[Bug 1200306] New: Dependency problem with perl-libs
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1200306
Bug ID: 1200306
Summary: Dependency problem with perl-libs
Product: Fedora
Version: 21
Component: perl
Assignee: jplesnik(a)redhat.com
Reporter: frank-buettner(a)gmx.net
QA Contact: extras-qa(a)fedoraproject.org
CC: cweyl(a)alumni.drew.edu, iarnell(a)gmail.com,
jplesnik(a)redhat.com, kasal(a)ucw.cz,
perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com,
psabata(a)redhat.com, rc040203(a)freenet.de,
tcallawa(a)redhat.com
Description of problem:
yum check reports:
4:perl-5.18.4-306.fc21.x86_64 has missing requires of perl-libs = ('4',
'5.18.4', '306.fc21')
4:perl-libs-5.18.4-306.fc21.x86_64 provides ('perl-libs', 'EQ', ('4', '5.18.4',
'306.fc21')) but it cannot be found
but rpm -q perl-libs reports:
perl-libs-5.18.4-306.fc21.x86_64
yum reinstall perl will install 32 libs:(
Reinstalling:
perl x86_64
4:5.18.4-306.fc21 updates
8.1 M
Installing for dependencies:
glibc i686
2.20-8.fc21 updates
4.1 M
nss-softokn-freebl i686
3.17.4-1.fc21 updates
195 k
perl-libs i686
4:5.18.4-306.fc21 updates
717 k
What goes wrong?
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=vLyUSeXz2O&a=cc_unsubscribe
8Â years, 4Â months
[Bug 1188109] New: [abrt] perl-Padre: S_sv_unmagicext_flags(): perl killed by SIGSEGV
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1188109
Bug ID: 1188109
Summary: [abrt] perl-Padre: S_sv_unmagicext_flags(): perl
killed by SIGSEGV
Product: Fedora
Version: 21
Component: perl-Padre
Assignee: jplesnik(a)redhat.com
Reporter: mkpdev(a)gmail.com
QA Contact: extras-qa(a)fedoraproject.org
CC: jplesnik(a)redhat.com,
perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com
Version-Release number of selected component:
perl-Padre-0.90-12.fc21
Additional info:
reporter: libreport-2.3.0
backtrace_rating: 4
cmdline: /usr/bin/perl /usr/bin/padre
crash_function: S_sv_unmagicext_flags
executable: /usr/bin/perl
kernel: 3.18.3-201.fc21.x86_64
runlevel: N 5
type: CCpp
uid: 1000
Truncated backtrace:
Thread no. 1 (10 frames)
#0 S_sv_unmagicext_flags at sv.c:5451
#2 Perl_sv_unmagic at sv.c:5493
#3 Perl_sv_clear at sv.c:6131
#4 Perl_sv_free2 at sv.c:6590
#5 S_SvREFCNT_dec at inline.h:73
#6 S_mg_free_struct at mg.c:541
#7 Perl_mg_free at mg.c:563
#8 Perl_sv_clear at sv.c:6132
#9 Perl_sv_free2 at sv.c:6590
#10 S_SvREFCNT_dec_NN at inline.h:84
Potential duplicate: bug 957749
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=Cn38v4mP3h&a=cc_unsubscribe
8Â years, 4Â months
[Bug 1187151] New: CVE-2013-7422 perl: segmentation fault in S_regmatch on negative backreference [fedora-all]
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1187151
Bug ID: 1187151
Summary: CVE-2013-7422 perl: segmentation fault in S_regmatch
on negative backreference [fedora-all]
Product: Fedora
Version: 21
Component: perl
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: jplesnik(a)redhat.com
Reporter: mprpic(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: cweyl(a)alumni.drew.edu, iarnell(a)gmail.com,
jplesnik(a)redhat.com, kasal(a)ucw.cz,
perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com,
psabata(a)redhat.com, rc040203(a)freenet.de,
tcallawa(a)redhat.com
Blocks: 1187149 (CVE-2013-7422)
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of Fedora.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
[bug automatically created by: add-tracking-bugs]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1187149
[Bug 1187149] CVE-2013-7422 perl: segmentation fault in S_regmatch on
negative backreference
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=PqgtQKVPSx&a=cc_unsubscribe
8Â years, 4Â months
[Bug 1187149] New: CVE-2013-7422 perl: segmentation fault in S_regmatch on negative backreference
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1187149
Bug ID: 1187149
Summary: CVE-2013-7422 perl: segmentation fault in S_regmatch
on negative backreference
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: mprpic(a)redhat.com
CC: cweyl(a)alumni.drew.edu, iarnell(a)gmail.com,
jplesnik(a)redhat.com, kasal(a)ucw.cz,
perl-devel(a)lists.fedoraproject.org,
perl-maint-list(a)redhat.com, ppisar(a)redhat.com,
psabata(a)redhat.com, rc040203(a)freenet.de,
rmeggins(a)redhat.com, tcallawa(a)redhat.com
An integer underflow flaw was discovered in the way Perl parsed regular
expression backreferences. An attacker able to supply a crafted regular
expression to a Perl application could possibly use this flaw to crash that
application.
