https://bugzilla.redhat.com/show_bug.cgi?id=1081559
Bug ID: 1081559
Summary: perl-YAML-LibYAML bundler yaml-1.0.4
Product: Fedora
Version: rawhide
Component: perl-YAML-LibYAML
Severity: high
Assignee: jplesnik(a)redhat.com
Reporter: ppisar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: jplesnik(a)redhat.com, paul(a)city-fan.org,
perl-devel(a)lists.fedoraproject.org
perl-YAML-LibYAML bundles yaml sources. yaml-1.0.4 with two small modifications
in emmiter.c and scanner.c.
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=NQ1kUHtESn&a=cc_unsubscribe
https://bugzilla.redhat.com/show_bug.cgi?id=1173062
Bug ID: 1173062
Summary: perl-PDF-Reuse-0.36 is available
Product: Fedora
Version: rawhide
Component: perl-PDF-Reuse
Keywords: FutureFeature, Triaged
Assignee: ppisar(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: mmaslano(a)redhat.com,
perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com,
psabata(a)redhat.com
Latest upstream release: 0.36
Current version/release in Fedora Rawhide: 0.35-15.fc22
URL: http://search.cpan.org/dist/PDF-Reuse/
Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring Soon this service
will be implemented by a new system: https://release-monitoring.org/
It will require to manage monitored projects via a new web interface. Please
make yourself familiar with the new system to ease the transition.
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=zHvmCtNDyT&a=cc_unsubscribe
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.
Summary: perl-threads-lite keeps hanging during self checks
https://bugzilla.redhat.com/show_bug.cgi?id=719874
Summary: perl-threads-lite keeps hanging during self checks
Product: Fedora
Version: rawhide
Platform: powerpc
OS/Version: Unspecified
Status: NEW
Severity: unspecified
Priority: unspecified
Component: perl-threads-lite
AssignedTo: ppisar(a)redhat.com
ReportedBy: karsten(a)redhat.com
QAContact: extras-qa(a)fedoraproject.org
CC: fedora-perl-devel-list(a)redhat.com,
mmaslano(a)redhat.com, ppisar(a)redhat.com,
psabata(a)redhat.com
Blocks: 718269
Classification: Fedora
Story Points: ---
Description of problem:
During a mass rebuild on PPC and PPC64, perl-threads-lite-0.031-2.fc16 gets
stuck while doing self checks on ppc. ppc64 completed the build just fine.
I have to either cancel the job or wait until mock gets a timeout.
Here's where it is hanging:
# Testing threads::lite 0.031, Perl 5.012003, /usr/bin/perl
t/00-load.t ....... ok
t/10-basics.t .....
Failed 5/6 subtests
Version-Release number of selected component (if applicable):
perl-threads-lite-0.031-2.fc16
Actual results:
http://ppc.koji.fedoraproject.org/koji/taskinfo?taskID=249482
Note how ppc64 completed the build within 2 minutes and ppc was still working
on it after more than 9 hours when I've canceled the job.
--
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.
Summary: perl-PAR-Packer-1.013 is available
https://bugzilla.redhat.com/show_bug.cgi?id=796143
Summary: perl-PAR-Packer-1.013 is available
Product: Fedora
Version: rawhide
Platform: Unspecified
OS/Version: Unspecified
Status: NEW
Keywords: FutureFeature, Triaged
Severity: unspecified
Priority: unspecified
Component: perl-PAR-Packer
AssignedTo: mmaslano(a)redhat.com
ReportedBy: upstream-release-monitoring(a)fedoraproject.org
QAContact: extras-qa(a)fedoraproject.org
CC: fedora-perl-devel-list(a)redhat.com,
mmaslano(a)redhat.com, ppisar(a)redhat.com
Classification: Fedora
Story Points: ---
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Latest upstream release: 1.013
Current version in Fedora Rawhide: 1.012
URL: http://search.cpan.org/dist/PAR-Packer/
Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
--
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1205913
Bug ID: 1205913
Summary: Please branch perl-Chart for EPEL7
Product: Fedora EPEL
Version: epel7
Component: perl-Chart
Assignee: psabata(a)redhat.com
Reporter: jamielinux(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org,
psabata(a)redhat.com, steve(a)silug.org
It seems to build fine using the f21 srpm. (The rawhide srpm complains that
perl-ExtUtils-MakeMaker is too old.)
