[Bug 1121552] New: Can not release email from SQL quarantine with new stable version 2.9.1
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1121552
Bug ID: 1121552
Summary: Can not release email from SQL quarantine with new
stable version 2.9.1
Product: Fedora EPEL
Version: el6
Component: amavisd-new
Severity: high
Assignee: juan.orti(a)miceliux.com
Reporter: g.danti(a)assyoma.it
QA Contact: extras-qa(a)fedoraproject.org
CC: janfrode(a)tanso.net, juan.orti(a)miceliux.com,
kanarip(a)kanarip.com,
perl-devel(a)lists.fedoraproject.org, steve(a)silug.org
Description of problem:
With the new amavisd-new stable version (2.9.1) it is not possibile to release
emails from SQL quarantine using the amavisd-release program. When trying to do
that, amavis complain about a non-existent mail_id. Analyzing the log file it
appear that the mail_id is correctly passed by amavisd-release but then the
amavisd perl daemon overwrite the correct value with random data.
Version-Release number of selected component (if applicable):
2.9.1, 2.9.0
How reproducible:
When using an SQL quarantine: always
On other quarantine types: I don't know (I use SQL quarantine exclusively)
Steps to Reproduce:
1. set up and SQL quarantine
2. let a spam email enter the SQL quarantine
3. try to release the blocked email via the amavisd-release program (eg:
/usr/bin/amavisd-release 0-vFmNRKpWLO5K)
Actual results:
450 4.5.0 Failure: Can't open sql obj for reading: No such file or directory at
(eval 109) line 375, <GEN21> line 4.
Expected results:
The email shoud be released and queued for delivery
Additional info:
[1] http://lists.amavis.org/pipermail/amavis-users/2014-July/003039.html
[2] http://lists.amavis.org/pipermail/amavis-users/2014-June/002957.html
Workarounds:
1. Change line 20177 in /usr/sbin/amavisd as below:
$msginfo->mail_id($mail_id);
2. Apply a slight more extensive path as by link n.2 above
3. Revert to amavisd-new ver. 2.8.1
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=LN0Qoch25Q&a=cc_unsubscribe
9 years, 9 months
[Bug 1124400] New: perl-MetaCPAN-Client-1.006000-1.fc22 FTBFS:
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1124400
Bug ID: 1124400
Summary: perl-MetaCPAN-Client-1.006000-1.fc22 FTBFS:
Product: Fedora
Version: rawhide
Component: perl-MetaCPAN-Client
Assignee: paul(a)city-fan.org
Reporter: ppisar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: paul(a)city-fan.org, perl-devel(a)lists.fedoraproject.org
perl-MetaCPAN-Client-1.006000-1.fc22 fails to build in F22 due to tests:
# Failed test 'Pod coverage on MetaCPAN::Client::ResultSet'
# at /usr/share/perl5/vendor_perl/Test/Pod/Coverage.pm line 126.
# Coverage for MetaCPAN::Client::ResultSet is 87.5%, with 1 naked subroutine:
# has_scroller
# Looks like you failed 1 test of 12.
t/release-pod-coverage.t ..
Dubious, test returned 1 (wstat 256, 0x100)
Failed
Build root difference between last working and this build is:
Removed packages:
coreutils-8.22
findutils-4.5.13
gdb-7.7.90.20140711
perl-Class-Load-0.21
perl-Devel-PartialDump-0.15
perl-Dist-CheckConflicts-0.11
perl-Eval-Closure-0.08
perl-Moo-1.003001
perl-Moose-2.1005
perl-MRO-Compat-0.12
perl-Package-DeprecationManager-0.13
setup-2.9.0
Added packages:
coreutils-8.23
findutils-4.5.14
gdb-7.8
perl-Import-Into-1.002002
perl-Moo-1.005000
setup-2.9.1
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=XvDbHJ0s7F&a=cc_unsubscribe
9 years, 9 months
[Bug 669320] New: perl-DateTime Newer in EPEL 6 than in RHEL 6
by Red Hat Bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.
