Bug#820470: [pkg-ntp-maintainers] Bug#820470: ntp: upstream version ntp-4.2.8p6
This might be potentially closed with updates to the package in stretch. -- Nicholas Luedtke HPE Linux, Hewlett-Packard Enterprise signature.asc Description: OpenPGP digital signature
Bug#794615: 794615
The link is incorrect. But the text indicates the correct url. sourceforge.net/projects/ovaldi -- Nicholas Luedtke Linux for HP Helion OpenStack, Hewlett-Packard -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#738199: 738199
Is this still an ongoing issue? As I am looking at bringing the MITRE Oval Interpreter (ovaldi) up to speed for Debian (by modifying and packaging) I am noticing that there have been no OVAL Definitions from Debian for quite some time. I can put forth some time in to looking at this, if it is something the community would utilize. Additionally, who in the past has been involved in submitting/maintaining the Debian OVAL Repository? -- Nicholas Luedtke Linux for HP Helion OpenStack, Hewlett-Packard -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#794615: ITP: ovaldi -- Oval Interpreter
Package: wnpp Severity: wishlist Owner: "Nicholas Luedtke" * Package name: ovaldi Version : 5.10.1.7 Upstream Author : The MITRE Corporation * URL : sourceforge.net/projects/ovaldi <http://en.gpcf.eu/2048> * License : MITRE Programming Lang: CPP Description : Oval Intreperter The OVAL Interpreter is a freely available reference implementation that demonstrates the evaluation of OVAL Definitions. Based on a set of Definitions the Interpreter collects system information, evaluates it, and generates a detailed OVAL Results file. It has been developed to demonstrate the usability of OVAL Definitions and to ensure correct syntax and adherence to the OVAL Schemas by definition writers. IMPORTANT: Please note that the OVAL Interpreter is not an enterprise scanning tool; it is a simplistic, command-line interface that has the ability to execute OVAL Content on an end system. ovaldi was previously listed in debian packages but was removed. I have simply taken the upstream source, cleaned it, prepared it for debian, and packaged it. -- Nicholas Luedtke Linux for HP Helion OpenStack, Hewlett-Packard -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#794604: TAG: ovaldi -- Oval Intreperter
Package: wnpp Severity: wishlist Owner: "Nicholas Luedtke" * Package name: ovaldi Version : 5.10.1.7 Upstream Author : The MITRE Corporation * URL : sourceforge.net/projects/ovaldi <http://en.gpcf.eu/2048> * License : MITRE Programming Lang: CPP Description : Oval Intreperter The OVAL Interpreter is a freely available reference implementation that demonstrates the evaluation of OVAL Definitions. Based on a set of Definitions the Interpreter collects system information, evaluates it, and generates a detailed OVAL Results file. It has been developed to demonstrate the usability of OVAL Definitions and to ensure correct syntax and adherence to the OVAL Schemas by definition writers. IMPORTANT: Please note that the OVAL Interpreter is not an enterprise scanning tool; it is a simplistic, command-line interface that has the ability to execute OVAL Content on an end system. ovaldi was previously listed in debian packages but was removed. I have simply taken the upstream source, cleaned it, prepared it for debian, and packaged it. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#825964: libconfig watch file produces incomplete output
