[Bug 1932203] New: perl-Crypt-GPG-1.64-20.fc35 FTBFS: Use of
uninitialized value in string eq at t/02-import.t line 40.
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1932203
Bug ID: 1932203
Summary: perl-Crypt-GPG-1.64-20.fc35 FTBFS: Use of
uninitialized value in string eq at t/02-import.t line
40.
Product: Fedora
Version: rawhide
URL: https://koschei.fedoraproject.org/package/perl-Crypt-G
PG
Status: NEW
Component: perl-Crypt-GPG
Assignee: redhat-bugzilla(a)linuxnetz.de
Reporter: ppisar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org,
redhat-bugzilla(a)linuxnetz.de
Blocks: 1927309 (F35FTBFS)
Target Milestone: ---
Classification: Fedora
perl-Crypt-GPG-1.64-20.fc35 fails to build in mock/Koji environment because
tests fail there:
+ make test
PERL_DL_NONLAZY=1 "/usr/bin/perl" "-MExtUtils::Command::MM" "-MTest::Harness"
"-e" "undef *Test::Harness::Switches; test_harness(0, 'blib/lib', 'blib/arch')"
t/*.t
NOTE: If the tests are skipped, you may need to install gpg,
and/or set the environment variable GPGBIN to the
location of the gpg binary.
If the keygen test takes a long time you may need to
generate more randomness on your computer (by running a
recursive directory listing in the background, for
example).
process ended prematurely at
/builddir/build/BUILD/Crypt-GPG-1.64/blib/lib/Crypt/GPG.pm line 473.
process ended prematurely at
/builddir/build/BUILD/Crypt-GPG-1.64/blib/lib/Crypt/GPG.pm line 473.
t/01-keygen.t .. ok
Use of uninitialized value in string eq at t/02-import.t line 40.
# Failed test 1 in t/02-import.t at line 44
t/02-import.t ..
Failed 1/1 subtests
[...]
Test Summary Report
-------------------
t/02-import.t (Wstat: 0 Tests: 1 Failed: 1)
Failed test: 1
t/03-export.t (Wstat: 0 Tests: 10 Failed: 4)
Failed tests: 1, 4, 6, 9
t/04-encdec.t (Wstat: 0 Tests: 10 Failed: 10)
Failed tests: 1-10
t/05-sigver.t (Wstat: 2560 Tests: 1 Failed: 1)
Failed test: 1
Non-zero exit status: 10
Parse errors: Bad plan. You planned 32 tests but ran 1.
t/06-keyops.t (Wstat: 2560 Tests: 0 Failed: 0)
Non-zero exit status: 10
Parse errors: Bad plan. You planned 30 tests but ran 0.
A difference between passing and failing build root is at
<https://koji.fedoraproject.org/koji/taskinfo?taskID=61274500>. Because I
cannot reproduces in my virtual machine, I believe this could be triggered by a
new namespace-isolating mock which is also used in Koji.
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1927309
[Bug 1927309] Fedora 35 FTBFS Tracker
--
You are receiving this mail because:
You are on the CC list for the bug.
2 years, 11 months
[Bug 1952554] New: Upgrade perl-Perl-MinimumVersion to 1.40
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1952554
Bug ID: 1952554
Summary: Upgrade perl-Perl-MinimumVersion to 1.40
Product: Fedora
Version: rawhide
Status: NEW
Component: perl-Perl-MinimumVersion
Assignee: rc040203(a)freenet.de
Reporter: jplesnik(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: paul(a)city-fan.org, perl-devel(a)lists.fedoraproject.org,
rc040203(a)freenet.de
Target Milestone: ---
Classification: Fedora
Latest Fedora delivers 1.38 version. Upstream released 1.40. When you have free
time, please upgrade it.
--
You are receiving this mail because:
You are on the CC list for the bug.
2 years, 11 months
[Bug 1952407] New: Upgrade perl-DateTime-Format-XSD to 0.4
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1952407
Bug ID: 1952407
Summary: Upgrade perl-DateTime-Format-XSD to 0.4
Product: Fedora
Version: rawhide
Status: NEW
Component: perl-DateTime-Format-XSD
Assignee: steve.traylen(a)cern.ch
Reporter: jplesnik(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: perl-devel(a)lists.fedoraproject.org,
steve.traylen(a)cern.ch
Target Milestone: ---
Classification: Fedora
Latest Fedora delivers 0.2 version. Upstream released 0.4. When you have free
time, please upgrade it.
--
You are receiving this mail because:
You are on the CC list for the bug.
2 years, 11 months
[Bug 1905190] New: biber FTBFS in Rawhide (F34)
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1905190
Bug ID: 1905190
Summary: biber FTBFS in Rawhide (F34)
Product: Fedora
Version: rawhide
Status: NEW
Component: biber
Assignee: cbm(a)m.fsf.org
Reporter: tdawson(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: cbm(a)m.fsf.org, jnovy(a)redhat.com, mefoster(a)gmail.com,
perl-devel(a)lists.fedoraproject.org
Target Milestone: ---
Classification: Fedora
Created attachment 1737370
--> https://bugzilla.redhat.com/attachment.cgi?id=1737370&action=edit
biber scratch build log
Description of problem:
biber fails to build in F34 Rawhide.
Version-Release number of selected component (if applicable):
biber-2.14-4
How reproducible:
100%
Steps to Reproduce:
1. fedpkg clone biber ; cd biber
2. fedpkg build --scratch
Actual results:
Failed build
Expected results:
Build should build correctly
Additional info:
It is failing because of the tests. I do not know enough of the tests to give
you a guess what the main cause it. A build log has been attached.
This was discovered by Fedora ELN, but we are reporting it now so it can be
fixed in advance of the Fedora F34 mass rebuild.
--
You are receiving this mail because:
You are on the CC list for the bug.
2 years, 11 months
[Bug 1835359] New: perl-Email-MIME: rubygem-mail: Out of memory
issue through nested MIME parts [fedora-all]
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1835359
Bug ID: 1835359
Summary: perl-Email-MIME: rubygem-mail: Out of memory issue
through nested MIME parts [fedora-all]
Product: Fedora
Version: 32
Status: NEW
Component: perl-Email-MIME
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: tcallawa(a)redhat.com
Reporter: psampaio(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: jose.p.oliveira.oss(a)gmail.com, paul(a)city-fan.org,
perl-devel(a)lists.fedoraproject.org,
rob.myers(a)gtri.gatech.edu, tcallawa(a)redhat.com,
xavier(a)bachelot.org
Target Milestone: ---
Classification: Fedora
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of fedora-all.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
--
You are receiving this mail because:
You are on the CC list for the bug.
2 years, 12 months
[Bug 1835354] New: perl-Email-MIME-ContentType: rubygem-mail: Out of
memory issue through nested MIME parts [fedora-all]
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1835354
Bug ID: 1835354
Summary: perl-Email-MIME-ContentType: rubygem-mail: Out of
memory issue through nested MIME parts [fedora-all]
Product: Fedora
Version: 32
Status: NEW
Component: perl-Email-MIME-ContentType
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: tcallawa(a)redhat.com
Reporter: psampaio(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: jose.p.oliveira.oss(a)gmail.com,
perl-devel(a)lists.fedoraproject.org,
rob.myers(a)gtri.gatech.edu, tcallawa(a)redhat.com
Target Milestone: ---
Classification: Fedora
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of fedora-all.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
--
You are receiving this mail because:
You are on the CC list for the bug.
2 years, 12 months