Summary: perl-DateTime Newer in EPEL 6 than in RHEL 6
https://bugzilla.redhat.com/show_bug.cgi?id=669320
Summary: perl-DateTime Newer in EPEL 6 than in RHEL 6
Product: Fedora EPEL
Version: el6
Platform: Unspecified
OS/Version: Unspecified
Status: NEW
Severity: medium
Priority: low
Component: perl-DateTime
AssignedTo: tremble(a)tremble.org.uk
ReportedBy: myllynen(a)redhat.com
QAContact: extras-qa(a)fedoraproject.org
CC: fedora-perl-devel-list(a)redhat.com,
tremble(a)tremble.org.uk
Classification: Fedora
Target Release: ---
Description of problem:
EPEL 6 has perl-DateTime-0.5300-4.el6 but RHEL 6 Optional only has
perl-DateTime-0.5300-1.el6 - this is against
https://fedoraproject.org/wiki/EPEL6-FAQ#What_can_be_in_EPEL.3F
Could this be corrected so that the EPEL package won't update the RHEL package?
Thanks.
--
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
9 years, 9 months
[Bug 1112553] New: perl-Cache-Cache-1.06-15.fc21 FTBFS on loaded machine: t/5_test_size_aware_file_cache.t is time sensitive
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1112553
Bug ID: 1112553
Summary: perl-Cache-Cache-1.06-15.fc21 FTBFS on loaded machine:
t/5_test_size_aware_file_cache.t is time sensitive
Product: Fedora
Version: rawhide
Component: perl-Cache-Cache
Assignee: steve(a)silug.org
Reporter: ppisar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org, steve(a)silug.org
External Bug ID: CPAN 88418
perl-Cache-Cache-1.06-15.fc21 fails to build due
t/5_test_size_aware_file_cache.t test:
defined(@array) is deprecated at
/builddir/build/BUILD/Cache-Cache-1.06/blib/lib/Cache/CacheTester.pm line 562.
(Maybe you should just omit the defined()?)
Use of uninitialized value $fetched_value in string eq at
/builddir/build/BUILD/Cache-Cache-1.06/blib/lib/Cache/CacheTester.pm line 175.
Use of uninitialized value $first_value in string eq at
/builddir/build/BUILD/Cache-Cache-1.06/blib/lib/Cache/SizeAwareCacheTester.pm
line 149.
t/5_test_size_aware_file_cache.t ...........
Failed 2/48 subtests
This happens if the host is loaded and the run-time exceeds tested time-outs.
This has been reported to upstream as well as CPAN matrix shows quite frequent
random failures.
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=IqppzykR9w&a=cc_unsubscribe
9 years, 9 months
[Bug 828517] New: CVE-2011-5092 rt3: remote arbitrary code execution and privilege elevation flaw [epel-6]
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=828517
Bug ID: 828517
Keywords: Security, SecurityTracking
Blocks: 828512
QA Contact: extras-qa(a)fedoraproject.org
Severity: high
Version: el6
Priority: high
CC: mmahut(a)redhat.com, perl-devel(a)lists.fedoraproject.org,
tremble(a)tremble.org.uk, xavier(a)bachelot.org
Assignee: xavier(a)bachelot.org
Summary: CVE-2011-5092 rt3: remote arbitrary code execution and
privilege elevation flaw [epel-6]
Regression: ---
Story Points: ---
Classification: Fedora
OS: Linux
Reporter: vdanen(a)redhat.com
Type: ---
Documentation: ---
Hardware: All
Mount Type: ---
Status: NEW
Component: rt3
Product: Fedora EPEL
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected Fedora
versions.
For comments that are specific to the vulnerability please use bugs filed
against "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When creating a Bodhi update request, please include this bug ID and the
bug IDs of this bug's parent bugs filed against the "Security Response"
product (the top-level CVE bugs). Please mention the CVE IDs being fixed
in the RPM changelog when available.
Bodhi update submission link:
https://admin.fedoraproject.org/updates/new/?type_=security&bugs=828512
epel-6 tracking bug for rt3: see blocks bug list for full details of the
security issue(s).
[bug automatically created by: add-tracking-bugs]
--
You are receiving this mail because:
You are on the CC list for the bug.
9 years, 10 months