Package: libconfig Version: 1.5-0.2 Tags: patch The watch file for libconfig fails to report all upstream versions. This is because they have moved to a github repo. Attached is a patch to fix this. Output from uscan is below. Uscan with current watch file: /libconfig-1.5$ uscan --report --verbose -- Scanning for watchfiles in . -- Found watchfile in ./debian -- In debian/watch, processing watchfile line: http://www.hyperrealm.com/libconfig/index.html libconfig-(.+)\.tar\.gz -- Found the following matching hrefs: libconfig-1.5.tar.gz (1.5) Newest version on remote site is 1.5, local version is 1.5 => Package is up to date -- Scan finished Uscan with change: /libconfig-1.5$ uscan --report --verbose -- Scanning for watchfiles in . -- Found watchfile in ./debian -- In debian/watch, processing watchfile line: https://github.com/hyperrealm/libconfig/releases .*v(\d.*)\.tar\.gz -- Found the following matching hrefs: /hyperrealm/libconfig/archive/v1.6.tar.gz (1.6) /hyperrealm/libconfig/archive/v1.5.tar.gz (1.5) Newest version on remote site is 1.6, local version is 1.5 => Newer version available from https://github.com/hyperrealm/libconfig/archive/v1.6.tar.gz -- Scan finished -- Nicholas Luedtke HPE Linux, Hewlett-Packard Enterprise diff -urN /libconfig-1.5/debian/watch /libconfig-1.5/debian/watch --- /libconfig-1.5/debian/watch 2016-05-31 13:03:47.450249132 -0600 +++ /libconfig-1.5/debian/watch 2016-05-31 13:07:01.654247699 -0600 @@ -1,5 +1,3 @@ version=3 -# Full-site-with-pattern [Version [Action]] -http://www.hyperrealm.com/libconfig/index.html \ - libconfig-(.+)\.tar\.gz +https://github.com/hyperrealm/libconfig/releases .*v(\d.*)\.tar\.gz signature.asc Description: OpenPGP digital signature
Bug#822997: Fix debian/watch for openssh
Package: openssh Version: 1:7.2p2-4 Tags: patch The watch file for openssh has recently stop working possibly due to a change in the upstream site. Switching from ftp to http solves this issue. Output from uscan is below and patch is attached. Uscan with current watchfile: /openssh-7.2p2$ uscan --report --verbose -- Scanning for watchfiles in . -- Found watchfile in ./debian -- In debian/watch, processing watchfile line: opts=pgpsigurlmangle=s/$/.asc/ ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-(.*)\.tar\.gz uscan warning: In watchfile debian/watch, reading FTP directory ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/ failed: 503 Service Unavailable -- Scan finished Uscan with change: /openssh-7.2p2$ uscan --report --verbose -- Scanning for watchfiles in . -- Found watchfile in ./debian -- In debian/watch, processing watchfile line: opts=pgpsigurlmangle=s/$/.asc/ http://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-(.*)\.tar\.gz -- Found the following matching hrefs: openssh-2.1.1p4.tar.gz (2.1.1p4) openssh-2.2.0p1.tar.gz (2.2.0p1) openssh-2.3.0p1.tar.gz (2.3.0p1) openssh-2.5.1p1.tar.gz (2.5.1p1) openssh-2.5.1p2.tar.gz (2.5.1p2) openssh-2.5.2p1.tar.gz (2.5.2p1) openssh-2.5.2p2.tar.gz (2.5.2p2) openssh-2.9.9p1.tar.gz (2.9.9p1) ... openssh-7.0p1.tar.gz (7.0p1) openssh-7.1p1.tar.gz (7.1p1) openssh-7.1p2.tar.gz (7.1p2) openssh-7.2p1.tar.gz (7.2p1) openssh-7.2p2.tar.gz (7.2p2) Newest version on remote site is 7.2p2, local version is 7.2p2 => Package is up to date -- Scan finished -- Nicholas Luedtke HPE Linux, Hewlett-Packard Enterprise diff -urN openssh-7.2p2/debian/watch openssh-7.2p2/debian/watch --- openssh-7.2p2/debian/watch 2016-04-29 13:29:14.907535336 -0600 +++ openssh-7.2p2/debian/watch 2016-04-29 13:29:48.131535091 -0600 @@ -1,3 +1,3 @@ version=3 opts=pgpsigurlmangle=s/$/.asc/ \ -ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-(.*)\.tar\.gz +http://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-(.*)\.tar\.gz signature.asc Description: OpenPGP digital signature
Bug#823269: Fix debian/watch for ntp
