- Scan finished

Uscan with change:
/openssh-7.2p2$ uscan --report --verbose
-- Scanning for watchfiles in .
-- Found watchfile in ./debian
-- In debian/watch, processing watchfile line:
   opts=pgpsigurlmangle=s/$/.asc/
http://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-(.*)\.tar\.gz
-- Found the following matching hrefs:
 openssh-2.1.1p4.tar.gz (2.1.1p4)
 openssh-2.2.0p1.tar.gz (2.2.0p1)
 openssh-2.3.0p1.tar.gz (2.3.0p1)
 openssh-2.5.1p1.tar.gz (2.5.1p1)
 openssh-2.5.1p2.tar.gz (2.5.1p2)
 openssh-2.5.2p1.tar.gz (2.5.2p1)
 openssh-2.5.2p2.tar.gz (2.5.2p2)
 openssh-2.9.9p1.tar.gz (2.9.9p1)
 ...
 openssh-7.0p1.tar.gz (7.0p1)
 openssh-7.1p1.tar.gz (7.1p1)
 openssh-7.1p2.tar.gz (7.1p2)
 openssh-7.2p1.tar.gz (7.2p1)
 openssh-7.2p2.tar.gz (7.2p2)
Newest version on remote site is 7.2p2, local version is 7.2p2
 => Package is up to date
-- Scan finished


-- 
Nicholas Luedtke
HPE Linux, Hewlett-Packard Enterprise
diff -urN openssh-7.2p2/debian/watch openssh-7.2p2/debian/watch
--- openssh-7.2p2/debian/watch	2016-04-29 13:29:14.907535336 -0600
+++ openssh-7.2p2/debian/watch	2016-04-29 13:29:48.131535091 -0600
@@ -1,3 +1,3 @@
 version=3
 opts=pgpsigurlmangle=s/$/.asc/ \
-ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-(.*)\.tar\.gz
+http://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-(.*)\.tar\.gz


signature.asc
Description: OpenPGP digital signature


Bug#823269: Fix debian/watch for ntp

2016-05-02 Thread Nicholas Luedtke
Package: ntp
Version: 1:4.2.8p4+dfsg-3
Tags: patch

The watch file for ntp fails to report all upstream versions. Attached
is a patch to fix this. Output from uscan is below.

Uscan with current watchfile:
/ntp-4.2.8p4+dfsg$ uscan --report --verbose
-- Scanning for watchfiles in .
-- Found watchfile in ./debian
-- In debian/watch, processing watchfile line:
   opts=dversionmangle=s/\+dfsg(\.\d+)?$//;s/\.p/p/
http://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-([0-9.p]+)\.tar\.gz
-- Found the following matching hrefs:
 ntp-4.2.8p3.tar.gz (4.2.8p3)
 ntp-4.2.8p3.tar.gz (4.2.8p3)
Newest version on remote site is 4.2.8p3, local version is 4.2.8p4+dfsg
 (mangled local version number 4.2.8p4)
 => remote site does not even have current version
-- Scan finished


Uscan with change:
/ntp-4.2.8p4+dfsg$ uscan --report --verbose
-- Scanning for watchfiles in .
-- Found watchfile in ./debian
-- In debian/watch, processing watchfile line:
   opts=dversionmangle=s/\+dfsg(\.\d+)?$//;s/\.p/p/
https://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-4.2
ntp-(.+)\.(?:zip|tgz|tbz|txz|(?:tar\.(?:gz|bz2|xz)))
-- Found the following matching hrefs:
 ntp-4.2.0.tar.gz (4.2.0)
 ntp-4.2.0.tar.gz (4.2.0)
 ntp-4.2.2.tar.gz (4.2.2)
 ntp-4.2.2.tar.gz (4.2.2)
 ntp-4.2.2p1.tar.gz (4.2.2p1)
 ntp-4.2.2p1.tar.gz (4.2.2p1)
 ntp-4.2.2p2.tar.gz (4.2.2p2)
 ...
 ntp-4.2.8p4.tar.gz (4.2.8p4)
 ntp-4.2.8p4.tar.gz (4.2.8p4)
 ntp-4.2.8p5.tar.gz (4.2.8p5)
 ntp-4.2.8p5.tar.gz (4.2.8p5)
 ntp-4.2.8p6.tar.gz (4.2.8p6)
 ntp-4.2.8p6.tar.gz (4.2.8p6)
 ntp-4.2.8p7.tar.gz (4.2.8p7)
 ntp-4.2.8p7.tar.gz (4.2.8p7)
Newest version on remote site is 4.2.8p7, local version is 4.2.8p4+dfsg
 (mangled local version number 4.2.8p4)
 => Newer version available from

