https://bugzilla.redhat.com/show_bug.cgi?id=2264848
Bug ID: 2264848
Summary: perl-Gtk2-1.24993-15.fc41 FTBFS: Can't load
'blib/arch/auto/Gtk2/Gtk2.so' for module Gtk2:
blib/arch/auto/Gtk2/Gtk2.so: undefined symbol:
SvGdkAtom at /usr/lib64/perl5/DynaLoader.pm line 206.
� at tools/podifystockitems.pl line 0.
Product: Fedora
Version: rawhide
URL: https://koschei.fedoraproject.org/package/perl-Gtk2
Status: NEW
Component: perl-Gtk2
Assignee: spotrh(a)gmail.com
Reporter: ppisar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org, spotrh(a)gmail.com
Blocks: 2260875 (F41FTBFS,RAWHIDEFTBFS)
Target Milestone: ---
Classification: Fedora
perl-Gtk2-1.24993-15.fc41 fails to build in Fedora 41:
Creating stock items POD...
Creating enum POD...
Can't load 'blib/arch/auto/Gtk2/Gtk2.so' for module Gtk2:
blib/arch/auto/Gtk2/Gtk2.so: undefined symbol: SvGdkAtom at
/usr/lib64/perl5/DynaLoader.pm line 206.
� at tools/podifystockitems.pl line 0.
Compilation failed in require.
BEGIN failed--compilation aborted.
make: *** [Makefile:1189: build/stock_items.podi] Error 2
make: *** Waiting for unfinished jobs....
Can't load 'blib/arch/auto/Gtk2/Gtk2.so' for module Gtk2:
blib/arch/auto/Gtk2/Gtk2.so: undefined symbol: SvGdkAtom at
/usr/lib64/perl5/DynaLoader.pm line 206.
� at tools/podifyenums.pl line 0.
Compilation failed in require.
BEGIN failed--compilation aborted.
make: *** [Makefile:1185: blib/lib/Gtk2/enums.pod] Error 2
error: Bad exit status from /var/tmp/rpm-tmp.gFTlG1 (%build)
A difference between the passing and failing buildroots is at
<https://koschei.fedoraproject.org/build/17411988>
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=2260875
[Bug 2260875] Fedora 41 FTBFS Tracker
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2264848
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2037854
Bug ID: 2037854
Summary: Please branch and build perl-Crypt-RC4 for EPEL 9
Product: Fedora EPEL
Version: epel9
Status: NEW
Component: perl-Crypt-RC4
Assignee: ppisar(a)redhat.com
Reporter: paul(a)city-fan.org
QA Contact: extras-qa(a)fedoraproject.org
CC: me(a)fale.io, perl-devel(a)lists.fedoraproject.org,
ppisar(a)redhat.com
Target Milestone: ---
Classification: Fedora
Please branch and build perl-Crypt-RC4 for EPEL 9.
If you like you could add me (FAS: pghmcfc) as a committer to the package and
I'll do it myself.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2037854
https://bugzilla.redhat.com/show_bug.cgi?id=2251625
Bug ID: 2251625
Summary: CVE-2023-47038 perl:5.36/perl: Write past buffer end
via illegal user-defined Unicode property [fedora-all]
Product: Fedora
Version: 38
Status: NEW
Component: perl
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: jplesnik(a)redhat.com
Reporter: ahanwate(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: iarnell(a)gmail.com, jplesnik(a)redhat.com, kasal(a)ucw.cz,
mmaslano(a)redhat.com, mspacek(a)redhat.com,
perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com,
psabata(a)redhat.com, rhughes(a)redhat.com,
spotrh(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2249523
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2251625
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2228398
Bug ID: 2228398
Summary: CVE-2023-31486 perl:5.36/perl-HTTP-Tiny: http-tiny:
insecure TLS cert default [fedora-all]
Product: Fedora
Version: 38
Status: NEW
Component: perl-HTTP-Tiny
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: jplesnik(a)redhat.com
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: jplesnik(a)redhat.com, mspacek(a)redhat.com,
perl-devel(a)lists.fedoraproject.org, ppisar(a)redhat.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2228392
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2228398
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=1821879
Bug ID: 1821879
Summary: CVE-2013-7488 perl-Convert-ASN1: allows remote
attackers to cause an infinite loop via unexpected
input
Product: Security Response
Hardware: All
OS: Linux
Status: NEW
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: gsuckevi(a)redhat.com
CC: caillon+fedoraproject(a)gmail.com, caolanm(a)redhat.com,
john.j5live(a)gmail.com, jplesnik(a)redhat.com,
kasal(a)ucw.cz, perl-devel(a)lists.fedoraproject.org,
perl-maint-list(a)redhat.com, ppisar(a)redhat.com,
psabata(a)redhat.com, rhughes(a)redhat.com,
rstrode(a)redhat.com, sandmann(a)redhat.com
Target Milestone: ---
Classification: Other
perl-Convert-ASN1 (aka the Convert::ASN1 module for Perl) through 0.27 allows
remote attackers to cause an infinite loop via unexpected input.
Reference:
https://github.com/gbarr/perl-Convert-ASN1/issues/14
--
You are receiving this mail because:
You are on the CC list for the bug.