Package: ntp Version: 1:4.2.8p4+dfsg-3 Tags: patch The watch file for ntp fails to report all upstream versions. Attached is a patch to fix this. Output from uscan is below. Uscan with current watchfile: /ntp-4.2.8p4+dfsg$ uscan --report --verbose -- Scanning for watchfiles in . -- Found watchfile in ./debian -- In debian/watch, processing watchfile line: opts=dversionmangle=s/\+dfsg(\.\d+)?$//;s/\.p/p/ http://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-([0-9.p]+)\.tar\.gz -- Found the following matching hrefs: ntp-4.2.8p3.tar.gz (4.2.8p3) ntp-4.2.8p3.tar.gz (4.2.8p3) Newest version on remote site is 4.2.8p3, local version is 4.2.8p4+dfsg (mangled local version number 4.2.8p4) => remote site does not even have current version -- Scan finished Uscan with change: /ntp-4.2.8p4+dfsg$ uscan --report --verbose -- Scanning for watchfiles in . -- Found watchfile in ./debian -- In debian/watch, processing watchfile line: opts=dversionmangle=s/\+dfsg(\.\d+)?$//;s/\.p/p/ https://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-4.2 ntp-(.+)\.(?:zip|tgz|tbz|txz|(?:tar\.(?:gz|bz2|xz))) -- Found the following matching hrefs: ntp-4.2.0.tar.gz (4.2.0) ntp-4.2.0.tar.gz (4.2.0) ntp-4.2.2.tar.gz (4.2.2) ntp-4.2.2.tar.gz (4.2.2) ntp-4.2.2p1.tar.gz (4.2.2p1) ntp-4.2.2p1.tar.gz (4.2.2p1) ntp-4.2.2p2.tar.gz (4.2.2p2) ... ntp-4.2.8p4.tar.gz (4.2.8p4) ntp-4.2.8p4.tar.gz (4.2.8p4) ntp-4.2.8p5.tar.gz (4.2.8p5) ntp-4.2.8p5.tar.gz (4.2.8p5) ntp-4.2.8p6.tar.gz (4.2.8p6) ntp-4.2.8p6.tar.gz (4.2.8p6) ntp-4.2.8p7.tar.gz (4.2.8p7) ntp-4.2.8p7.tar.gz (4.2.8p7) Newest version on remote site is 4.2.8p7, local version is 4.2.8p4+dfsg (mangled local version number 4.2.8p4) => Newer version available from https://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-4.2/ntp-4.2.8p7.tar.gz -- Scan finished -- Nicholas Luedtke HPE Linux, Hewlett-Packard Enterprise diff -urN ntp-4.2.8p4+dfsg/debian/watch ntp-4.2.8p4+dfsg/debian/watch --- ntp-4.2.8p4+dfsg/debian/watch 2016-05-02 13:41:54.097617470 -0600 +++ ntp-4.2.8p4+dfsg/debian/watch 2016-05-02 13:37:07.793619582 -0600 @@ -1,3 +1,3 @@ version=3 opts=dversionmangle=s/\+dfsg(\.\d+)?$//;s/\.p/p/ \ -http://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-([0-9.p]+)\.tar\.gz +https://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-4.2 ntp-(.+)\.(?:zip|tgz|tbz|txz|(?:tar\.(?:gz|bz2|xz))) signature.asc Description: OpenPGP digital signature
Bug#777854: Patch for GCC5 build issue
tags 777854 + patch thanks Here's a fix for the GCC 5 build issue. Change extern inline to static to prevent redefinition. The package builds and links with GCC5 with this change. Upstream may prefer to move to C99 instead, please see section "Different semantics for inline functions" at https://gcc.gnu.org/gcc-5/porting_to.html for more background. -- Nicholas Luedtke Linux for HP Helion OpenStack, Hewlett-Packard Description: Fixes GCC5 build issue. Change extern inline function to static to prevent redefinition isseue. . freecraft (1:1.20-1.2) UNRELEASED; urgency=medium . * Non-maintainer upload. * Fixes GCC5 build issue. Author: 'Nicholas Luedtke --- The information above should follow the Patch Tagging Guidelines, please checkout http://dep.debian.net/deps/dep3/ to learn about the format. Here are templates for supplementary fields that you might want to add: Origin: , Bug: Bug-Debian: https://bugs.debian.org/ Bug-Ubuntu: https://launchpad.net/bugs/ Forwarded: Reviewed-By: Last-Update: --- freecraft-1.20.orig/src/libmodplug/stdafx.h +++ freecraft-1.20/src/libmodplug/stdafx.h @@ -86,7 +86,7 @@ inline void ProcessPlugins(int n) {} #include -extern inline long MulDiv (long a, long b, long c) +static inline long MulDiv (long a, long b, long c) { // if (!c) return 0; return ((unsigned long long) a * (unsigned long long) b ) / c;
Bug#790295: Unable to reproduce error
tags 790295 + unreproducible thanks This package builds fine for me with sid/gcc5 from experimental. -- Nicholas Luedtke Linux for HP Helion OpenStack, Hewlett-Packard -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#777837: Patch for GCC5 build issue