https://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-4.2/ntp-4.2.8p7.tar.gz
-- Scan finished

-- 
Nicholas Luedtke
HPE Linux, Hewlett-Packard Enterprise
diff -urN ntp-4.2.8p4+dfsg/debian/watch ntp-4.2.8p4+dfsg/debian/watch
--- ntp-4.2.8p4+dfsg/debian/watch	2016-05-02 13:41:54.097617470 -0600
+++ ntp-4.2.8p4+dfsg/debian/watch	2016-05-02 13:37:07.793619582 -0600
@@ -1,3 +1,3 @@
 version=3
 opts=dversionmangle=s/\+dfsg(\.\d+)?$//;s/\.p/p/ \
-http://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-([0-9.p]+)\.tar\.gz
+https://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-4.2 ntp-(.+)\.(?:zip|tgz|tbz|txz|(?:tar\.(?:gz|bz2|xz)))


signature.asc
Description: OpenPGP digital signature


Bug#777854: Patch for GCC5 build issue

2015-07-23 Thread Nicholas Luedtke

tags 777854 + patch
thanks

Here's a fix for the GCC 5 build issue. Change extern inline to static 
to prevent redefinition. The package builds and links with GCC5  with 
this change.


Upstream may prefer to move to C99 instead, please see section
"Different semantics for inline functions" at
https://gcc.gnu.org/gcc-5/porting_to.html for more background.

--
Nicholas Luedtke
Linux for HP Helion OpenStack, Hewlett-Packard
Description: Fixes GCC5 build issue.
 Change extern inline function to static to prevent redefinition isseue.
 .
 freecraft (1:1.20-1.2) UNRELEASED; urgency=medium
 .
   * Non-maintainer upload.
   * Fixes GCC5 build issue.
Author: 'Nicholas Luedtke 

---
The information above should follow the Patch Tagging Guidelines, please
checkout http://dep.debian.net/deps/dep3/ to learn about the format. Here
are templates for supplementary fields that you might want to add:

Origin: , 
Bug: 
Bug-Debian: https://bugs.debian.org/
Bug-Ubuntu: https://launchpad.net/bugs/
Forwarded: 
Reviewed-By: 
Last-Update: 

--- freecraft-1.20.orig/src/libmodplug/stdafx.h
+++ freecraft-1.20/src/libmodplug/stdafx.h
@@ -86,7 +86,7 @@ inline void ProcessPlugins(int n) {}
 
 #include 
 
-extern inline long MulDiv (long a, long b, long c)
+static inline long MulDiv (long a, long b, long c)
 {
   // if (!c) return 0;
   return ((unsigned long long) a * (unsigned long long) b ) / c;


Bug#790295: Unable to reproduce error

2015-07-25 Thread Nicholas Luedtke

tags 790295 + unreproducible
thanks

This package builds fine for me with sid/gcc5 from experimental.

--
Nicholas Luedtke
Linux for HP Helion OpenStack, Hewlett-Packard


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#777837: Patch for GCC5 build issue

2015-07-15 Thread Nicholas Luedtke

tags 777837 + patch
thanks

Here's a fix for the GCC 5 build issue. I added "extern" to
inline function in jcode.c. The package builds and links with GCC 5 with 
this change.


Upstream may prefer to move to C99 instead, please see section
"Different semantics for inline functions" at
https://gcc.gnu.org/gcc-5/porting_to.html for more background.