Reproducer:
$ perl -e '/\7777777777/'
Segmentation fault
Upstream issue:
https://rt.perl.org/Public/Bug/Display.html?id=119505
Upstream patch:
http://perl5.git.perl.org/perl.git/commitdiff/0c2990d652e985784f095bba4bc...
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=WDfiMmElTR&a=cc_unsubscribe
8Â years, 4Â months
[Bug 1046006] New: Slicing a .stl file fails if multiple threads are configured
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1046006
Bug ID: 1046006
Summary: Slicing a .stl file fails if multiple threads are
configured
Product: Fedora
Version: 20
Component: slic3r
Severity: high
Assignee: mhroncok(a)redhat.com
Reporter: neil(a)darlow.co.uk
QA Contact: extras-qa(a)fedoraproject.org
CC: mhroncok(a)redhat.com,
perl-devel(a)lists.fedoraproject.org
Description of problem:
If 2 (the default) or higher is selected in Print Settings|Advanced|Threads an
error is reported and slicing fails.
Version-Release number of selected component (if applicable):
slic3r-1.0.0-0.2.RC1.fc20.x86_64
How reproducible:
Every time
Steps to Reproduce:
1. Attempt to slice a .stl file with default settings
2. Observe error and slicing failure
Actual results:
Can't locate package GLUquadricObjPtr for @OpenGL::Quad::ISA at
/usr/share/perl5/vendor_perl/Slic3r.pm line 111.
Expected results:
Slicing should be performed without error.
Additional info:
Reducing the Threads value to 1 permits slicing to be performed.
I have reported this upstream as Issue #1636 at
https://github.com/alexrj/Slic3r
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=PDOy8kmGQD&a=cc_unsubscribe
8Â years, 4Â months
[Bug 1006931] New: perl-Filesys-SmbClient missing flag compatibility with samba4
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1006931
Bug ID: 1006931
Summary: perl-Filesys-SmbClient missing flag compatibility with
samba4
Product: Fedora
Version: 18
Component: perl-Filesys-SmbClient
Severity: medium
Assignee: fedorapkg(a)rule.lv
Reporter: aebenjam(a)opentext.com
QA Contact: extras-qa(a)fedoraproject.org
CC: fedorapkg(a)rule.lv, perl-devel(a)lists.fedoraproject.org
Description of problem:
Unable to use kerberos via Filesys::SmbClient
Version-Release number of selected component (if applicable):
Filesys-SmbClient-3.2
How reproducible:
Create a new Filesys::SmbClient in perl with the option
flags => SMB_CTX_FLAG_USE_KERBEROS
Does not invoke the use of KERBEROS.
Furthermore, making the perl module manually reveals the missing option, and
the code in the header file notes the new mechanism by which kerberos is
enabled. Note that, when using the provided rpm, the invocation fails silently
back to password - which runs the risk of locking your account out as the
password is not likely provided.
Steps to Reproduce:
my $smb = new Filesys::SmbClient(
username => "user",
password => "", # working, via kerberos
workgroup => "DOMAIN",
flags => SMB_CTX_FLAG_USE_KERBEROS,
debug => 10);
Actual results:
Attempts password based login.