tags 777837 + patch thanks Here's a fix for the GCC 5 build issue. I added "extern" to inline function in jcode.c. The package builds and links with GCC 5 with this change. Upstream may prefer to move to C99 instead, please see section "Different semantics for inline functions" at https://gcc.gnu.org/gcc-5/porting_to.html for more background. -- Nicholas Luedtke Linux for HP Helion OpenStack, Hewlett-Packard --- ebview-0.3.6.2/src/jcode.c 2015-07-15 18:49:36.866726205 + +++ jcode.c 2015-07-15 18:48:09.530726966 + @@ -275,7 +275,7 @@ return(result); } -inline gboolean isjisp(const gchar *buff){ +extern inline gboolean isjisp(const gchar *buff){ g_assert(buff != NULL); if((buff[0] >= 0x21) && (buff[0] <= 0x74) &&
Bug#777907: Patch for GCC5 build issue
tags 777907 + patch thanks Here's a fix for the GCC 5 build issue. Removed "extern" from inline functions in hunt.h. The package builds and links with GCC 5 with this change. Upstream may prefer to move to C99 instead, please see section "Different semantics for inline functions" at https://gcc.gnu.org/gcc-5/porting_to.html for more background. -- Nicholas Luedtke Linux for HP Helion OpenStack, Hewlett-Packard --- ../hunt.h 2015-07-15 20:47:03.634664806 + +++ hunt.h 2015-07-15 20:47:43.506664459 + @@ -291,20 +291,20 @@ #define TCP_HDR_LENGTH(tcph) ((tcph)->doff << 2) -extern inline unsigned int generate_key(unsigned long saddr, unsigned long daddr, +inline unsigned int generate_key(unsigned long saddr, unsigned long daddr, unsigned short source, unsigned short dest) { return saddr + daddr + source + dest; } #if 0 -extern inline unsigned int generate_key_from_packet(struct packet *p) +inline unsigned int generate_key_from_packet(struct packet *p) { return generate_key(ntohl(p->p_iph->saddr), ntohl(p->p_iph->daddr), ntohs(p->p_hdr.p_tcph->source), ntohs(p->p_hdr.p_tcph->dest)); } #endif -extern inline unsigned int uci_generate_key(struct user_conn_info *uci) +inline unsigned int uci_generate_key(struct user_conn_info *uci) { return generate_key(ntohl(uci->src_addr), ntohl(uci->dst_addr), ntohs(uci->src_port), ntohs(uci->dst_port));
Bug#778051: Patch for GCC5 build issue.
tags 778051 + patch thanks Here's a fix for the GCC 5 build issue. Added "extern" to inline functions in stuff.c . The package builds and links with GCC 5 with this change. Upstream may prefer to move to C99 instead, please see section "Different semantics for inline functions" at https://gcc.gnu.org/gcc-5/porting_to.html for more background. -- Nicholas Luedtke Linux for HP Helion OpenStack, Hewlett-Packard Description: Fixed GCC5 build issue. ADD "extern" to xpart and ypart functions . overgod (1.0-4.1) UNRELEASED; urgency=medium . * Non-maintainer upload. * Fixed Gcc5 build issue. (closes 778051) Author: Nicholas Luedtke --- The information above should follow the Patch Tagging Guidelines, please checkout http://dep.debian.net/deps/dep3/ to learn about the format. Here are templates for supplementary fields that you might want to add: Origin: , Bug: Bug-Debian: https://bugs.debian.org/ Bug-Ubuntu: https://launchpad.net/bugs/ Forwarded: Reviewed-By: Last-Update: Index: overgod-1.0/stuff.c === --- overgod-1.0.orig/stuff.c +++ overgod-1.0/stuff.c @@ -51,7 +51,6 @@ float decoy_table [ANGLE_FULL]; // not u float cos_table [ANGLE_FULL]; float sin_table [ANGLE_FULL]; -inline int xpart(int angle, int length); void init_trig(void) { @@ -66,13 +65,13 @@ void init_trig(void) } -inline int xpart(int angle, int length) +extern inline int xpart(int angle, int length) { // return (lcos(angle) * length);// / ANGLE_FULL; return (cos_table [angle & 1023] * length);// / ANGLE_FULL; } -inline int ypart(int angle, int length) +extern inline int ypart(int angle, int length) { return (sin_table [angle & 1023] * length);// / ANGLE_FULL; }