--
Nicholas Luedtke
Linux for HP Helion OpenStack, Hewlett-Packard
--- ebview-0.3.6.2/src/jcode.c	2015-07-15 18:49:36.866726205 +
+++ jcode.c	2015-07-15 18:48:09.530726966 +
@@ -275,7 +275,7 @@
 	return(result);
 }
 
-inline gboolean isjisp(const gchar *buff){
+extern inline gboolean isjisp(const gchar *buff){
 g_assert(buff != NULL);
 
 if((buff[0] >= 0x21) && (buff[0] <= 0x74) &&


Bug#777907: Patch for GCC5 build issue

2015-07-15 Thread Nicholas Luedtke

tags 777907 + patch
thanks

Here's a fix for the GCC 5 build issue. Removed "extern" from
inline functions in hunt.h. The package builds and links with GCC 5 with 
this change.


Upstream may prefer to move to C99 instead, please see section
"Different semantics for inline functions" at
https://gcc.gnu.org/gcc-5/porting_to.html for more background.

--
Nicholas Luedtke
Linux for HP Helion OpenStack, Hewlett-Packard
--- ../hunt.h	2015-07-15 20:47:03.634664806 +
+++ hunt.h	2015-07-15 20:47:43.506664459 +
@@ -291,20 +291,20 @@
 #define TCP_HDR_LENGTH(tcph) ((tcph)->doff << 2)
 
 
-extern inline unsigned int generate_key(unsigned long saddr, unsigned long daddr,
+inline unsigned int generate_key(unsigned long saddr, unsigned long daddr,
 			   unsigned short source, unsigned short dest)
 {
 	return saddr + daddr + source + dest;
 }
 
 #if 0
-extern inline unsigned int generate_key_from_packet(struct packet *p)
+inline unsigned int generate_key_from_packet(struct packet *p)
 {
 	return generate_key(ntohl(p->p_iph->saddr), ntohl(p->p_iph->daddr),
 		ntohs(p->p_hdr.p_tcph->source), ntohs(p->p_hdr.p_tcph->dest));
 }
 #endif
-extern inline unsigned int uci_generate_key(struct user_conn_info *uci)
+inline unsigned int uci_generate_key(struct user_conn_info *uci)
 {
 	return generate_key(ntohl(uci->src_addr), ntohl(uci->dst_addr),
 		ntohs(uci->src_port), ntohs(uci->dst_port));


Bug#778051: Patch for GCC5 build issue.

2015-07-15 Thread Nicholas Luedtke

tags 778051 + patch
thanks

Here's a fix for the GCC 5 build issue. Added "extern" to
inline functions in stuff.c . The package builds and links with GCC 5 
with this change.


Upstream may prefer to move to C99 instead, please see section
"Different semantics for inline functions" at
https://gcc.gnu.org/gcc-5/porting_to.html for more background.

--
Nicholas Luedtke
Linux for HP Helion OpenStack, Hewlett-Packard
Description: Fixed GCC5 build issue.
 ADD "extern" to xpart and ypart functions
 .
 overgod (1.0-4.1) UNRELEASED; urgency=medium
 .
   * Non-maintainer upload.
   * Fixed Gcc5 build issue. (closes 778051)
Author: Nicholas Luedtke 

---
The information above should follow the Patch Tagging Guidelines, please
checkout http://dep.debian.net/deps/dep3/ to learn about the format. Here
are templates for supplementary fields that you might want to add:

Origin: , 
Bug: 
Bug-Debian: https://bugs.debian.org/
Bug-Ubuntu: https://launchpad.net/bugs/
Forwarded: 
Reviewed-By: 
Last-Update: 

Index: overgod-1.0/stuff.c
===
--- overgod-1.0.orig/stuff.c
+++ overgod-1.0/stuff.c
@@ -51,7 +51,6 @@ float decoy_table [ANGLE_FULL]; // not u
 float cos_table [ANGLE_FULL];
 float sin_table [ANGLE_FULL];
 
