[Bug 1230606] New: Upgrade perl-HTTP-OAI to 4.03
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1230606
Bug ID: 1230606
Summary: Upgrade perl-HTTP-OAI to 4.03
Product: Fedora
Version: rawhide
Component: perl-HTTP-OAI
Keywords: FutureFeature
Assignee: vanoudt(a)gmail.com
Reporter: ppisar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org, vanoudt(a)gmail.com
Latest Fedora delivers perl-HTTP-OAI 3.27. Upstream released 4.03. Please
upgrade.
Also please enable monitoring service to receive reports about new releases.
--
You are receiving this mail because:
You are on the CC list for the bug.
6 years, 2 months
[Bug 1304825] New: rt-4.4.0 is available
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1304825
Bug ID: 1304825
Summary: rt-4.4.0 is available
Product: Fedora
Version: rawhide
Component: rt
Keywords: FutureFeature, Triaged
Assignee: rc040203(a)freenet.de
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org,
rc040203(a)freenet.de, tibbs(a)math.uh.edu
Latest upstream release: 4.4.0
Current version/release in rawhide: 4.2.12-1.fc24
URL: https://www.bestpractical.com/rt/
Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
--
You are receiving this mail because:
You are on the CC list for the bug.
6 years, 2 months
[Bug 347901] New: Port perl-IO-Socket-SSL to use NSS library for cryptography
by Red Hat Bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.
https://bugzilla.redhat.com/show_bug.cgi?id=347901
Summary: Port perl-IO-Socket-SSL to use NSS library for
cryptography
Product: Fedora
Version: devel
Platform: All
OS/Version: Linux
Status: NEW
Severity: medium
Priority: medium
Component: perl-IO-Socket-SSL
AssignedTo: wtogami(a)redhat.com
ReportedBy: pvrabec(a)redhat.com
QAContact: extras-qa(a)fedoraproject.org
CC: fedora-perl-devel-
list@redhat.com,jpo@di.uminho.pt,tmraz(a)redhat.com
perl-IO-Socket-SSL should be ported to use NSS library for cryptography.
See the tracking bug for details and links on how it could be done.
--
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.
6 years, 2 months
[Bug 1242980] New: Compiler warnings in hv_func.h
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1242980
Bug ID: 1242980
Summary: Compiler warnings in hv_func.h
Product: Fedora
Version: rawhide
Component: perl
Assignee: jplesnik(a)redhat.com
Reporter: jsafrane(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: cweyl(a)alumni.drew.edu, iarnell(a)gmail.com,
jplesnik(a)redhat.com, kasal(a)ucw.cz,
perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com,
psabata(a)redhat.com, rc040203(a)freenet.de,
tcallawa(a)redhat.com
I get following warnings when compiling net-snmp with -Wall:
gcc -c -I../../include -DNETSNMP_ENABLE_IPV6 -fno-strict-aliasing -g -O2
-Ulinux -Dlinux=linux -D_REENTRANT -D_GNU_SOURCE -fwrapv -fno-strict-aliasing
-pipe -fstack-protector -I/usr/local/include -D_LARGEFILE_SOURCE
-D_FILE_OFFSET_BITS=64 -I/usr/lib64/perl5/CORE -Wall -Wstrict-prototypes
-Wwrite-strings -Wcast-qual -I. -I/usr/local/include -D_REENTRANT -D_GNU_SOURCE
-fwrapv -fno-strict-aliasing -pipe -fstack-protector -I/usr/local/include
-D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -O2 -g -pipe -Wall
-Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions
-fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64
-mtune=generic -DVERSION=\"5.08\" -DXS_VERSION=\"5.08\" -fPIC
"-I/usr/lib64/perl5/CORE" default_store.c
In file included from /usr/lib64/perl5/CORE/hv.h:629:0,
from /usr/lib64/perl5/CORE/perl.h:3344,
from default_store.xs:6:
/usr/lib64/perl5/CORE/hv_func.h: In function ‘S_perl_hash_siphash_2_4’:
/usr/lib64/perl5/CORE/hv_func.h:201:23: warning: cast discards ‘const’
qualifier from pointer target type [-Wcast-qual]
U64TYPE k0 = ((U64TYPE*)seed)[0];
^
/usr/lib64/perl5/CORE/hv_func.h:202:23: warning: cast discards ‘const’
qualifier from pointer target type [-Wcast-qual]
U64TYPE k1 = ((U64TYPE*)seed)[1];
^
In file included from /usr/lib64/perl5/CORE/hv.h:629:0,
from /usr/lib64/perl5/CORE/perl.h:3344,
from default_store.xs:6:
/usr/lib64/perl5/CORE/hv_func.h: In function ‘S_perl_hash_superfast’:
/usr/lib64/perl5/CORE/hv_func.h:260:18: warning: cast discards ‘const’
qualifier from pointer target type [-Wcast-qual]
U32 hash = *((U32*)seed) + len;
^
In file included from /usr/lib64/perl5/CORE/hv.h:629:0,
from /usr/lib64/perl5/CORE/perl.h:3344,
from default_store.xs:6:
/usr/lib64/perl5/CORE/hv_func.h: In function ‘S_perl_hash_murmur3’:
/usr/lib64/perl5/CORE/hv_func.h:364:16: warning: cast discards ‘const’
qualifier from pointer target type [-Wcast-qual]
U32 h1 = *((U32*)seed);
^
In file included from /usr/lib64/perl5/CORE/hv.h:629:0,
from /usr/lib64/perl5/CORE/perl.h:3344,
from default_store.xs:6:
/usr/lib64/perl5/CORE/hv_func.h:401:21: warning: cast discards ‘const’
qualifier from pointer target type [-Wcast-qual]
k1 = U8TO32_LE(ptr);
^
/usr/lib64/perl5/CORE/hv_func.h:408:24: warning: cast discards ‘const’
qualifier from pointer target type [-Wcast-qual]
carry = U8TO32_LE(ptr);
^
/usr/lib64/perl5/CORE/hv_func.h:416:24: warning: cast discards ‘const’
qualifier from pointer target type [-Wcast-qual]
carry = U8TO32_LE(ptr);
^
/usr/lib64/perl5/CORE/hv_func.h:424:24: warning: cast discards ‘const’
qualifier from pointer target type [-Wcast-qual]
carry = U8TO32_LE(ptr);
^
/usr/lib64/perl5/CORE/hv_func.h: In function ‘S_perl_hash_djb2’:
/usr/lib64/perl5/CORE/hv_func.h:458:18: warning: cast discards ‘const’
qualifier from pointer target type [-Wcast-qual]
U32 hash = *((U32*)seed + len);
^
/usr/lib64/perl5/CORE/hv_func.h: In function ‘S_perl_hash_sdbm’:
/usr/lib64/perl5/CORE/hv_func.h:468:18: warning: cast discards ‘const’
qualifier from pointer target type [-Wcast-qual]
U32 hash = *((U32*)seed + len);
^
In file included from /usr/lib64/perl5/CORE/hv.h:629:0,
from /usr/lib64/perl5/CORE/perl.h:3344,
from default_store.xs:6:
/usr/lib64/perl5/CORE/hv_func.h: In function ‘S_perl_hash_one_at_a_time’:
/usr/lib64/perl5/CORE/hv_func.h:494:18: warning: cast discards ‘const’
qualifier from pointer target type [-Wcast-qual]
U32 hash = *((U32*)seed) + len;
^
/usr/lib64/perl5/CORE/hv_func.h: In function ‘S_perl_hash_one_at_a_time_hard’:
/usr/lib64/perl5/CORE/hv_func.h:509:18: warning: cast discards ‘const’
qualifier from pointer target type [-Wcast-qual]
U32 hash = *((U32*)seed) + len;
^
/usr/lib64/perl5/CORE/hv_func.h: In function ‘S_perl_hash_old_one_at_a_time’:
/usr/lib64/perl5/CORE/hv_func.h:544:18: warning: cast discards ‘const’
qualifier from pointer target type [-Wcast-qual]
U32 hash = *((U32*)seed);
^
This pollutes build logs and we may miss some useful warning. What about this?
