Debian Bug Tracking System | 26 Nov 10:36 2014
Picon

Processed: reported upstream

Processing commands for control <at> bugs.debian.org:

> forwarded 768673 https://github.com/nahi/httpclient/issues/233
Bug #768673 [src:ruby-httpclient] ruby-httpclient: FTBFS in jessie: ERROR: Test "ruby2.1" failed:
Errno::ECONNRESET: Connection reset by peer - SSL_connect
Set Bug forwarded-to-address to 'https://github.com/nahi/httpclient/issues/233'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
--

-- 
768673: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768673
Debian Bug Tracking System
Contact owner <at> bugs.debian.org with problems

Debian Bug Tracking System | 26 Nov 10:18 2014
Picon

Processed: tag 770941 +help

Processing commands for control <at> bugs.debian.org:

> tag 770941 +help
Bug #770941 [nova-common] nova-common - Overrides database config in nova.conf
Added tag(s) help.
>
End of message, stopping processing here.

Please contact me if you need assistance.
--

-- 
770941: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770941
Debian Bug Tracking System
Contact owner <at> bugs.debian.org with problems

Thomas Goirand | 26 Nov 10:11 2014
Picon

Bug#770941: Wontfix #770941

severity 770941 wishlist
retitle 770941 Please support ident ident auth in DSN
tag 770941 +wontfix

Debian Bug Tracking System | 26 Nov 09:00 2014
Picon

Processed: retitle 770972 to libksba: CVE-2014-9087: buffer overflow in ksba_oid_to_str

Processing commands for control <at> bugs.debian.org:

> retitle 770972 libksba: CVE-2014-9087: buffer overflow in ksba_oid_to_str
Bug #770972 {Done: Andreas Metzler <ametzler <at> debian.org>} [src:libksba] libksba: buffer overflow in ksba_oid_to_str
Changed Bug title to 'libksba: CVE-2014-9087: buffer overflow in ksba_oid_to_str' from 'libksba:
buffer overflow in ksba_oid_to_str'
> thanks
Stopping processing here.

Please contact me if you need assistance.
--

-- 
770972: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770972
Debian Bug Tracking System
Contact owner <at> bugs.debian.org with problems

Debian Bug Tracking System | 26 Nov 09:00 2014
Picon

Processed: retitle 768369 to libjpeg-turbo: CVE-2014-9092: [DOS] Stack smashing

Processing commands for control <at> bugs.debian.org:

> retitle 768369 libjpeg-turbo: CVE-2014-9092: [DOS] Stack smashing
Bug #768369 [libjpeg62-turbo] [libjpeg62-turbo] [DOS] Stack smashing
Changed Bug title to 'libjpeg-turbo: CVE-2014-9092: [DOS] Stack smashing' from '[libjpeg62-turbo]
[DOS] Stack smashing'
> thanks
Stopping processing here.

Please contact me if you need assistance.
--

-- 
768369: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768369
Debian Bug Tracking System
Contact owner <at> bugs.debian.org with problems

Debian Bug Tracking System | 26 Nov 08:51 2014
Picon

Processed: severity of 770230 is important

Processing commands for control <at> bugs.debian.org:

> severity 770230 important
Bug #770230 [src:xen] xen: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595 CVE-2014-9030
Severity set to 'important' from 'grave'
> thanks
Stopping processing here.

Please contact me if you need assistance.
--

-- 
770230: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770230
Debian Bug Tracking System
Contact owner <at> bugs.debian.org with problems

Debian Bug Tracking System | 26 Nov 08:51 2014
Picon

Processed: severity of 769543 is serious

Processing commands for control <at> bugs.debian.org:

> severity 769543 serious
Bug #769543 [xen-utils-common] xen-utils-common: missing xen-init-name
Severity set to 'serious' from 'normal'
> thanks
Stopping processing here.

Please contact me if you need assistance.
--

-- 
769543: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769543
Debian Bug Tracking System
Contact owner <at> bugs.debian.org with problems

Bastian Blank | 26 Nov 08:18 2014
Picon

Bug#770941: closed by Thomas Goirand <zigo <at> debian.org> (Re: [PKG-Openstack-devel] Bug#770941: closed by Thomas Goirand <zigo <at> debian.org> (Re: Bug#770941: nova-common - Overrides database config in nova.conf))

Control: reopen -1

On Wed, Nov 26, 2014 at 01:09:08AM +0000, Debian Bug Tracking System wrote:
> > It is a valid DSN.
> In this:
> postgresql:///nova
> Where's the user and password? What's the hostname?

User and password is not needed for ident auth, empty hostname is
documented as using the unix socket.  And the documentation tells:[1]

| These URLs follow RFC-1738, and usually can include username, password,
| hostname, database name as well as optional keyword arguments for
| additional configuration. In some cases a file path is accepted, and in
| others a “data source name” replaces the “host” and “database” portions.

So they _can_ include, not they _must_ include.  Also there are examples
of this usage.

> If theoretically, this *may* be a valid DSN, but practically, I don't
> think you'd be using a DNS without a valid hostname, login and pass.

It is valid in practice, otherwise it would not work in the first place.

> > And even if not, it must not change it.
> The idea behind the policy is that a config script shouldn't change a
> valid configuration, so that it is possible edit the configuration file,
> and that change be kept when installing or upgrading.

No, the idea is that the user have all right to change it to whatever he
(Continue reading)

Geert Stappers | 26 Nov 05:27 2014
Picon

Bug#767504: separate package for libmp4v2


FWIW  I have been told that libmp4v2 is not in upstream mpd

So a clean solution for the license issue this bugreport is about,
is to put libmp4v2 in a separate package.

Groeten
Geert Stappers
--

-- 
Leven en laten leven

Jerome Charaoui | 26 Nov 05:16 2014
Picon

Bug#771034: monkeysign: Attempts to sign wrong uid

Package: monkeysign
Version: 2.0.1
Severity: grave
Tags: upstream
Justification: renders package unusable

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Dear Maintainer,

I am unable to sign a single uid (not all) using monkeysign. Upon close
inspection, it appears that monkeysign attempts to sign the wrong uid. See line
506 in gpg.py (why the increment?).

Thanks,

- -- Jerome

- -- System Information:
Debian Release: jessie/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_CA.utf8, LC_CTYPE=fr_CA.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

(Continue reading)

Jerome Charaoui | 26 Nov 04:25 2014
Picon

Bug#771032: monkeysign: Crash due to encoding error

Package: monkeysign
Version: 2.0.1
Severity: grave
Tags: upstream
Justification: renders package unusable

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Dear Maintainer,

Signing a key fails right after the "Signer toutes les identités? [y/N]"
prompt, with the following error message :

Traceback (most recent call last):
  File "/usr/bin/monkeysign", line 41, in <module>
    u.main()
  File "/usr/lib/python2.7/dist-packages/monkeysign/cli.py", line 69, in main
    self.sign_key()
  File "/usr/lib/python2.7/dist-packages/monkeysign/ui.py", line 293, in
sign_key
    pattern = self.choose_uid(_('Choose the identity to sign'), keys[key])
  File "/usr/lib/python2.7/dist-packages/monkeysign/cli.py", line 102, in
choose_uid
    pattern = raw_input(prompt)
UnicodeEncodeError: 'ascii' codec can't encode character u'\xe9' in position
17: ordinal not in range(128)

My system's locale is "fr_CA.utf8"

(Continue reading)


Gmane