-inline int xpart(int angle, int length);
 
 void init_trig(void)
 {
@@ -66,13 +65,13 @@ void init_trig(void)
  
 }
 
-inline int xpart(int angle, int length)
+extern inline int xpart(int angle, int length)
 {
 // return (lcos(angle) * length);// / ANGLE_FULL;
  return (cos_table [angle & 1023] * length);// / ANGLE_FULL;
 }
 
-inline int ypart(int angle, int length)
+extern inline int ypart(int angle, int length)
 {
  return (sin_table [angle & 1023] * length);// / ANGLE_FULL;
 }


Bug#778151: Patch for GCC5 build error

2015-07-17 Thread Nicholas Luedtke

tags 778151 + patch
thanks

Here's a fix for the GCC 5 build issue. I added "extern" to
inline function in render.c. The package builds and links with GCC 5 
with this change.


Upstream may prefer to move to C99 instead, please see section
"Different semantics for inline functions" at
https://gcc.gnu.org/gcc-5/porting_to.html for more background.

--
Nicholas Luedtke
Linux for HP Helion OpenStack, Hewlett-Packard
Description: Fixes GCC5 build error
 TODO: ADD extern to put_pixel to conform to the gnu99 std.
 .
 tuxonice-userui (1.1+dfsg1.gc3bdd83-3.1) UNRELEASED; urgency=medium
 .
   * Non-maintainer upload.
   * Fixed GCC5 build error.
Author: Nicholas Luedtke

---
The information above should follow the Patch Tagging Guidelines, please
checkout http://dep.debian.net/deps/dep3/ to learn about the format. Here
are templates for supplementary fields that you might want to add:

Origin: , 
Bug: 
Bug-Debian: https://bugs.debian.org/
Bug-Ubuntu: https://launchpad.net/bugs/
Forwarded: 
Reviewed-By: 
Last-Update: 

--- tuxonice-userui-1.1+dfsg1.gc3bdd83.orig/fbsplash/render.c
+++ tuxonice-userui-1.1+dfsg1.gc3bdd83/fbsplash/render.c
@@ -45,7 +45,7 @@ void render_icon(icon *ticon, u8 *target
 	}
 }
 
-inline void put_pixel (u8 a, u8 r, u8 g, u8 b, u8 *src, u8 *dst, u8 add)
+extern inline void put_pixel (u8 a, u8 r, u8 g, u8 b, u8 *src, u8 *dst, u8 add)
 {
 	if (fb_opt) {
 		if (a != 255) {


Bug#778146: Patch for GCC5 build issue

2015-07-17 Thread Nicholas Luedtke

tags 778145 + patch
thanks

Here's a fix for the GCC 5 build issue. Removed inline from function 
signatures to work with test cases. The package builds and links with 
GCC 5 with this change.


Upstream may prefer to move to C99 instead, please see section
"Different semantics for inline functions" at
https://gcc.gnu.org/gcc-5/porting_to.html for more background.

--
Nicholas Luedtke
Linux for HP Helion OpenStack, Hewlett-Packard
Description: Fixxed GCC5 build issue
 Removed inline from problematic functions.
 .
 tinyscheme (1.41-1.1) UNRELEASED; urgency=medium
 .
   * Non-maintainer upload.
   * Fixed GCC5 build issue.
Author: Nicholas Luedtke 

---
The information above should follow the Patch Tagging Guidelines, please
checkout http://dep.debian.net/deps/dep3/ to learn about the format. Here
are templates for supplementary fields that you might want to add:

Origin: , 
Bug: 
Bug-Debian: https://bugs.debian.org/
Bug-Ubuntu: https://launchpad.net/bugs/
Forwarded: 
Reviewed-By: 
Last-Update: 

--- tinyscheme-1.41.orig/scheme.c
+++ tinyscheme-1.41/scheme.c
@@ -200,8 +200,8 @@ INTERFACE double rvalue(pointer p){
 INTERFACE  long charvalue(pointer p)  { return ivalue_unchecked(p); }
 