- U32 hash = *((U32*)seed) + len;
+ U32 hash = (U32) *seed + len;
--
You are receiving this mail because:
You are on the CC list for the bug.
6 years, 2 months
[Bug 1297077] New: RFE: Perl6 for EPEL
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1297077
Bug ID: 1297077
Summary: RFE: Perl6 for EPEL
Product: Fedora
Version: 23
Component: perl-Perl6-Slurp
Severity: medium
Assignee: i(a)cicku.me
Reporter: ToddAndMargo(a)zoho.com
QA Contact: extras-qa(a)fedoraproject.org
CC: i(a)cicku.me, perl-devel(a)lists.fedoraproject.org
Perl6 is in Fedora 23. May we please have one for EL 7?
--
You are receiving this mail because:
You are on the CC list for the bug.
6 years, 3 months
[Bug 1308365] New: slic3r crashes when loading known good stl files
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1308365
Bug ID: 1308365
Summary: slic3r crashes when loading known good stl files
Product: Fedora
Version: 23
Component: slic3r
Assignee: mhroncok(a)redhat.com
Reporter: johnduchek(a)gmail.com
QA Contact: extras-qa(a)fedoraproject.org
CC: mhroncok(a)redhat.com,
perl-devel(a)lists.fedoraproject.org
Created attachment 1127097
--> https://bugzilla.redhat.com/attachment.cgi?id=1127097&action=edit
This is an stl file that slic3r is having trouble with. It is an sd card holder
Description of problem:
slic3r loads a known good stl file, announces that it is too large and was
automatically scaled down to fit your print bed, on saying 'ok' slic3r closes
completely.
The file is 'known good' as it loads into the slic3r in Fedora 22 with no
problem (not too large)
I ran from terminal with these results:
[jduchek@localhost ~]$ slic3r
Warning: File size doesn't match number of facets in the header
Caught C++ exception of unknown type at
/usr/share/perl5/vendor_perl/Slic3r/GUI/Plater.pm line 1791.
Version-Release number of selected component (if applicable):
1.2.9-3.fc23
How reproducible:
always on the files it decides are too large. Some files still load properly.
Steps to Reproduce:
1.Run slic3r
2.add affected file (stl)
3.say ok, when it tells you it has fixed the file.
Actual results: slic3r closes so you have to start over
Expected results: display the loaded file.
Additional info: I have attached an affected stl file
--
You are receiving this mail because:
You are on the CC list for the bug.
6 years, 3 months
[Bug 1295438] New: CVE-2015-8509 bugzilla: information leak when
parsing the CSV file
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1295438
Bug ID: 1295438
Summary: CVE-2015-8509 bugzilla: information leak when parsing
the CSV file
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: mprpic(a)redhat.com
CC: bazanluis20(a)gmail.com, emmanuel(a)seyman.fr,
itamar(a)ispbrasil.com.br,
perl-devel(a)lists.fedoraproject.org
Upstream Bugzilla fixed the following issue:
If an external HTML page contains a <script> element with its src attribute
pointing to a buglist in CSV format, some web browsers incorrectly try to parse
the CSV file as valid JavaScript code. As the buglist is generated based on the
privileges of the user logged into Bugzilla, the external page could collect
confidential data contained in the CSV file.
This issue was fixed in versions 4.2.16, 4.4.11, and 5.0.2.
Upstream bug:
https://bugzilla.mozilla.org/show_bug.cgi?id=1232785
--
You are receiving this mail because:
You are on the CC list for the bug.
6 years, 3 months