[Bug 725225] New: Update perl-Email-MIME to 1.861 or later in EPEL 5
by Red Hat Bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.
Summary: Update perl-Email-MIME to 1.861 or later in EPEL 5
https://bugzilla.redhat.com/show_bug.cgi?id=725225
Summary: Update perl-Email-MIME to 1.861 or later in EPEL 5
Product: Fedora EPEL
Version: el5
Platform: Unspecified
OS/Version: Unspecified
Status: NEW
Severity: unspecified
Priority: unspecified
Component: perl-Email-MIME
AssignedTo: rob.myers(a)gtri.gatech.edu
ReportedBy: xavier(a)bachelot.org
QAContact: extras-qa(a)fedoraproject.org
CC: rob.myers(a)gtri.gatech.edu,
fedora-perl-devel-list(a)redhat.com
Classification: Fedora
Story Points: ---
Type: ---
Please update perl-Email-MIME to 1.861 or later in EPEL 5.
Merging the git f11 branch (1.863) to the el5 branch should do the trick.
bugzilla 3.2.10, which is a security release, requires at least 1.861.
Regards,
Xavier
--
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
12 years, 1 month
[Bug 725227] New: Update perl-Email-MIME-Modifier to 1.442 or later in EPEL 5
by Red Hat Bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.
Summary: Update perl-Email-MIME-Modifier to 1.442 or later in EPEL 5
https://bugzilla.redhat.com/show_bug.cgi?id=725227
Summary: Update perl-Email-MIME-Modifier to 1.442 or later in
EPEL 5
Product: Fedora EPEL
Version: el5
Platform: Unspecified
OS/Version: Unspecified
Status: NEW
Severity: unspecified
Priority: unspecified
Component: perl-Email-MIME-Modifier
AssignedTo: rob.myers(a)gtri.gatech.edu
ReportedBy: xavier(a)bachelot.org
QAContact: extras-qa(a)fedoraproject.org
CC: rob.myers(a)gtri.gatech.edu,
fedora-perl-devel-list(a)redhat.com
Classification: Fedora
Story Points: ---
Type: ---
Please update perl-Email-MIME-Modifier to 1.442 or later in EPEL 5.
Merging the git f11 branch (1.443) to the el5 branch should do the trick.
bugzilla 3.2.10, which is a security release, requires at least 1.442.
Regards,
Xavier
--
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
12 years, 1 month
[Bug 680418] New: missing man page for xpath
by Red Hat Bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.
Summary: missing man page for xpath
https://bugzilla.redhat.com/show_bug.cgi?id=680418
Summary: missing man page for xpath
Product: Fedora
Version: 14
Platform: Unspecified
OS/Version: Unspecified
Status: NEW
Severity: low
Priority: unspecified
Component: perl-XML-XPath
AssignedTo: mmaslano(a)redhat.com
ReportedBy: msuchy(a)redhat.com
QAContact: extras-qa(a)fedoraproject.org
CC: fedora-perl-devel-list(a)redhat.com, mmaslano(a)redhat.com
Classification: Fedora
Description of problem:
xpath does not have man page, which is pain, expecially when xpath --help or -h
does not work neither.
Version-Release number of selected component (if applicable):
perl-XML-XPath-1.13-12.fc14.noarch
How reproducible:
always
Steps to Reproduce:
1. man xpath
Actual results:
No manual entry for xpath
Expected results:
Nice man page for xpath
--
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
12 years, 2 months
[Bug 720744] New: Rebuild required to work correctly with perl 5.12.4
by Red Hat Bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.