 INTERFACE INLINE int is_port(pointer p) { return (type(p)==T_PORT); }
-INTERFACE INLINE int is_inport(pointer p)  { return is_port(p) && p->_object._port->kind & port_input; }
-INTERFACE INLINE int is_outport(pointer p) { return is_port(p) && p->_object._port->kind & port_output; }
+INTERFACE int is_inport(pointer p)  { return is_port(p) && p->_object._port->kind & port_input; }
+INTERFACE int is_outport(pointer p) { return is_port(p) && p->_object._port->kind & port_output; }
 
 INTERFACE INLINE int is_pair(pointer p) { return (type(p)==T_PAIR); }
 #define car(p)   ((p)->_object._cons._car)
@@ -226,7 +226,7 @@ INTERFACE INLINE char *syntaxname(pointe
 static const char *procname(pointer x);
 
 INTERFACE INLINE int is_closure(pointer p)  { return (type(p)==T_CLOSURE); }
-INTERFACE INLINE int is_macro(pointer p){ return (type(p)==T_MACRO); }
+INTERFACE int is_macro(pointer p){ return (type(p)==T_MACRO); }
 INTERFACE INLINE pointer closure_code(pointer p)   { return car(p); }
 INTERFACE INLINE pointer closure_env(pointer p){ return cdr(p); }
 


Bug#777907: Patch for GCC build issue.

2015-07-20 Thread Nicholas Luedtke

tags 777907 + patch
thanks

Even simpler change that preserves the build integrity with GCC4.9. The 
package builds and links with GCC 5 with this change.


Upstream may prefer to move to C99 instead, please see section
"Different semantics for inline functions" at
https://gcc.gnu.org/gcc-5/porting_to.html for more background.

--
Nicholas Luedtke
Linux for HP Helion OpenStack, Hewlett-Packard
diff -urN hunt-1.5.orig/Makefile hunt-1.5/Makefile
--- hunt-1.5.orig/Makefile	2015-07-20 14:37:07.965162235 +
+++ hunt-1.5/Makefile	2015-07-20 14:37:32.713162020 +
@@ -1,4 +1,4 @@
-CFLAGS=-Wall -O2 -g -D_REENTRANT
+CFLAGS=-Wall -O2 -g -D_REENTRANT -std=gnu89
 #CFLAGS+=-DSYNC_FAST
 #CFLAGS+=-D_WITH_LINUX_KERNEL_HDR
 


Bug#777835: Unreproducible error.

2015-07-20 Thread Nicholas Luedtke

tags 777835 + unreproducible
thanks

This package also builds fine for me with sid/gcc5 from experimental.

--
Nicholas Luedtke
Linux for HP Helion OpenStack, Hewlett-Packard


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#814363: Fix debian/watch for multipath-tools

2016-02-10 Thread Nicholas Luedtke
Package: multipath-tools
Version: 0.5.0+git1.656f8865-1


The watch file is broken.  Below is the error message received when
using the watch file. Seems like the page is no longer accessible?

-- Scanning for watchfiles in .
-- Found watchfile in ./debian
-- In debian/watch, processing watchfile line:

http://christophe.varoqui.free.fr/multipath-tools/multipath-tools-([\d\.]*)\.tar\.bz2
uscan warning: In watchfile debian/watch, reading webpage
  http://christophe.varoqui.free.fr/multipath-tools/ failed: 403 Forbidden
-- Scan finished