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1163295
Bug ID: 1163295
Summary: perl-Sort-Key-1.33 is available
Product: Fedora
Version: rawhide
Component: perl-Sort-Key
Keywords: FutureFeature, Triaged
Assignee: psabata(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: iarnell(a)gmail.com, perl-devel(a)lists.fedoraproject.org,
psabata(a)redhat.com
Latest upstream release: 1.33
Current version/release in Fedora Rawhide: 1.32-7.fc22
URL: http://search.cpan.org/dist/Sort-Key/
Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring Soon this service
will be implemented by a new system: https://github.com/fedora-infra/anitya/
It will require to manage monitored projects via a new web interface. Please
make yourself familiar with the new system to ease the transition.
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=ViBSSor8nd&a=cc_unsubscribe
https://bugzilla.redhat.com/show_bug.cgi?id=1185483
Bug ID: 1185483
Summary: CVE-2014-8630 Bugzilla: Command Injection into product
names and other attributes
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: kseifried(a)redhat.com
CC: bazanluis20(a)gmail.com, emmanuel(a)seyman.fr,
itamar(a)ispbrasil.com.br,
perl-devel(a)lists.fedoraproject.org,
xavier(a)bachelot.org
The Bugzilla project reports:
Class: Command Injection
Versions: All versions before 4.0.16, 4.1.1 to 4.2.11, 4.3.1 to 4.4.6,
4.5.1 to 4.5.6
Fixed In: 4.0.16, 4.2.12, 4.4.7, 5.0rc1
Description: Some code in Bugzilla does not properly utilize 3 arguments form
for open() and it is possible for an account with editcomponents
permissions to inject commands into product names and other
attributes.
References: https://bugzilla.mozilla.org/show_bug.cgi?id=1079065
CVE Number: CVE-2014-8630
External references:
http://www.bugzilla.org/security/4.0.15/
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=wv1CAf1O1K&a=cc_unsubscribe
https://bugzilla.redhat.com/show_bug.cgi?id=1150091
Bug ID: 1150091
Summary: CVE-2014-1571 CVE-2014-1572 CVE-2014-1573 bugzilla:
security fixes release
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: vkaigoro(a)redhat.com
CC: bazanluis20(a)gmail.com, emmanuel(a)seyman.fr,
itamar(a)ispbrasil.com.br, mcepl(a)redhat.com,
perl-devel(a)lists.fedoraproject.org
Upstream has issued an advisory today (October 6):
http://www.bugzilla.org/security/4.0.14/
Class: Unauthorized Account Creation
Versions: 2.23.3 to 4.0.14, 4.1.1 to 4.2.10, 4.3.1 to 4.4.5, 4.5.1 to 4.5.5
Fixed In: 4.0.15, 4.2.11, 4.4.6, 4.5.6
Description: An attacker creating a new Bugzilla account can override certain
parameters when finalizing the account creation that can lead to
the
user being created with a different email address than originally
requested. The overridden login name could be automatically added
to groups based on the group's regular expression setting.
References: https://bugzilla.mozilla.org/show_bug.cgi?id=1074812
CVE Number: CVE-2014-1572
Class: Cross-Site Scripting
Versions: 2.17.1 to 4.0.14, 4.1.1 to 4.2.10, 4.3.1 to 4.4.5, 4.5.1 to 4.5.5
Fixed In: 4.0.15, 4.2.11, 4.4.6, 4.5.6
Description: During an audit of the Bugzilla code base, several places
were found where cross-site scripting exploits could occur which
could allow an attacker to access sensitive information.
References: https://bugzilla.mozilla.org/show_bug.cgi?id=1075578
CVE Number: CVE-2014-1573
Class: Information Leak
Versions: 2.17.1 to 4.0.14, 4.1.1 to 4.2.10, 4.3.1 to 4.4.5, 4.5.1 to 4.5.5
Fixed In: 4.0.15, 4.2.11, 4.4.6, 4.5.6
Description: If a new comment was marked private to the insider group, and a
flag
was set in the same transaction, the comment would be visible to
flag recipients even if they were not in the insider group.
References: https://bugzilla.mozilla.org/show_bug.cgi?id=1064140
CVE Number: CVE-2014-1571
Class: Social Engineering
Versions: 2.17.1 to 4.0.14, 4.1.1 to 4.2.10, 4.3.1 to 4.4.5, 4.5.1 to 4.5.5
Fixed In: 4.0.15, 4.2.11, 4.4.6, 4.5.6
Description: Search results can be exported as a CSV file which can then be
imported into external spreadsheet programs. Specially formatted
field values can be interpreted as formulas which can be executed
and used to attack a user's computer.
