https://bugzilla.redhat.com/show_bug.cgi?id=1380983
Bug ID: 1380983
Summary: Package metadata for perl-Gtk2-Unique lists the wrong
URL.
Product: Fedora
Version: rawhide
Component: perl-Gtk2-Unique
Assignee: liangsuilong(a)gmail.com
Reporter: andrew(a)tosk.in
QA Contact: extras-qa(a)fedoraproject.org
CC: liangsuilong(a)gmail.com,
perl-devel(a)lists.fedoraproject.org
Hello, liangsuilong
This is a fairly minor problem, but the package metadata for perl-Gtk2-Unique
is out-of-date. It currently lists the project's URL as
https://live.gnome.org/LibUnique.
but GNOME no longer uses the "live" subdomain; requests now get redirected to
the wiki. The newer equivalent URL is
https://wiki.gnome.org/Attic/LibUnique
...but that page says libunique is deprecated and offers a link to the
GtkApplication porting guide.
(I'm filing this same bug report for multiple packages, so I apologize if you
see this issue twice.)
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1198991
Bug ID: 1198991
Summary: License tag should mention GPLv2+
Product: Fedora
Version: rawhide
Component: perl-Text-Template
Assignee: tcallawa(a)redhat.com
Reporter: ppisar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org,
tcallawa(a)redhat.com
External Bug ID: CPAN 102523
External Bug ID: CPAN 102523
Current package, perl-Text-Template-1.45-17.fc23, declares license as "GPL+ or
Artistic", but the content states "GPLv2+ or Artistic" many times. See upstream
bug report <https://rt.cpan.org/Public/Bug/Display.html?id=102523>.
I believe the license tag should be changed to "GPLv2+ or Artistic" (or to
"(GPL+ or Artistic) and (GPLv2+ or Artistic)" until upstream clarifies the
report).
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=Zq8a82s6bW&a=cc_unsubscribe
https://bugzilla.redhat.com/show_bug.cgi?id=1315525
Bug ID: 1315525
Summary: perl-Net-DNS-1.05 is available
Product: Fedora
Version: rawhide
Component: perl-Net-DNS
Keywords: FutureFeature, Triaged
Assignee: pwouters(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org,
psabata(a)redhat.com, pwouters(a)redhat.com
Latest upstream release: 1.05
Current version/release in rawhide: 1.04-3.fc24
URL: http://search.cpan.org/dist/Net-DNS/
Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1389064
Bug ID: 1389064
Summary: EPEL7 branch missing (required for psad)
Product: Fedora
Version: rawhide
Component: perl-IPTables-ChainMgr
Assignee: mitr(a)redhat.com
Reporter: dominik(a)greysector.net
QA Contact: extras-qa(a)fedoraproject.org
CC: mitr(a)redhat.com, perl-devel(a)lists.fedoraproject.org
Description of problem:
EPEL7 branch is missing for perl-IPTables-ChainMgr, preventing psad from being
installed. Please build it for EPEL7.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1377996
Bug ID: 1377996
Summary: perl-libxml-perl: Expanding external entities by
default
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: high
Priority: high
Assignee: security-response-team(a)redhat.com
Reporter: amaris(a)redhat.com
CC: jplesnik(a)redhat.com,
perl-devel(a)lists.fedoraproject.org,
perl-maint-list(a)redhat.com, ppisar(a)redhat.com,
psabata(a)redhat.com
It was found that XML::LibXML is vulnerable to XXE attack as it has enabled
external entity loading by default.
Bug report:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838097
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1029710
Bug ID: 1029710
Summary: Amavisd fails to identify attached zipped files with
.exe extensions
Product: Fedora EPEL
Version: el6
Component: amavisd-new
Severity: medium
Assignee: steve(a)silug.org
Reporter: s10dal(a)elrepo.org
QA Contact: extras-qa(a)fedoraproject.org
CC: janfrode(a)tanso.net, kanarip(a)kanarip.com,
perl-devel(a)lists.fedoraproject.org, steve(a)silug.org
Description of problem:
Mail attachments containing zipped files with .exe extensions are not properly
identified due to a failure of 7za (p7zip) as called by amavisd to correctly
list the contents of the zipped file. Based on maillog errors, the failure
appears to be due to an improperly composed 7za option, specifically -w not
being separated from the target by a separator (e.g., space character).
Manually executing 7za using the options noted in the maillog error (see below)
demonstrates the need to insert a separator between the -w option and the
target.
Fails: $ 7za l -slt -w./contains_exe.zip
Works: $ 7za l -slt -w ./contains_exe.zip
Also, this issue may be specific to EL6. This issue came to my attention
because an EL6 mail server acting as a Backup MX for an EL5 mail server was
forwarding zipped exe attachments, which were correctly identified and
quarantined on the EL5 system.