-- 
Nicholas Luedtke
Linux for HP Helion OpenStack, Hewlett-Packard Enterprise



signature.asc
Description: OpenPGP digital signature


Bug#814363: Fix debian/watch for multipath-tools

2016-02-17 Thread Nicholas Luedtke
tags 814363 + patch

On 02/11/2016 01:07 AM, Ritesh Raj Sarraf wrote:
> On Wed, 2016-02-10 at 13:09 -0700, Nicholas Luedtke wrote:
>> Package: multipath-tools
>> Version: 0.5.0+git1.656f8865-1
>>
>>
>> The watch file is broken.  Below is the error message received when
>> using the watch file. Seems like the page is no longer accessible?
>>
>> -- Scanning for watchfiles in .
>> -- Found watchfile in ./debian
>> -- In debian/watch, processing watchfile line:
>>
>> http://christophe.varoqui.free.fr/multipath-tools/multipath-tools-([\
>> d\.]*)\.tar\.bz2
>> uscan warning: In watchfile debian/watch, reading webpage
>>   http://christophe.varoqui.free.fr/multipath-tools/ failed: 403
>> Forbidden
>> -- Scan finished
> 
> I actually had a more hilarious result looking at the upstream link,
> after your bug report.
> 
> “Your requested URL has been blocked as per the directions received
> from Department of Telecommunications, Government of India. Please
> contact administrator for more information.”
> 
> 
> Joke aside, in case of multipath-tools, it shouldn't matter. The
> upstream releases are very slow. And these days most of the management
> work is done in the git repo.
> 
> If you want you can send me a patch tracking the git repo's tags.
> 
> 

Thats an even better result for sure!

Attached is a patch for the watch file, but using uscan I think there is
a bug which processes '-' before '+' in version comparison...

-- 
Nicholas Luedtke
Linux for HP Helion OpenStack, Hewlett-Packard Enterprise
diff -urN multipath-tools-0.5.0+git1.656f8865/debian/watch multipath-tools-0.5.0+git1.656f8865/debian/watch
--- multipath-tools-0.5.0+git1.656f8865/debian/watch	2016-02-17 10:33:02.600866345 -0700
+++ multipath-tools-0.5.0+git1.656f8865/debian/watch	2016-02-17 10:33:42.684866049 -0700
@@ -1,3 +1,4 @@
 # format version number, currently 3; this line is compulsory!
 version=3
-http://christophe.varoqui.free.fr/multipath-tools/multipath-tools-([\d\.]*)\.tar\.bz2
+opts=uversionmangle=s/%2b/+/g \
+http://anonscm.debian.org/cgit/pkg-lvm/multipath-tools.git/refs .*debian/(.+)


signature.asc
Description: OpenPGP digital signature


Bug#813628: Fix debian/watch for rabbitmq

2016-02-03 Thread Nicholas Luedtke
Package: rabbitmq-server
Version: 3.5.7-1
Tags: patch

The watch file is broken.  Attached below is a patch to reflect the
current layout.

-- 
Nicholas Luedtke
Linux for HP Helion OpenStack, Hewlett-Packard Enterprise
diff -Nru rabbitmq-server-3.5.7/debian/watch rabbitmq-server-3.5.7/debian/watch
--- rabbitmq-server-3.5.7/debian/watch	2016-02-03 13:21:41.365715596 -0700
+++ rabbitmq-server-3.5.7/debian/watch	2016-02-03 13:24:22.665714406 -0700
@@ -1,2 +1,2 @@
 version=3
-http://www.rabbitmq.com/releases/rabbitmq-server/v(.*)/rabbitmq-server-(\d.*)\.tar\.gz
+http://www.rabbitmq.com/releases/rabbitmq-server/v(.*)/rabbitmq-server_(\d.*)\.orig\.tar\.xz


signature.asc
Description: OpenPGP digital signature


Bug#812135: Systemd debian/watch not correct

2016-01-20 Thread Nicholas Luedtke
Package: systemd
Version: 215-17+deb8u2
Severity: minor
Tags: jessie

The debian/watch file does not reflect the current upstream source. This
could lead to a user using uscan think that he/she is more up to date
than he/she actually is.

Current debian/watch:
version=3
http://www.freedesktop.org/software/systemd/systemd-(\d+)\.tar\.xz

Correct debian/watch should be:
version=3
opts=filenamemangle=s/.+\/v?(\d\S*)\.tar\.gz/systemd-$1\.tar\.gz/ \
  https://github.com/systemd/systemd/tags .*/v?(\d\S*)\.tar\.gz


-- 
Nicholas Luedtke
Linux for HP Helion OpenStack, Hewlett-Packard Enterprise



signature.asc
Description: OpenPGP digital signature


Bug#860183: Oval Def Generator incorrectly narrowing definitions

2017-04-12 Thread Nicholas Luedtke
Package: security.debian.org

Currently the oval generator is hard coded to set jessie to correspond
to version 8.2.