References: https://bugzilla.mozilla.org/show_bug.cgi?id=1054702
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=0XmWcvadmK&a=cc_unsubscribe
https://bugzilla.redhat.com/show_bug.cgi?id=1198991
Bug ID: 1198991
Summary: License tag should mention GPLv2+
Product: Fedora
Version: rawhide
Component: perl-Text-Template
Assignee: tcallawa(a)redhat.com
Reporter: ppisar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org,
tcallawa(a)redhat.com
External Bug ID: CPAN 102523
External Bug ID: CPAN 102523
Current package, perl-Text-Template-1.45-17.fc23, declares license as "GPL+ or
Artistic", but the content states "GPLv2+ or Artistic" many times. See upstream
bug report <https://rt.cpan.org/Public/Bug/Display.html?id=102523>.
I believe the license tag should be changed to "GPLv2+ or Artistic" (or to
"(GPL+ or Artistic) and (GPLv2+ or Artistic)" until upstream clarifies the
report).
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=Zq8a82s6bW&a=cc_unsubscribe
https://bugzilla.redhat.com/show_bug.cgi?id=1029710
Bug ID: 1029710
Summary: Amavisd fails to identify attached zipped files with
.exe extensions
Product: Fedora EPEL
Version: el6
Component: amavisd-new
Severity: medium
Assignee: steve(a)silug.org
Reporter: s10dal(a)elrepo.org
QA Contact: extras-qa(a)fedoraproject.org
CC: janfrode(a)tanso.net, kanarip(a)kanarip.com,
perl-devel(a)lists.fedoraproject.org, steve(a)silug.org
Description of problem:
Mail attachments containing zipped files with .exe extensions are not properly
identified due to a failure of 7za (p7zip) as called by amavisd to correctly
list the contents of the zipped file. Based on maillog errors, the failure
appears to be due to an improperly composed 7za option, specifically -w not
being separated from the target by a separator (e.g., space character).
Manually executing 7za using the options noted in the maillog error (see below)
demonstrates the need to insert a separator between the -w option and the
target.
Fails: $ 7za l -slt -w./contains_exe.zip
Works: $ 7za l -slt -w ./contains_exe.zip
Also, this issue may be specific to EL6. This issue came to my attention
because an EL6 mail server acting as a Backup MX for an EL5 mail server was
forwarding zipped exe attachments, which were correctly identified and
quarantined on the EL5 system.
Version-Release number of selected component (if applicable):
# uname -rpmi
2.6.32-358.23.2.el6.i686 i686 i686 i386
# rpm -q amavisd-new p7zip
amavisd-new-2.8.0-4.el6.noarch
p7zip-9.20.1-2.el6.i686
How reproducible:
Very. Observed on 3 EL6 mail servers.
Steps to Reproduce:
1. Install/configure postfix, amavisd-new, clam\*, etc.
2. Create a test attachment:
$ touch test.exe
$ 7za a -tzip test_exe.zip test.exe
3. Send a mail with test_exe.zip attached
4. Check /var/log/maillog for the specific error
Actual results:
From /var/log/maillog:
Nov 12 17:17:46 Mail amavis[1568]: (28807-12) (!)run_command: child process
[1568]: run_command: failed to exec /usr/bin/7za l -slt
-w/var/spool/amavisd/tmp/amavis-20131112T051218-28807-HPbWePoN/parts --
/var/spool/amavisd/tmp/amavis-20131112T051218-28807-HPbWePoN/parts/p002: 13 at
/usr/sbin/amavisd line 4062.
Nov 12 17:17:46 Mail amavis[28807]: (28807-12) (!)Decoding of p002 (Zip archive
data, at least v1.0 to extract) failed, leaving it unpacked: do_7zip: can't get
a list of archive members: exit 6; at (eval 117) line 781.
Expected results:
Identify zipped exe file as such.
Additional info:
It may not be relevant to the observed error, but 8 months ago, amavisd-new and
clam\* were converted from RepoForge/RPMforge versions to EPEL versions. Except
for a few initial hiccups, the mail servers have been running without apparent
issues until the current 7za issue was observed.
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=KMKdGzsZdn&a=cc_unsubscribe