https://bugzilla.redhat.com/show_bug.cgi?id=1599926
Bug ID: 1599926
Summary: perl-BSON-v1.6.7 is available
Product: Fedora
Version: rawhide
Component: perl-BSON
Keywords: FutureFeature, Triaged
Assignee: ppisar(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com
Latest upstream release: v1.6.7
Current version/release in rawhide: 1.6.6-4.fc29
URL: http://search.cpan.org/dist/BSON/
Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from anitya:
https://release-monitoring.org/project/12628/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1593041
Bug ID: 1593041
Summary: perl-BSON-v1.6.5 is available
Product: Fedora
Version: rawhide
Component: perl-BSON
Keywords: FutureFeature, Triaged
Assignee: ppisar(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com
Latest upstream release: v1.6.5
Current version/release in rawhide: 1.6.4-1.fc29
URL: http://search.cpan.org/dist/BSON/
Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from anitya:
https://release-monitoring.org/project/12628/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1591047
Bug ID: 1591047
Summary: perl-BSON-v1.6.4 is available
Product: Fedora
Version: rawhide
Component: perl-BSON
Keywords: FutureFeature, Triaged
Assignee: ppisar(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com
Latest upstream release: v1.6.4
Current version/release in rawhide: 1.6.3-1.fc29
URL: http://search.cpan.org/dist/BSON/
Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from anitya:
https://release-monitoring.org/project/12628/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1582677
Bug ID: 1582677
Summary: perl-BSON-v1.6.3 is available
Product: Fedora
Version: rawhide
Component: perl-BSON
Keywords: FutureFeature, Triaged
Assignee: ppisar(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com
Latest upstream release: v1.6.3
Current version/release in rawhide: 1.6.2-1.fc29
URL: http://search.cpan.org/dist/BSON/
Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from anitya:
https://release-monitoring.org/project/12628/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1582336
Bug ID: 1582336
Summary: perl-BSON-v1.6.2 is available
Product: Fedora
Version: rawhide
Component: perl-BSON
Keywords: FutureFeature, Triaged
Assignee: ppisar(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com
Latest upstream release: v1.6.2
Current version/release in rawhide: 1.6.1-1.fc29
URL: http://search.cpan.org/dist/BSON/
Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from anitya:
https://release-monitoring.org/project/12628/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1450364
Bug ID: 1450364
Summary: read_file(, binmode => ':utf8) produces warnings
Product: Fedora
Version: 25
Component: perl-File-Slurp
Keywords: Regression
Assignee: rc040203(a)freenet.de
Reporter: ppisar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: lxtnow(a)gmail.com, perl-devel(a)lists.fedoraproject.org,
rc040203(a)freenet.de
External Bug ID: CPAN 117005
Perl 5.24 started to warn when performing sysread() on a UTF-8 file handle
<http://search.cpan.org/~shay/perl-5.24.1/pod/perl5240delta.pod#sysread(),_s…>.
That means File::Slurp as provided in Fedora 25
(perl-File-Slurp-9999.19-15.fc25.noarch) and newer triggers the warning:
$ perl -MFile::Slurp -e 'File::Slurp::read_file(q{/etc/hosts}, q{binmode} =>
q{:utf8})'
sysread() is deprecated on :utf8 handles at
/usr/share/perl5/vendor_perl/File/Slurp.pm line 225.
It would be great to fix File::Slurp not to produce the warning.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1487209
Bug ID: 1487209
Summary: perl-Graphics-TIFF-6-1.fc27 FTBFS:
Product: Fedora
Version: 27
Component: perl-Graphics-TIFF
Assignee: ppisar(a)redhat.com
Reporter: ppisar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: jplesnik(a)redhat.com,
perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com
perl-Graphics-TIFF-6-1.fc27 fails to build in F27 because a test crashes:
"/usr/bin/perl" -MExtUtils::Command::MM -e 'cp_nonempty' -- TIFF.bs
blib/arch/auto/Graphics/TIFF/TIFF.bs 644
PERL_DL_NONLAZY=1 "/usr/bin/perl" "-MExtUtils::Command::MM" "-MTest::Harness"
"-e" "undef *Test::Harness::Switches; test_harness(0, 'blib/lib', 'blib/arch')"
t/*.t
perl: MagickCore/exception.c:1034: ThrowMagickExceptionList: Assertion
`exception->signature == MagickCoreSignature' failed.
t/1.t ............
Failed 35/43 subtests
t/2.t ............ ok
t/8_enums.t ...... ok
t/90_MANIFEST.t .. ok
t/91_critic.t .... skipped: Author test. Set $ENV{TEST_AUTHOR} to a true value
to run.
t/92_tiffinfo.t .. ok
t/93_tiff2pdf.t .. ok
Test Summary Report
-------------------
t/1.t (Wstat: 134 Tests: 8 Failed: 0)
Non-zero wait status: 134
Parse errors: Bad plan. You planned 43 tests but ran 8.
A difference between working and failing build root is:
ImageMagick-perl 6.9.9.3-3.fc27 > 7.0.6.9-4.fc27
ImageMagick-libs 6.9.9.3-3.fc27 > 7.0.6.9-4.fc27
krb5-libs 1.15.1-22.fc27 > 1.15.1-25.fc27
sqlite-libs 3.20.0-1.fc27 > 3.20.0-2.fc27
gdb-headless 8.0-23.fc27 > 8.0-24.fc27
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1377997
Bug ID: 1377997
Summary: perl-libxml-perl: Expanding external entities by
default [fedora-all]
Product: Fedora
Version: 24
Component: perl-libxml-perl
Keywords: Security, SecurityTracking
Severity: high
Priority: high
Assignee: jplesnik(a)redhat.com
Reporter: amaris(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: jplesnik(a)redhat.com,
perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com
Blocks: 1377996
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of Fedora.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
[bug automatically created by: add-tracking-bugs]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1377996
[Bug 1377996] perl-libxml-perl: Expanding external entities by default
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1379554
Bug ID: 1379554
Summary: perl-XML-Twig: expand_external_ents option fails to
work as documented [fedora-all]
Product: Fedora
Version: 24
Component: perl-XML-Twig
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: jplesnik(a)redhat.com
Reporter: dmoppert(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: cweyl(a)alumni.drew.edu, jplesnik(a)redhat.com,
perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com
Blocks: 1379553
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of Fedora.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
[bug automatically created by: add-tracking-bugs]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1379553
[Bug 1379553] perl-XML-Twig: expand_external_ents option fails to work as
documented
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1231244
Bug ID: 1231244
Summary: perl-HTTP-Proxy-0.303-2.fc23: FTBFS with Perl 5.22
Product: Fedora
Version: rawhide
Component: perl-HTTP-Proxy
Assignee: tcallawa(a)redhat.com
Reporter: jplesnik(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org,
tcallawa(a)redhat.com
Created attachment 1038071
--> https://bugzilla.redhat.com/attachment.cgi?id=1038071&action=edit
Build log
The build of perl-HTTP-Proxy failed during Perl 5.22 mass rebuild with
following errors:
# Failed test 'Read some data from the socket'
# at t/23connect.t line 79.
# Failed test 'CONNECTed to the TCP server and got the banner'
# at t/23connect.t line 80.
# got: undef
# expected: 'President_of_Earth Barbarella Professor_Ping Stomoxys Dildano
# '
[Sat Jun 6 13:11:14 2015] (16454) CONNECT: Read undef from server (Bad file
descriptor)
t/23connect.t .............
Failed 2/4 subtests
--
You are receiving this mail because:
You are on the CC list for the bug.