Bug#778151: Patch for GCC5 build error
tags 778151 + patch thanks Here's a fix for the GCC 5 build issue. I added "extern" to inline function in render.c. The package builds and links with GCC 5 with this change. Upstream may prefer to move to C99 instead, please see section "Different semantics for inline functions" at https://gcc.gnu.org/gcc-5/porting_to.html for more background. -- Nicholas Luedtke Linux for HP Helion OpenStack, Hewlett-Packard Description: Fixes GCC5 build error TODO: ADD extern to put_pixel to conform to the gnu99 std. . tuxonice-userui (1.1+dfsg1.gc3bdd83-3.1) UNRELEASED; urgency=medium . * Non-maintainer upload. * Fixed GCC5 build error. Author: Nicholas Luedtke --- The information above should follow the Patch Tagging Guidelines, please checkout http://dep.debian.net/deps/dep3/ to learn about the format. Here are templates for supplementary fields that you might want to add: Origin: , Bug: Bug-Debian: https://bugs.debian.org/ Bug-Ubuntu: https://launchpad.net/bugs/ Forwarded: Reviewed-By: Last-Update: --- tuxonice-userui-1.1+dfsg1.gc3bdd83.orig/fbsplash/render.c +++ tuxonice-userui-1.1+dfsg1.gc3bdd83/fbsplash/render.c @@ -45,7 +45,7 @@ void render_icon(icon *ticon, u8 *target } } -inline void put_pixel (u8 a, u8 r, u8 g, u8 b, u8 *src, u8 *dst, u8 add) +extern inline void put_pixel (u8 a, u8 r, u8 g, u8 b, u8 *src, u8 *dst, u8 add) { if (fb_opt) { if (a != 255) {
Bug#778146: Patch for GCC5 build issue
tags 778145 + patch thanks Here's a fix for the GCC 5 build issue. Removed inline from function signatures to work with test cases. The package builds and links with GCC 5 with this change. Upstream may prefer to move to C99 instead, please see section "Different semantics for inline functions" at https://gcc.gnu.org/gcc-5/porting_to.html for more background. -- Nicholas Luedtke Linux for HP Helion OpenStack, Hewlett-Packard Description: Fixxed GCC5 build issue Removed inline from problematic functions. . tinyscheme (1.41-1.1) UNRELEASED; urgency=medium . * Non-maintainer upload. * Fixed GCC5 build issue. Author: Nicholas Luedtke --- The information above should follow the Patch Tagging Guidelines, please checkout http://dep.debian.net/deps/dep3/ to learn about the format. Here are templates for supplementary fields that you might want to add: Origin: , Bug: Bug-Debian: https://bugs.debian.org/ Bug-Ubuntu: https://launchpad.net/bugs/ Forwarded: Reviewed-By: Last-Update: --- tinyscheme-1.41.orig/scheme.c +++ tinyscheme-1.41/scheme.c @@ -200,8 +200,8 @@ INTERFACE double rvalue(pointer p){ INTERFACE long charvalue(pointer p) { return ivalue_unchecked(p); } INTERFACE INLINE int is_port(pointer p) { return (type(p)==T_PORT); } -INTERFACE INLINE int is_inport(pointer p) { return is_port(p) && p->_object._port->kind & port_input; } -INTERFACE INLINE int is_outport(pointer p) { return is_port(p) && p->_object._port->kind & port_output; } +INTERFACE int is_inport(pointer p) { return is_port(p) && p->_object._port->kind & port_input; } +INTERFACE int is_outport(pointer p) { return is_port(p) && p->_object._port->kind & port_output; } INTERFACE INLINE int is_pair(pointer p) { return (type(p)==T_PAIR); } #define car(p) ((p)->_object._cons._car) @@ -226,7 +226,7 @@ INTERFACE INLINE char *syntaxname(pointe static const char *procname(pointer x); INTERFACE INLINE int is_closure(pointer p) { return (type(p)==T_CLOSURE); } -INTERFACE INLINE int is_macro(pointer p){ return (type(p)==T_MACRO); } +INTERFACE int is_macro(pointer p){ return (type(p)==T_MACRO); } INTERFACE INLINE pointer closure_code(pointer p) { return car(p); } INTERFACE INLINE pointer closure_env(pointer p){ return cdr(p); }
Bug#777907: Patch for GCC build issue.
