[EPEL-devel] Re: [new / help wanted] fence-agents-epel package

2022-08-09 Thread Alex Talaran

rhel 9 ideally.

i was starting with the fedora spec file as i didn't know about needing 
the match. it isnt clear why some of these are not included in the rhel 
package but most are. i tried to search on the fence-agents github and 
bugzilla. does the pve one for instance need something too new for rhel 9?


i only have use for the pve one at the moment, but conversation with 
carl previously here gave the idea just to include them all in case 
others can use them. i am happy to test the version on el9 and it would 
get consistent use.


On 2022-08-08 17:22, Troy Dawson wrote:

Hi Alex,
I've been looking into this some.

What distribution do you want this for?
I haven't seen anywhere in your emails saying if this is for RHEL 8 or 
RHEL 9?
The spec file you have attached is for fence-agents-4.11, which is only 
in Fedora, so that doesn't let me know either.


The major problem is that the fence-agents-pve version has to match the 
fence-agents that is in your version of RHEL.
So for RHEL8 (or compatible) it needs to be version 4.2.1.  For RHEL 9 
it needs to be 4.10.0


We need to start with the correct version of fence-agents and work from 
there.


Troy

On Wed, Jul 27, 2022 at 10:03 AM Alex Talaran > wrote:


i was able to get this built and installable if anyone wants to help
test or maintain it.
an issue exists with the man pages not being built still but im not
sure
how the makefile target works for these so they are excluded for now.

maybe some other small tweaks are still needed too since its just a
(first for me) stripped down and modified upstream spec file.

On 2022-07-20 08:47, Andrew C Aitchison wrote:
 > On Wed, 20 Jul 2022, Alex Talaran wrote:
 >
 >> i ended up with the same error with that change.
 >
 > I am sorry my suggestion did not help.
 > I don't have a Red Hat compatible machine newer that RHEL6
 > (I moved to Ubuntu for work-related reasons)
 > so I am unable to test things myself.
 >
 >> is it possible its getting confused because the dirname in the
tarball
 >> is different than the package name and looking in the wrong spot?
 >
 > The -n fence-agents-%{version} in
 >  %prep
 >  %setup -q -n fence-agents-%{version}
 > is supposed to resolve that, but that setup line might need tweaking
 > to match the contents of the tarball.
 >
 > It is old and may be somewhat dated, but my bible for rewriting
.spec
 > files was the book
 >     Maximum RPM - Taking the Red Hat Package Manager to the Limit
 > a version of which is available at
 > http://ftp.rpm.org/max-rpm/index.html

 >
 >> On 2022-07-19 23:32, Andrew C Aitchison wrote:
 >>> On Tue, 19 Jul 2022, Alex Talaran wrote:
 >>>
  per a previous thread i took a shot at cleaning up the
fence-agents
  rpm to only include the missing agents and make a new package.
i am
  having some issues with the source url and getting it to
build. the
  srpm is ok, but when i try to rebuild it into a proper rpm i
get the
  following (output truncated):
 
  ---
  + py39_byte_compile /usr/bin/python3
 

/builddir/build/BUILDROOT/fence-agents-epel-4.11.0-1.el9.x86_64/usr/share/fence
  + python_binary='env PYTHONHASHSEED=0 /usr/bin/python3'
  +
 

bytecode_compilation_path=/builddir/build/BUILDROOT/fence-agents-epel-4.11.0-1.el9.x86_64/usr/share/fence
  + env PYTHONHASHSEED=0 /usr/bin/python3 -s -B -m compileall -o
0 -o
  1 -s
/builddir/build/BUILDROOT/fence-agents-epel-4.11.0-1.el9.x86_64
  -p /
 

/builddir/build/BUILDROOT/fence-agents-epel-4.11.0-1.el9.x86_64/usr/share/fence
  Listing
 

'/builddir/build/BUILDROOT/fence-agents-epel-4.11.0-1.el9.x86_64/usr/share/fence'...
  Can't list
 

'/builddir/build/BUILDROOT/fence-agents-epel-4.11.0-1.el9.x86_64/usr/share/fence'
  + chmod 0755
 

/builddir/build/BUILDROOT/fence-agents-epel-4.11.0-1.el9.x86_64/usr/share/fence/fence_pve.py
 
/builddir/build/BUILDROOT/fence-agents-epel-4.11.0-1.el9.x86_64/usr/share/fence/fence_raritan.py
 
/builddir/build/BUILDROOT/fence-agents-epel-4.11.0-1.el9.x86_64/usr/share/fence/fence_rcd_serial.py
 
/builddir/build/BUILDROOT/fence-agents-epel-4.11.0-1.el9.x86_64/usr/share/fence/fence_virsh.py
  chmod: cannot access
 

'/builddir/build/BUILDROOT/fence-agents-epel-4.11.0-1.el9.x86_64/usr/share/fence/fence_pve.py':
 No such file or directory
  chmod: cannot access
 

'/builddir/build/BUILDROOT/fence-agents-epel-4.11.0-1.el9.x86_64/usr/share/fence/fence_raritan.py':
 No such file or directory
  chmod: cannot access
 

'/builddir/build/BUILDROOT/fence-agents-epel-4.11.0-1.el9.x86_64/

[EPEL-devel] Fedora EPEL 8 updates-testing report

2022-08-09 Thread updates
The following Fedora EPEL 8 Security updates need testing:
 Age  URL
  20  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-89ad385971   
chromium-103.0.5060.114-1.el8


The following builds have been pushed to Fedora EPEL 8 updates-testing

gsi-openssh-8.0p1-10.el8
ntfs-3g-2022.5.17-2.el8

Details about builds:



 gsi-openssh-8.0p1-10.el8 (FEDORA-EPEL-2022-394ad1e696)
 An implementation of the SSH protocol with GSI authentication

