Return-Path: X-Original-To: apmail-perl-modperl-archive@www.apache.org Delivered-To: apmail-perl-modperl-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 79F8ED705 for ; Mon, 11 Mar 2013 09:28:46 +0000 (UTC) Received: (qmail 12162 invoked by uid 500); 11 Mar 2013 09:28:45 -0000 Delivered-To: apmail-perl-modperl-archive@perl.apache.org Received: (qmail 11648 invoked by uid 500); 11 Mar 2013 09:28:39 -0000 Mailing-List: contact modperl-help@perl.apache.org; run by ezmlm Precedence: bulk list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list modperl@perl.apache.org Received: (qmail 11604 invoked by uid 99); 11 Mar 2013 09:28:37 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 11 Mar 2013 09:28:37 +0000 X-ASF-Spam-Status: No, hits=-0.0 required=5.0 tests=SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: domain of Steve.Hay@verosoftware.com designates 213.1.249.253 as permitted sender) Received: from [213.1.249.253] (HELO mailgate.planit.com) (213.1.249.253) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 11 Mar 2013 09:28:32 +0000 Received: from mailgate.planit.com (localhost [127.0.0.1]) by mailgate.planit.com (Postfix) with ESMTP id 9281D43ED1C; Mon, 11 Mar 2013 09:27:41 +0000 (GMT) Received: from ukmail02.planit.group (unknown [10.20.200.12]) by mailgate.planit.com (Postfix) with ESMTP id 5175743EC44; Mon, 11 Mar 2013 09:27:41 +0000 (GMT) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: quoted-printable Subject: RE: perl/hash_attack.t fails with perl 5.16.3-RC1 Date: Mon, 11 Mar 2013 09:28:10 -0000 Message-ID: <67B2BB40A61BE846B65EF4793B863D6C610AF5@ukmail02.planit.group> In-Reply-To: <201303082303.r28N3Zmn012702@elvis.arl.psu.edu> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: perl/hash_attack.t fails with perl 5.16.3-RC1 Thread-Index: Ac4cUT+YBNF+E8+LRyiWH+GcWaQsJQB6QbFQ References: <201303082303.r28N3Zmn012702@elvis.arl.psu.edu> From: "Steve Hay" To: "John D Groenveld" , X-Virus-Checked: Checked by ClamAV on apache.org John D Groenveld wrote on 2013-03-08: > [Fri Mar 08 17:58:46 2013] [error] [client 127.0.0.1] Failed to mount > the hash c ollision attack at /tmp/mod_perl- > 2.0.7/t/response/TestPerl/hash_attack.pm line 1 03.\n >=20 > John > groenveld@acm.org Thanks for the report. This is a known test failure, brought about by the security fix which has just been applied to 5.16.3-RC1. 5.14.4, which has just been released, has the same test failure for the same reason. I have seen a patch for it on the perl5-security list, and will hopefully apply it soon.