tags 777907 + patch thanks Even simpler change that preserves the build integrity with GCC4.9. The package builds and links with GCC 5 with this change. Upstream may prefer to move to C99 instead, please see section "Different semantics for inline functions" at https://gcc.gnu.org/gcc-5/porting_to.html for more background. -- Nicholas Luedtke Linux for HP Helion OpenStack, Hewlett-Packard diff -urN hunt-1.5.orig/Makefile hunt-1.5/Makefile --- hunt-1.5.orig/Makefile 2015-07-20 14:37:07.965162235 + +++ hunt-1.5/Makefile 2015-07-20 14:37:32.713162020 + @@ -1,4 +1,4 @@ -CFLAGS=-Wall -O2 -g -D_REENTRANT +CFLAGS=-Wall -O2 -g -D_REENTRANT -std=gnu89 #CFLAGS+=-DSYNC_FAST #CFLAGS+=-D_WITH_LINUX_KERNEL_HDR
Bug#777835: Unreproducible error.
tags 777835 + unreproducible thanks This package also builds fine for me with sid/gcc5 from experimental. -- Nicholas Luedtke Linux for HP Helion OpenStack, Hewlett-Packard -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#814363: Fix debian/watch for multipath-tools
Package: multipath-tools Version: 0.5.0+git1.656f8865-1 The watch file is broken. Below is the error message received when using the watch file. Seems like the page is no longer accessible? -- Scanning for watchfiles in . -- Found watchfile in ./debian -- In debian/watch, processing watchfile line: http://christophe.varoqui.free.fr/multipath-tools/multipath-tools-([\d\.]*)\.tar\.bz2 uscan warning: In watchfile debian/watch, reading webpage http://christophe.varoqui.free.fr/multipath-tools/ failed: 403 Forbidden -- Scan finished -- Nicholas Luedtke Linux for HP Helion OpenStack, Hewlett-Packard Enterprise signature.asc Description: OpenPGP digital signature
Bug#814363: Fix debian/watch for multipath-tools
tags 814363 + patch On 02/11/2016 01:07 AM, Ritesh Raj Sarraf wrote: > On Wed, 2016-02-10 at 13:09 -0700, Nicholas Luedtke wrote: >> Package: multipath-tools >> Version: 0.5.0+git1.656f8865-1 >> >> >> The watch file is broken. Below is the error message received when >> using the watch file. Seems like the page is no longer accessible? >> >> -- Scanning for watchfiles in . >> -- Found watchfile in ./debian >> -- In debian/watch, processing watchfile line: >> >> http://christophe.varoqui.free.fr/multipath-tools/multipath-tools-([\ >> d\.]*)\.tar\.bz2 >> uscan warning: In watchfile debian/watch, reading webpage >> http://christophe.varoqui.free.fr/multipath-tools/ failed: 403 >> Forbidden >> -- Scan finished > > I actually had a more hilarious result looking at the upstream link, > after your bug report. > > “Your requested URL has been blocked as per the directions received > from Department of Telecommunications, Government of India. Please > contact administrator for more information.” > > > Joke aside, in case of multipath-tools, it shouldn't matter. The > upstream releases are very slow. And these days most of the management > work is done in the git repo. > > If you want you can send me a patch tracking the git repo's tags. > > Thats an even better result for sure! Attached is a patch for the watch file, but using uscan I think there is a bug which processes '-' before '+' in version comparison... -- Nicholas Luedtke Linux for HP Helion OpenStack, Hewlett-Packard Enterprise diff -urN multipath-tools-0.5.0+git1.656f8865/debian/watch multipath-tools-0.5.0+git1.656f8865/debian/watch --- multipath-tools-0.5.0+git1.656f8865/debian/watch 2016-02-17 10:33:02.600866345 -0700 +++ multipath-tools-0.5.0+git1.656f8865/debian/watch 2016-02-17 10:33:42.684866049 -0700 @@ -1,3 +1,4 @@ # format version number, currently 3; this line is compulsory! version=3 -http://christophe.varoqui.free.fr/multipath-tools/multipath-tools-([\d\.]*)\.tar\.bz2 +opts=uversionmangle=s/%2b/+/g \ +http://anonscm.debian.org/cgit/pkg-lvm/multipath-tools.git/refs .*debian/(.+) signature.asc Description: OpenPGP digital signature
Bug#813628: Fix debian/watch for rabbitmq
Package: rabbitmq-server Version: 3.5.7-1 Tags: patch The watch file is broken. Attached below is a patch to reflect the current layout. -- Nicholas Luedtke Linux for HP Helion OpenStack, Hewlett-Packard Enterprise diff -Nru rabbitmq-server-3.5.7/debian/watch rabbitmq-server-3.5.7/debian/watch --- rabbitmq-server-3.5.7/debian/watch 2016-02-03 13:21:41.365715596 -0700 +++ rabbitmq-server-3.5.7/debian/watch 2016-02-03 13:24:22.665714406 -0700 @@ -1,2 +1,2 @@ version=3 -http://www.rabbitmq.com/releases/rabbitmq-server/v(.*)/rabbitmq-server-(\d.*)\.tar\.gz +http://www.rabbitmq.com/releases/rabbitmq-server/v(.*)/rabbitmq-server_(\d.*)\.orig\.tar\.xz signature.asc Description: OpenPGP digital signature
Bug#812135: Systemd debian/watch not correct
Package: systemd Version: 215-17+deb8u2 Severity: minor Tags: jessie The debian/watch file does not reflect the current upstream source. This could lead to a user using uscan think that he/she is more up to date than he/she actually is. Current debian/watch: version=3 http://www.freedesktop.org/software/systemd/systemd-(\d+)\.tar\.xz Correct debian/watch should be: version=3 opts=filenamemangle=s/.+\/v?(\d\S*)\.tar\.gz/systemd-$1\.tar\.gz/ \ https://github.com/systemd/systemd/tags .*/v?(\d\S*)\.tar\.gz -- Nicholas Luedtke Linux for HP Helion OpenStack, Hewlett-Packard Enterprise signature.asc Description: OpenPGP digital signature
Bug#860183: Oval Def Generator incorrectly narrowing definitions
Package: security.debian.org Currently the oval generator is hard coded to set jessie to correspond to version 8.2. This causes the following test for Jessie: 8.2 On the following object: /etcdebian_version\d\.\d Therefore any Jessie system that is not running the 8.2 point release will cause the test to result as not applicable when it actually does apply. The likely fix here is to change the pattern match on the obj:1 test to be ^\d to only grab the first digit (later can be modified to grab the all the digits before the first dot). This issue is not just found in the Jessie Oval tests because we hard code all the versions with the DEBIAN_VERSIONS variable in generate.py. This means we will need to change those to just correspond to the debian release and not the point release. This may create another issue where sarge and woody both have the major version of "3". Not sure if we even care about oval defs for sarge/woody though... -- Nicholas Luedtke HPE Linux Security, Hewlett-Packard Enterprise signature.asc Description: OpenPGP digital signature
Bug#860183: Oval Def Generator incorrectly narrowing definitions
I submitted a pull request on github to fix this issue with the following diff. This should close out this bug. https://github.com/sdelafond/debian-oval/pull/2 diff --git a/generate.py b/generate.py index b63ab6e..98dcf80 100644 --- a/generate.py +++ b/generate.py @@ -23,9 +23,9 @@ from oval.parser import wml ovals = {} # TODO: these may need changed or reworked. -DEBIAN_VERSION = {"wheezy" : "7.0", "jessie" : "8.2", "stretch" : "9.0", - "sid" : "9.0", "etch" : "4.0", "squeeze":"6.0", "lenny":"5.0", - "woody" : "3.0", "potato" : "2.2", "sarge" : "3.1"} +DEBIAN_VERSION = {"wheezy" : "7", "jessie" : "8", "stretch" : "9", + "sid" : "9", "etch" : "4", "squeeze":"6", "lenny":"5", + "woody" : "3", "potato" : "2", "sarge" : "3"} def usage (prog = "parse-wml-oval.py"): """Print information about script flags and options""" diff --git a/oval/definition/generator.py b/oval/definition/generator.py index 7c60cca..5e78f60 100644 --- a/oval/definition/generator.py +++ b/oval/definition/generator.py @@ -214,7 +214,7 @@ def __createOVALTextfilecontentState (value, operation = "equals"): attrs={"id":stateId, "version":"1", "xmlns":"http://oval.mitre.org/XMLSchema/oval-definitions-5#independent"}) -state.appendChild ( __createXMLElement ("line", value, +state.appendChild ( __createXMLElement ("subexpression", value, {"operation":operation})) states.appendChild (state) @@ -249,7 +249,7 @@ def __createTest(testType, value): ref = __getNewId("test") if testType == "release": - objectId = __createOVALTextfilecontentObject ("\d\.\d") + objectId = __createOVALTextfilecontentObject ("(\d)\.\d") comment = "Debian GNU/Linux %s is installed" % value test = __createXMLElement("textfilecontent_test", -- Nicholas Luedtke HPE Linux Security, Hewlett-Packard Enterprise signature.asc Description: OpenPGP digital signature