Summary: Rebuild required to work correctly with perl 5.12.4
https://bugzilla.redhat.com/show_bug.cgi?id=720744
Summary: Rebuild required to work correctly with perl 5.12.4
Product: Fedora
Version: 15
Platform: Unspecified
OS/Version: Unspecified
Status: NEW
Severity: unspecified
Priority: unspecified
Component: perl-Devel-Cover
AssignedTo: tcallawa(a)redhat.com
ReportedBy: berrange(a)redhat.com
QAContact: extras-qa(a)fedoraproject.org
CC: tcallawa(a)redhat.com, fedora-perl-devel-list(a)redhat.com
Classification: Fedora
Story Points: ---
Description of problem:
Any attempt to use perl-Devel-Cover in fully updated Fedora 15, results in a
warning printed
This version of Devel::Cover was built with Perl version 5.012003.
It is now being run with Perl version 5.012004.
Attempting to make adjustments, but you may find that some of your modules do
not have coverage data collected. You may need to alter the +-inc, +-ignore
and +-select options.
At the very least, this is obscuring real problems with doing coverage testing
of unit tests, but is also causing potentially incorrect results.
A simple rebuild of the RPM should solve it.
Version-Release number of selected component (if applicable):
perl-Devel-Cover-0.66-3.fc15.x86_64
perl-5.12.4-159.fc15.x86_64
How reproducible:
Always
Steps to Reproduce:
1. $ perl -MDevel::Cover -e ''
2.
3.
Actual results:
This version of Devel::Cover was built with Perl version 5.012003.
It is now being run with Perl version 5.012004.
Attempting to make adjustments, but you may find that some of your modules do
not have coverage data collected. You may need to alter the +-inc, +-ignore
and +-select options.
Expected results:
No scary warning
Additional info:
Same as the previous F14 bug now fixed:
https://bugzilla.redhat.com/show_bug.cgi?id=691451
--
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
12 years, 2 months
[Bug 760472] New: Upgrade to new upstream version
by Red Hat Bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.
Summary: Upgrade to new upstream version
https://bugzilla.redhat.com/show_bug.cgi?id=760472
Summary: Upgrade to new upstream version
Product: Fedora EPEL
Version: el6
Platform: Unspecified
OS/Version: Unspecified
Status: NEW
Severity: unspecified
Priority: unspecified
Component: perl-Directory-Queue
AssignedTo: steve.traylen(a)cern.ch
ReportedBy: lionel.cons(a)cern.ch
QAContact: extras-qa(a)fedoraproject.org
CC: fedora-perl-devel-list(a)redhat.com,
steve.traylen(a)cern.ch
Classification: Fedora
Story Points: ---
Type: ---
The latest version of Directory::Queue on CPAN is now 1.4.
This is the version to use everywhere. Please upgrade in EPEL.
--
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
12 years, 4 months
[Bug 760132] New: CVE-2011-4114 perl-PAR-Packer: insecure temporary directory handling [fedora-all]
by Red Hat Bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.
Summary: CVE-2011-4114 perl-PAR-Packer: insecure temporary directory handling [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=760132
Summary: CVE-2011-4114 perl-PAR-Packer: insecure temporary
directory handling [fedora-all]
Product: Fedora
Version: 15
Platform: All
OS/Version: Linux
Status: NEW
Keywords: Security, SecurityTracking
Severity: low
Priority: low
Component: perl-PAR
AssignedTo: mmaslano(a)redhat.com
ReportedBy: jlieskov(a)redhat.com
QAContact: extras-qa(a)fedoraproject.org
CC: fedora-perl-devel-list(a)redhat.com, mmaslano(a)redhat.com
Blocks: 753955
Classification: Fedora
Story Points: ---
Type: ---
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected Fedora
versions.
For comments that are specific to the vulnerability please use bugs filed
against "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When creating a Bodhi update request, please include this bug ID and the
bug IDs of this bug's parent bugs filed against the "Security Response"
product (the top-level CVE bugs). Please mention the CVE IDs being fixed
in the RPM changelog when available.
Bodhi update submission link:
https://admin.fedoraproject.org/updates/new/?type_=security&bugs=753955
Please note: this issue affects multiple supported versions of Fedora.
Only one tracking bug has been filed; please ensure that it is only closed
when all affected versions are fixed.
[bug automatically created by: add-tracking-bugs]
--
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
12 years, 4 months