Expected results:
Uses existing kerberos credentials.
Additional info:
See /usr/include/samba-4.0/libsmbclient.h for new method of management.
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=UG4DnM5BZ8&a=cc_unsubscribe
8Â years, 4Â months
[Bug 997645] New: gtk colored buttons
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=997645
Bug ID: 997645
Summary: gtk colored buttons
Product: Fedora
Version: 18
Component: perl-Gtk2
Assignee: tcallawa(a)redhat.com
Reporter: aebenjam(a)opentext.com
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org,
tcallawa(a)redhat.com
Description of problem: perl-gtk2 applications that set the background color
for buttons aren't producing colored output.
Version-Release number of selected component (if applicable):
perl-Gtk2-1.247-1.fc18.x86_64
How reproducible:
Create a trivial perl-gtk application with a coloured button.
Steps to Reproduce:
1. see below for code example to run
Actual results:
Button is created, but no colour.
Expected results:
Coloured button. (Red.)
Additional info:
Note: this worked as expected in Fedora 17. (perl-Gtk2-1.241-2.fc17.i686)
Sample colored button code:
#!/bin/perl
use Gtk2 qw/-init/;
my $window = Gtk2::Window->new;
$window->set_title("Window!");
my $button = Gtk2::Button->new("Coloured _button");
# does not affect text
$button->modify_bg(normal => Gtk2::Gdk::Color->new(0xffff, 0, 0));
$window->add($button);
$window->show_all;
Gtk2->main;
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=oIE2F6zBK1&a=cc_unsubscribe
8Â years, 4Â months
[Bug 1209748] New: Upgrade to new upstream version
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1209748
Bug ID: 1209748
Summary: Upgrade to new upstream version
Product: Fedora EPEL
Version: epel7
Component: stompclt
Assignee: massimo.paladin(a)gmail.com
Reporter: lionel.cons(a)cern.ch
QA Contact: extras-qa(a)fedoraproject.org
CC: alexandre.beche(a)gmail.com, massimo.paladin(a)gmail.com,
perl-devel(a)lists.fedoraproject.org
The latest version of stompclt is now 1.3.
This is the version to use everywhere. Please upgrade in EPEL.
--
You are receiving this mail because:
You are on the CC list for the bug.
8Â years, 5Â months
[Bug 1094440] New: perl-libwww-perl: incorrect handling of SSL certificate verification
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1094440
Bug ID: 1094440
Summary: perl-libwww-perl: incorrect handling of SSL
certificate verification
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: high
Priority: high
Assignee: security-response-team(a)redhat.com
Reporter: vdanen(a)redhat.com
CC: jkurik(a)redhat.com, mmaslano(a)redhat.com,
perl-devel(a)lists.fedoraproject.org,
perl-maint-list(a)redhat.com, ppisar(a)redhat.com,
psabata(a)redhat.com
It was reported [1] that libwww-perl (LWP), when using IO::Socket::SSL (the
default) and when the HTTPS_CA_DIR or HTTPS_CA_FILE environment variables were
set, would disable server certificate verification. Judging by the commit [2],
the intention was to disable only hostname verification for compatibility with
Crypt::SSLeay, but the resultant effect is that SSL_verify_mode is set to 0.
This code was introduced in LWP::Protocol::https in version 6.04, so earlier
versions are not vulnerable.
Potential patches [3],[4] are being discussed upstream [5].
[1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746579
[2]
https://github.com/dagolden/lwp-protocol-https/commit/bcc46ce2dab53d2e2ba...
[3]
https://github.com/noxxi/lwp-protocol-https/commit/1b924708663f457a4f7c25...
[4]
https://github.com/noxxi/lwp-protocol-https/commit/6b5c876de80451ee54de5d...
[5] https://github.com/libwww-perl/lwp-protocol-https/pull/14
Statement:
This issue did not affect the versions of perl-libwww-perl as shipped with Red
Hat Enterprise Linux 5 and 6.
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=6oOhABRd7w&a=cc_unsubscribe
8Â years, 5Â months