Update Information:

Sync patches with openssh

ChangeLog:

* Tue Aug  9 2022 Mattias Ellert  - 8.0p1-10
- Based on openssh-8.0p1-13.el8




 ntfs-3g-2022.5.17-2.el8 (FEDORA-EPEL-2022-111c0bd3f5)
 Linux NTFS userspace driver

Update Information:

Update to 2022.5.17.  Fixes: CVE-2021-46790, CVE-2022-30783, CVE-2022-30784,
CVE-2022-30785, CVE-2022-30786, CVE-2022-30787, CVE-2022-30788, CVE-2022-30789

ChangeLog:

* Fri Jul 22 2022 Fedora Release Engineering  - 
2:2022.5.17-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild
* Wed Jun  8 2022 Richard W.M. Jones  - 2:2022.5.17-1
- New upstream version 2022.5.17
- Fixes: CVE-2021-46790, CVE-2022-30783, CVE-2022-30784, CVE-2022-30785,
  CVE-2022-30786, CVE-2022-30787, CVE-2022-30788, CVE-2022-30789
* Thu Jan 20 2022 Fedora Release Engineering  - 
2:2021.8.22-5
- Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild
* Wed Sep 15 2021 Neal Gompa  - 2:2021.8.22-4
- Restyle the spec for legibility
* Mon Sep 13 2021 Richard W.M. Jones  - 2:2021.8.22-3
- Remove unused ntfsprogs/boot.c replacement

References:

  [ 1 ] Bug #2093307 - CVE-2022-30783 ntfs-3g: invalid return code in 
fuse_kern_mount enables intercepting of libfuse-lite protocol traffic [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2093307
  [ 2 ] Bug #2093317 - CVE-2022-30784 ntfs-3g: crafted NTFS image can cause 
heap exhaustion in ntfs_get_attribute_value [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2093317
  [ 3 ] Bug #2093322 - CVE-2022-30785 ntfs-3g: a file handle created in 
fuse_lib_opendir, and later used in fuse_lib_readdir, enables arbitrary memory 
read and write operations [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2093322
  [ 4 ] Bug #2093330 - CVE-2022-30786 ntfs-3g: crafted NTFS image can cause a 
heap-based buffer overflow in ntfs_names_full_collate [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2093330
  [ 5 ] Bug #2093335 - CVE-2022-30787 ntfs-3g: integer underflow in 
fuse_lib_readdir enables arbitrary memory read operations [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2093335
  [ 6 ] Bug #2093342 - CVE-2022-30788 ntfs-3g: crafted NTFS image can cause a 
heap-based buffer overflow in ntfs_mft_rec_alloc [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2093342
  [ 7 ] Bug #2093350 - CVE-2022-30789 ntfs-3g: crafted NTFS image can cause a 
heap-based buffer overflow in ntfs_check_log_client_array [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2093350
  [ 8 ] Bug #2093362 - CVE-2021-46790 ntfs-3g: heap-based buffer overflow in 
ntfsck [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2093362


___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[EPEL-devel] Fedora EPEL 7 updates-testing report

2022-08-09 Thread updates
The following Fedora EPEL 7 Security updates need testing:
 Age  URL
   1  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-55ddc1978f   
rubygem-tzinfo-1.2.10-1.el7


The following builds have been pushed to Fedora EPEL 7 updates-testing

ntfs-3g-2022.5.17-1.el7

Details about builds:



 ntfs-3g-2022.5.17-1.el7 (FEDORA-EPEL-2022-69c4ed93d1)
 Linux NTFS userspace driver

Update Information:

Update to 2022.5.17.  Fixes: CVE-2021-46790, CVE-2022-30783, CVE-2022-30784,
CVE-2022-30785, CVE-2022-30786, CVE-2022-30787, CVE-2022-30788, CVE-2022-30789

ChangeLog:

* Wed Jun  8 2022 Richard W.M. Jones  - 2:2022.5.17-1
- New upstream version 2022.5.17
 - Fixes: CVE-2021-46790, CVE-2022-30783, CVE-2022-30784, CVE-2022-30785,
   CVE-2022-30786, CVE-2022-30787, CVE-2022-30788, CVE-2022-30789

References:

  [ 1 ] Bug #2093307 - CVE-2022-30783 ntfs-3g: invalid return code in 
fuse_kern_mount enables intercepting of libfuse-lite protocol traffic [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2093307
  [ 2 ] Bug #2093317 - CVE-2022-30784 ntfs-3g: crafted NTFS image can cause 
heap exhaustion in ntfs_get_attribute_value [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2093317
  [ 3 ] Bug #2093322 - CVE-2022-30785 ntfs-3g: a file handle created in 
fuse_lib_opendir, and later used in fuse_lib_readdir, enables arbitrary memory 
read and write operations [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2093322
  [ 4 ] Bug #2093330 - CVE-2022-30786 ntfs-3g: crafted NTFS image can cause a 
heap-based buffer overflow in ntfs_names_full_collate [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2093330
  [ 5 ] Bug #2093335 - CVE-2022-30787 ntfs-3g: integer underflow in 
fuse_lib_readdir enables arbitrary memory read operations [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2093335
  [ 6 ] Bug #2093342 - CVE-2022-30788 ntfs-3g: crafted NTFS image can cause a 
heap-based buffer overflow in ntfs_mft_rec_alloc [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2093342
  [ 7 ] Bug #2093350 - CVE-2022-30789 ntfs-3g: crafted NTFS image can cause a 
heap-based buffer overflow in ntfs_check_log_client_array [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2093350
  [ 8 ] Bug #2093362 - CVE-2021-46790 ntfs-3g: heap-based buffer overflow in 
ntfsck [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2093362


___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue