[Bug 1450364] New: read_file(, binmode => ':utf8) produces warnings
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1450364
Bug ID: 1450364
Summary: read_file(, binmode => ':utf8) produces warnings
Product: Fedora
Version: 25
Component: perl-File-Slurp
Keywords: Regression
Assignee: rc040203(a)freenet.de
Reporter: ppisar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: lxtnow(a)gmail.com, perl-devel(a)lists.fedoraproject.org,
rc040203(a)freenet.de
External Bug ID: CPAN 117005
Perl 5.24 started to warn when performing sysread() on a UTF-8 file handle
<http://search.cpan.org/~shay/perl-5.24.1/pod/perl5240delta.pod#sysread(),...>.
That means File::Slurp as provided in Fedora 25
(perl-File-Slurp-9999.19-15.fc25.noarch) and newer triggers the warning:
$ perl -MFile::Slurp -e 'File::Slurp::read_file(q{/etc/hosts}, q{binmode} =>
q{:utf8})'
sysread() is deprecated on :utf8 handles at
/usr/share/perl5/vendor_perl/File/Slurp.pm line 225.
It would be great to fix File::Slurp not to produce the warning.
--
You are receiving this mail because:
You are on the CC list for the bug.
4 years, 3 months
[Bug 1487209] New: perl-Graphics-TIFF-6-1.fc27 FTBFS:
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1487209
Bug ID: 1487209
Summary: perl-Graphics-TIFF-6-1.fc27 FTBFS:
Product: Fedora
Version: 27
Component: perl-Graphics-TIFF
Assignee: ppisar(a)redhat.com
Reporter: ppisar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: jplesnik(a)redhat.com,
perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com
perl-Graphics-TIFF-6-1.fc27 fails to build in F27 because a test crashes:
"/usr/bin/perl" -MExtUtils::Command::MM -e 'cp_nonempty' -- TIFF.bs
blib/arch/auto/Graphics/TIFF/TIFF.bs 644
PERL_DL_NONLAZY=1 "/usr/bin/perl" "-MExtUtils::Command::MM" "-MTest::Harness"
"-e" "undef *Test::Harness::Switches; test_harness(0, 'blib/lib', 'blib/arch')"
t/*.t
perl: MagickCore/exception.c:1034: ThrowMagickExceptionList: Assertion
`exception->signature == MagickCoreSignature' failed.
t/1.t ............
Failed 35/43 subtests
t/2.t ............ ok
t/8_enums.t ...... ok
t/90_MANIFEST.t .. ok
t/91_critic.t .... skipped: Author test. Set $ENV{TEST_AUTHOR} to a true value
to run.
t/92_tiffinfo.t .. ok
t/93_tiff2pdf.t .. ok
Test Summary Report
-------------------
t/1.t (Wstat: 134 Tests: 8 Failed: 0)
Non-zero wait status: 134
Parse errors: Bad plan. You planned 43 tests but ran 8.
A difference between working and failing build root is:
ImageMagick-perl 6.9.9.3-3.fc27 > 7.0.6.9-4.fc27
ImageMagick-libs 6.9.9.3-3.fc27 > 7.0.6.9-4.fc27
krb5-libs 1.15.1-22.fc27 > 1.15.1-25.fc27
sqlite-libs 3.20.0-1.fc27 > 3.20.0-2.fc27
gdb-headless 8.0-23.fc27 > 8.0-24.fc27
--
You are receiving this mail because:
You are on the CC list for the bug.
4 years, 3 months
[Bug 1377997] New: perl-libxml-perl:
Expanding external entities by default [fedora-all]
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1377997
Bug ID: 1377997
Summary: perl-libxml-perl: Expanding external entities by
default [fedora-all]
Product: Fedora
Version: 24
Component: perl-libxml-perl
Keywords: Security, SecurityTracking
Severity: high
Priority: high
Assignee: jplesnik(a)redhat.com
Reporter: amaris(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: jplesnik(a)redhat.com,
perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com
Blocks: 1377996
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of Fedora.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
[bug automatically created by: add-tracking-bugs]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1377996
[Bug 1377996] perl-libxml-perl: Expanding external entities by default
--
You are receiving this mail because:
You are on the CC list for the bug.
4 years, 3 months
[Bug 1379554] New: perl-XML-Twig:
expand_external_ents option fails to work as documented [fedora-all]
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1379554
Bug ID: 1379554
Summary: perl-XML-Twig: expand_external_ents option fails to
work as documented [fedora-all]
Product: Fedora
Version: 24
Component: perl-XML-Twig
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: jplesnik(a)redhat.com
Reporter: dmoppert(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: cweyl(a)alumni.drew.edu, jplesnik(a)redhat.com,
perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com
Blocks: 1379553
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of Fedora.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
[bug automatically created by: add-tracking-bugs]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1379553
[Bug 1379553] perl-XML-Twig: expand_external_ents option fails to work as
documented
--
You are receiving this mail because:
You are on the CC list for the bug.
4 years, 3 months
[Bug 1231244] New: perl-HTTP-Proxy-0.303-2.fc23: FTBFS with Perl 5.22
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1231244
Bug ID: 1231244
Summary: perl-HTTP-Proxy-0.303-2.fc23: FTBFS with Perl 5.22
Product: Fedora
Version: rawhide
Component: perl-HTTP-Proxy
Assignee: tcallawa(a)redhat.com
Reporter: jplesnik(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org,
tcallawa(a)redhat.com
Created attachment 1038071
--> https://bugzilla.redhat.com/attachment.cgi?id=1038071&action=edit
Build log
The build of perl-HTTP-Proxy failed during Perl 5.22 mass rebuild with
following errors:
# Failed test 'Read some data from the socket'
# at t/23connect.t line 79.
# Failed test 'CONNECTed to the TCP server and got the banner'
# at t/23connect.t line 80.
# got: undef
# expected: 'President_of_Earth Barbarella Professor_Ping Stomoxys Dildano
# '
[Sat Jun 6 13:11:14 2015] (16454) CONNECT: Read undef from server (Bad file
descriptor)
t/23connect.t .............
Failed 2/4 subtests
--
You are receiving this mail because:
You are on the CC list for the bug.
4 years, 3 months
[Bug 1207174] New: perl-IO-Socket-INET6-2.72-3.fc23 FTBFS sometimes: Can't use an undefined value as a symbol reference at t/io_multihomed6.t line 116.
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1207174
Bug ID: 1207174
Summary: perl-IO-Socket-INET6-2.72-3.fc23 FTBFS sometimes:
Can't use an undefined value as a symbol reference at
t/io_multihomed6.t line 116.
Product: Fedora
Version: rawhide
Component: perl-IO-Socket-INET6
Assignee: wtogami(a)gmail.com
Reporter: ppisar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org,
psabata(a)redhat.com, wtogami(a)gmail.com
perl-IO-Socket-INET6-2.72-3.fc23 fails to build in F23 sometimes because
t/io_multihomed6.t test fails from time to time:
$ I=0; while (prove -b t/io_multihomed6.t); do I=$((I+1)); echo $I; done
[...]
206
t/io_multihomed6.t .. ok
All tests successful.
Files=1, Tests=8, 1 wallclock secs ( 0.03 usr 0.01 sys + 0.05 cusr 0.01
csys = 0.10 CPU)
Result: PASS
207
t/io_multihomed6.t .. 1/8 Can't use an undefined value as a symbol reference at
t/io_multihomed6.t line 116.
Can't use an undefined value as a symbol reference at t/io_multihomed6.t line
156.
t/io_multihomed6.t .. Dubious, test returned 98 (wstat 25088, 0x6200)
Failed 7/8 subtests
--
You are receiving this mail because:
You are on the CC list for the bug.
4 years, 3 months
[Bug 1011333] New: PerlIO::via leaks a foreign memory
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1011333
Bug ID: 1011333
Summary: PerlIO::via leaks a foreign memory
Product: Fedora
Version: 18
Component: perl
Assignee: jplesnik(a)redhat.com
Reporter: ppisar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: cweyl(a)alumni.drew.edu, iarnell(a)gmail.com,
jplesnik(a)redhat.com, kasal(a)ucw.cz,
perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com,
psabata(a)redhat.com, rc040203(a)freenet.de,
tcallawa(a)redhat.com
This simple test:
#!/usr/bin/perl
use strict;
use warnings;
#use utf8;
{
package PerlIO::via::Bug;
sub PUSHED {
return bless {}, $_[0];
}
sub READ {
return $_[2];
}
}
open my $fh, '<:raw:via(Bug)', '/dev/null' or die "Cannot open, $! $?";
read $fh, ( my $buf ), 1024;
print $buf;
accesses foreign data (and puts them into $buf and prints them). All perls are
affected, the specific output depends on perl version and on the "use utf8"
pragma. Valgrinds warns on write(2) with uninitialized memory.
Reported to upstream as
<https://rt.perl.org/rt3//Public/Bug/Display.html?id=119961>.
All Fedoras are affected.
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=5fpvmuMaSf&a=cc_unsubscribe
4 years, 3 months
[Bug 1007199] New: perl segfaults when pushing a glob to thread-shared array
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1007199
Bug ID: 1007199
Summary: perl segfaults when pushing a glob to thread-shared
array
Product: Fedora
Version: 18
Component: perl
Assignee: jplesnik(a)redhat.com
Reporter: ppisar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: cweyl(a)alumni.drew.edu, iarnell(a)gmail.com,
jplesnik(a)redhat.com, kasal(a)ucw.cz,
perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com,
psabata(a)redhat.com, rc040203(a)freenet.de,
tcallawa(a)redhat.com
$ perl -Mthreads -Mthreads::shared -e 'my @a :shared; push @a, *STDOUT'
Segmentation fault
This crash has been reported to upstream
<https://rt.perl.org/rt3//Public/Bug/Display.html?id=119719>.
All Fedoras are affected. (Tested with perl-libs-5.16.3-265.fc19.x86_64,
perl-threads-1.87-1.fc19.x86_64, perl-threads-shared-1.43-2.fc19.x86_64.)
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=VvUjpe7qxd&a=cc_unsubscribe
4 years, 3 months
[Bug 987118] New: perl-5.18: File handles modified with binmode ':unix' leak
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=987118
Bug ID: 987118
Summary: perl-5.18: File handles modified with binmode ':unix'
leak
Product: Fedora
Version: rawhide
Component: perl
Assignee: mmaslano(a)redhat.com
Reporter: ppisar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: cweyl(a)alumni.drew.edu, iarnell(a)gmail.com,
jplesnik(a)redhat.com, kasal(a)ucw.cz,
mmaslano(a)redhat.com,
perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com,
psabata(a)redhat.com, rc040203(a)freenet.de,
tcallawa(a)redhat.com
File handle will leak the close() call if has been modified with binmode to
':unix' layer.
[test@fedora-20 tmp]$ cat test
for my $x (1 .. 10000) {
open my $temp, '>', "/tmp/t" or die "$!";
binmode $temp, ":unix";
close $temp;
}
[test@fedora-20 tmp]$ perl ./test
Too many open files at ./test line 2.
Reported to upstream
<https://rt.perl.org:443/rt3/Ticket/Display.html?id=118957>.
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=UDC1hZzy1Y&a=cc_unsubscribe
4 years, 3 months