Bug#820470: in Debian now
fixed 820470 1:4.2.8p8+dfsg-1 -- Nicholas Luedtke HPE Linux, Hewlett-Packard Enterprise signature.asc Description: OpenPGP digital signature
Bug#796111: [Pkg-libvirt-maintainers] Bug#796111: CVE-2015-5160
Hi, QEMU seems to be fixed enough to allow a fix for libvirt to go forward. https://bugzilla.redhat.com/show_bug.cgi?id=1245647 https://lists.gnu.org/archive/html/qemu-devel/2016-02/msg01624.html -- Nicholas Luedtke HPE Linux, Hewlett-Packard Enterprise signature.asc Description: OpenPGP digital signature
Bug#820470: ntp: upstream version ntp-4.2.8p6
Package: ntp Version: 1:4.2.8p4+dfsg-3 Severity: wishlist Dear Maintainer, NTP version ntp-4.2.8p6 is available upstream and includes fixes for 9 CVE's listed below. Though they are mostly minor the cumulative effect of removing these from our stream would be beneficial. We should consider updating ntp in sid/stretch to incorporate these security fixes. http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities CVEs listed as fixed in upstream: CVE-2015-8158: Potential Infinite Loop in ntpq CVE-2015-8138: origin: Zero Origin Timestamp Bypass CVE-2015-7979: Off-path Denial of Service (DoS) attack on authenticated broadcast mode CVE-2015-7978: Stack exhaustion in recursive traversal of restriction list CVE-2015-7977: reslist NULL pointer dereference CVE-2015-7976: ntpq saveconfig command allows dangerous characters in filenames CVE-2015-7975: nextvar() missing length check CVE-2015-7974: Skeleton Key: Missing key check allows impersonation between authenticated peers CVE-2015-7973: Deja Vu: Replay attack on authenticated broadcast mode -- Nicholas Luedtke HPE Linux, Hewlett-Packard Enterprise signature.asc Description: OpenPGP digital signature
Bug#820470: [pkg-ntp-maintainers] Bug#820470: ntp: upstream version ntp-4.2.8p6
> > It actually doesn't fix all of them. I've been waiting for > upstream to finally fix it, but it seems nothing is happening. > > > Kurt > Yeah I noticed that there are a couple in the bug reports that being claimed as not completely fixed. Is your intent to wait till upstream closes these out? -- Nicholas Luedtke HPE Linux, Hewlett-Packard Enterprise signature.asc Description: OpenPGP digital signature
Bug#822456: jq: CVE-2016-4074: Stack exhaustion parsing a JSON file
Maintainer, Upstream hasn't had a release in over a year, any thoughts to applying a patch for this CVE? Thanks. -- Nicholas Luedtke HPE Linux Security, Hewlett-Packard Enterprise signature.asc Description: OpenPGP digital signature
Bug#802231: jq: CVE-2015-8863: Heap buffer overflow in tokenadd()
Maintainer, Upstream hasn't had a release in over a year, any thoughts to applying a patch for this CVE? Thanks. -- Nicholas Luedtke HPE Linux Security, Hewlett-Packard Enterprise signature.asc Description: OpenPGP digital signature
Bug#802231: jq: CVE-2015-8863: Heap buffer overflow in tokenadd()
Maintainer, Upstream hasn't had a release in over a year, any thoughts to applying a patch for this CVE? Thanks. -- Nicholas Luedtke HPE Linux, Hewlett-Packard Enterprise signature.asc Description: OpenPGP digital signature
Bug#822456: jq: CVE-2016-4074: Stack exhaustion parsing a JSON file
Maintainer, Upstream hasn't had a release in over a year, any thoughts to applying a patch for this CVE? Thanks. -- Nicholas Luedtke HPE Linux, Hewlett-Packard Enterprise signature.asc Description: OpenPGP digital signature
Bug#949554: Incorrect CVE assignment?
I believe this is actually CVE-2020-6621 according the bug page linked. -Nicholas