This causes the following test for Jessie:

8.2

On the following object:

/etcdebian_version\d\.\d

Therefore any Jessie system that is not running the 8.2 point release
will cause the test to result as not applicable when it actually does
apply. The likely fix here is to change the pattern match on the obj:1
test to be ^\d to only grab the first digit (later can be modified to
grab the all the digits before the first dot). This issue is not just
found in the Jessie Oval tests because we hard code all the versions
with the DEBIAN_VERSIONS variable in generate.py. This means we will
need to change those to just correspond to the debian release and not
the point release. This may create another issue where sarge and woody
both have the major version of "3". Not sure if we even care about oval
defs for sarge/woody though...

-- 
Nicholas Luedtke
HPE Linux Security, Hewlett-Packard Enterprise



signature.asc
Description: OpenPGP digital signature


Bug#860183: Oval Def Generator incorrectly narrowing definitions

2017-04-13 Thread Nicholas Luedtke
I submitted a pull request on github to fix this issue with the
following diff. This should close out this bug.

https://github.com/sdelafond/debian-oval/pull/2


diff --git a/generate.py b/generate.py
index b63ab6e..98dcf80 100644
--- a/generate.py
+++ b/generate.py
@@ -23,9 +23,9 @@ from oval.parser import wml
 ovals = {}
 
 # TODO: these may need changed or reworked.
-DEBIAN_VERSION = {"wheezy" : "7.0", "jessie" : "8.2", "stretch" : "9.0",
-  "sid" : "9.0", "etch" : "4.0", "squeeze":"6.0",
"lenny":"5.0",
-  "woody" : "3.0", "potato" : "2.2", "sarge" : "3.1"}
+DEBIAN_VERSION = {"wheezy" : "7", "jessie" : "8", "stretch" : "9",
+  "sid" : "9", "etch" : "4", "squeeze":"6", "lenny":"5",
+  "woody" : "3", "potato" : "2", "sarge" : "3"}
 
 def usage (prog = "parse-wml-oval.py"):
 """Print information about script flags and options"""
diff --git a/oval/definition/generator.py b/oval/definition/generator.py
index 7c60cca..5e78f60 100644
--- a/oval/definition/generator.py
+++ b/oval/definition/generator.py
@@ -214,7 +214,7 @@ def __createOVALTextfilecontentState (value,
operation = "equals"):
   attrs={"id":stateId,
 "version":"1",

"xmlns":"http://oval.mitre.org/XMLSchema/oval-definitions-5#independent"})
-state.appendChild ( __createXMLElement ("line", value,
+state.appendChild ( __createXMLElement ("subexpression", value,
 {"operation":operation}))
 states.appendChild (state)
  
@@ -249,7 +249,7 @@ def __createTest(testType, value):
 ref = __getNewId("test")

 if testType == "release":
-  objectId = __createOVALTextfilecontentObject ("\d\.\d")
+  objectId = __createOVALTextfilecontentObject ("(\d)\.\d")
   comment = "Debian GNU/Linux %s is installed" % value
  
   test = __createXMLElement("textfilecontent_test",


-- 
Nicholas Luedtke
HPE Linux Security, Hewlett-Packard Enterprise




signature.asc
Description: OpenPGP digital signature


Bug#820470: in Debian now

2016-07-29 Thread Nicholas Luedtke
fixed 820470 1:4.2.8p8+dfsg-1

-- 
Nicholas Luedtke
HPE Linux, Hewlett-Packard Enterprise



signature.asc
Description: OpenPGP digital signature


Bug#796111: [Pkg-libvirt-maintainers] Bug#796111: CVE-2015-5160

2016-04-08 Thread Nicholas Luedtke
Hi,

QEMU seems to be fixed enough to allow a fix for libvirt to go forward.

https://bugzilla.redhat.com/show_bug.cgi?id=1245647
https://lists.gnu.org/archive/html/qemu-devel/2016-02/msg01624.html