Version-Release number of selected component (if applicable):
# uname -rpmi
2.6.32-358.23.2.el6.i686 i686 i686 i386
# rpm -q amavisd-new p7zip
amavisd-new-2.8.0-4.el6.noarch
p7zip-9.20.1-2.el6.i686
How reproducible:
Very. Observed on 3 EL6 mail servers.
Steps to Reproduce:
1. Install/configure postfix, amavisd-new, clam\*, etc.
2. Create a test attachment:
$ touch test.exe
$ 7za a -tzip test_exe.zip test.exe
3. Send a mail with test_exe.zip attached
4. Check /var/log/maillog for the specific error
Actual results:
From /var/log/maillog:
Nov 12 17:17:46 Mail amavis[1568]: (28807-12) (!)run_command: child process
[1568]: run_command: failed to exec /usr/bin/7za l -slt
-w/var/spool/amavisd/tmp/amavis-20131112T051218-28807-HPbWePoN/parts --
/var/spool/amavisd/tmp/amavis-20131112T051218-28807-HPbWePoN/parts/p002: 13 at
/usr/sbin/amavisd line 4062.
Nov 12 17:17:46 Mail amavis[28807]: (28807-12) (!)Decoding of p002 (Zip archive
data, at least v1.0 to extract) failed, leaving it unpacked: do_7zip: can't get
a list of archive members: exit 6; at (eval 117) line 781.
Expected results:
Identify zipped exe file as such.
Additional info:
It may not be relevant to the observed error, but 8 months ago, amavisd-new and
clam\* were converted from RepoForge/RPMforge versions to EPEL versions. Except
for a few initial hiccups, the mail servers have been running without apparent
issues until the current 7za issue was observed.
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=KMKdGzsZdn&a=cc_unsubscribe
https://bugzilla.redhat.com/show_bug.cgi?id=1283764
Bug ID: 1283764
Summary: Use of uninitialized value in numeric eq (==) at
/usr/share/perl5/vendor_perl/File/Tail.pm line 391
Product: Fedora
Version: 23
Component: perl-File-Tail
Assignee: tcallawa(a)redhat.com
Reporter: h.reindl(a)thelounge.net
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org,
tcallawa(a)redhat.com
Nov 19 12:20:09 testserver perl: Use of uninitialized value in numeric eq (==)
at /usr/share/perl5/vendor_perl/File/Tail.pm line 391
i guess mailgraph triggers that bug
[root@testserver:~]$ rpm -q --file /usr/share/perl5/vendor_perl/File/Tail.pm
perl-File-Tail-1.3-1.fc23.noarch
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1378895
Bug ID: 1378895
Summary: 8-bpp TIFF images are broken in the resulting PDF
document
Product: Fedora
Version: 23
Component: perl-PDF-API2
Assignee: jplesnik(a)redhat.com
Reporter: ppisar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bjohnson(a)symetrix.com, jplesnik(a)redhat.com,
perl-devel(a)lists.fedoraproject.org
Blocks: 1369984
External Bug ID: CPAN 118047
Created attachment 1204154
--> https://bugzilla.redhat.com/attachment.cgi?id=1204154&action=edit
8-bpp TIFF image
This code creates an PDF with broken 8-bpp TIFF image:
#!/usr/bin/perl
use strict;
use warnings;
use PDF::API2;
my $pdf = PDF::API2->new(-file => 'out.pdf');
my $page = $pdf->page;
$page->mediabox(157, 196);
my $imgobj = $pdf->image_tiff('8.tiff');
my $gfx = $page->gfx;
$gfx->image($imgobj, 0, 0, 157, 196);
$pdf->save;
$pdf->end;
It works fine if the TIFF image has only 1 bit per pixel. I have
perl-PDF-API2-2.025-1.fc23.noarch, but it it's broken in all Fedoras.
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1369984
[Bug 1369984] gscan2pdf v1.3.8 saves imported PDF pages as negative images
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1335443
Bug ID: 1335443
Summary: Net::SSLeay produces a warning on EOF
Product: Fedora
Version: 22
Component: perl-Net-SSLeay
Severity: low
Assignee: paul(a)city-fan.org
Reporter: lav(a)yars.free.net
QA Contact: extras-qa(a)fedoraproject.org
CC: jose.p.oliveira.oss(a)gmail.com, kasal(a)ucw.cz,
paul(a)city-fan.org, perl-devel(a)lists.fedoraproject.org
Created attachment 1156525
--> https://bugzilla.redhat.com/attachment.cgi?id=1156525&action=edit
proposed fix
Description of problem:
I repeatedly get this warning from Net::SSLeay:
Use of uninitialized value $got in string eq at blib/lib/Net/SSLeay.pm
(autosplit into blib/lib/auto/Net/SSLeay/ssl_read_all.al) line 549.
Version-Release number of selected component (if applicable):
perl-Net-SSLeay-1.68-1.fc22.x86_64
Expected results:
no warnings
Additional info:
a patch is attached.
--
You are receiving this mail because:
You are on the CC list for the bug.