-- 
Nicholas Luedtke
HPE Linux, Hewlett-Packard Enterprise



signature.asc
Description: OpenPGP digital signature


Bug#820470: ntp: upstream version ntp-4.2.8p6

2016-04-08 Thread Nicholas Luedtke
Package: ntp
Version: 1:4.2.8p4+dfsg-3
Severity: wishlist

Dear Maintainer,

NTP version ntp-4.2.8p6 is available upstream and includes fixes for 9
CVE's listed below. Though they are mostly minor the cumulative effect
of removing these from our stream would be beneficial. We should
consider updating ntp in sid/stretch to incorporate these security fixes.

http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities

CVEs listed as fixed in upstream:
CVE-2015-8158: Potential Infinite Loop in ntpq
CVE-2015-8138: origin: Zero Origin Timestamp Bypass
CVE-2015-7979: Off-path Denial of Service (DoS) attack on authenticated
broadcast mode
CVE-2015-7978: Stack exhaustion in recursive traversal of restriction list
CVE-2015-7977: reslist NULL pointer dereference
CVE-2015-7976: ntpq saveconfig command allows dangerous characters in
filenames
CVE-2015-7975: nextvar() missing length check
CVE-2015-7974: Skeleton Key: Missing key check allows impersonation
between authenticated peers
CVE-2015-7973: Deja Vu: Replay attack on authenticated broadcast mode


-- 
Nicholas Luedtke
HPE Linux, Hewlett-Packard Enterprise



signature.asc
Description: OpenPGP digital signature


Bug#820470: [pkg-ntp-maintainers] Bug#820470: ntp: upstream version ntp-4.2.8p6

2016-04-08 Thread Nicholas Luedtke
> 
> It actually doesn't fix all of them.  I've been waiting for
> upstream to finally fix it, but it seems nothing is happening.
> 
> 
> Kurt
> 

Yeah I noticed that there are a couple in the bug reports that being
claimed as not completely fixed. Is your intent to wait till upstream
closes these out?

-- 
Nicholas Luedtke
HPE Linux, Hewlett-Packard Enterprise



signature.asc
Description: OpenPGP digital signature


Bug#822456: jq: CVE-2016-4074: Stack exhaustion parsing a JSON file

2016-10-03 Thread Nicholas Luedtke
Maintainer,

Upstream hasn't had a release in over a year, any thoughts to applying a
patch for this CVE? Thanks.

-- 
Nicholas Luedtke
HPE Linux Security, Hewlett-Packard Enterprise



signature.asc
Description: OpenPGP digital signature


Bug#802231: jq: CVE-2015-8863: Heap buffer overflow in tokenadd()

2016-10-03 Thread Nicholas Luedtke
Maintainer,

Upstream hasn't had a release in over a year, any thoughts to applying a
patch for this CVE? Thanks.

-- 
Nicholas Luedtke
HPE Linux Security, Hewlett-Packard Enterprise



signature.asc
Description: OpenPGP digital signature


Bug#802231: jq: CVE-2015-8863: Heap buffer overflow in tokenadd()

2016-10-03 Thread Nicholas Luedtke
Maintainer,

Upstream hasn't had a release in over a year, any thoughts to applying a
patch for this CVE? Thanks.

-- 
Nicholas Luedtke
HPE Linux, Hewlett-Packard Enterprise




signature.asc
Description: OpenPGP digital signature


Bug#822456: jq: CVE-2016-4074: Stack exhaustion parsing a JSON file

2016-10-03 Thread Nicholas Luedtke
Maintainer,

Upstream hasn't had a release in over a year, any thoughts to applying a
patch for this CVE? Thanks.

-- 
Nicholas Luedtke
HPE Linux, Hewlett-Packard Enterprise




signature.asc
Description: OpenPGP digital signature


Bug#949554: Incorrect CVE assignment?

2020-01-31 Thread Nicholas Luedtke
I believe this is actually CVE-2020-6621 according the bug page linked.
-Nicholas