https://bugzilla.redhat.com/show_bug.cgi?id=1738968
Bug ID: 1738968
Summary: gimp-layer-via-copy-cut depends on Python 2
Product: Fedora
Version: rawhide
Status: NEW
Component: gimp-layer-via-copy-cut
Assignee: luya_tfz(a)thefinalzone.net
Reporter: lbalhar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: design-devel(a)lists.fedoraproject.org,
luya_tfz(a)thefinalzone.net
Blocks: 1698500 (F31_PY2REMOVAL)
Target Milestone: ---
Classification: Fedora
Python 2.7 will reach end-of-life in January 2020, over 9 years after it was
released. This falls within the Fedora 31 lifetime.
Packages that depend on Python 2 are being switched to Python 3 or removed from
Fedora:
https://fedoraproject.org/wiki/Changes/F31_Mass_Python_2_Package_Removal#In…
Python 2 will be retired in Fedora 32:
https://fedoraproject.org/wiki/Changes/RetirePython2
To help planning, we'd like to know the plans for gimp-layer-via-copy-cut's
future. Specifically:
- What is the reason for the Python2 dependency? (Is it software written in
Python, or does it just provide Python bindings, or use Python in the build
system or test runner?)
- What are the upstream/community plans/timelines regarding Python 3?
- What is the guidance for porting to Python 3? (Assuming that there is someone
who generally knows how to port to Python 3, but doesn't know anything about
the particular package, what are the next steps to take?)
This bug is filed semi-automatically, and might not have all the context
specific to gimp-layer-via-copy-cut.
If you need anything from us, or something is unclear, please mention it here.
Thank you.
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1698500
[Bug 1698500] F31 Mass Python 2 Package Removal
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2031495
Bug ID: 2031495
Summary: Blender not working properly with wayland with nvidia
Product: Fedora
Version: 35
Hardware: x86_64
OS: Linux
Status: NEW
Component: blender
Severity: medium
Assignee: luya_tfz(a)thefinalzone.net
Reporter: paul.woegerer(a)gmail.com
QA Contact: extras-qa(a)fedoraproject.org
CC: design-devel(a)lists.fedoraproject.org,
kwizart(a)gmail.com, luya_tfz(a)thefinalzone.net,
negativo17(a)gmail.com, promac(a)gmail.com
Target Milestone: ---
Classification: Fedora
Description of problem:
When running Blender on Fedora 35 with Wayland with nvidia drivers from RPM
Fusion the dropdown windows are not showing up reliably. This makes Blender
unusable.
Switching back to X11 fixes the problem and Blender works as expected.
To be able to have Wayland with NVIDIA drivers enabled per default for Fedora
36 this needs to be fixed.
Name : blender
Epoch : 1
Version : 3.0.0
Release : 2.fc35
Architecture : x86_64
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2031495
https://bugzilla.redhat.com/show_bug.cgi?id=1964069
Bug ID: 1964069
Summary: blender 2.92.0 crash fails when trying to run
Product: Fedora
Version: 34
Status: NEW
Component: blender
Assignee: luya_tfz(a)thefinalzone.net
Reporter: christianbueno.1(a)gmail.com
QA Contact: extras-qa(a)fedoraproject.org
CC: design-devel(a)lists.fedoraproject.org,
kwizart(a)gmail.com, luya_tfz(a)thefinalzone.net,
negativo17(a)gmail.com, promac(a)gmail.com
Target Milestone: ---
Classification: Fedora
Created attachment 1786567
--> https://bugzilla.redhat.com/attachment.cgi?id=1786567&action=edit
blender fails
Description of problem:
when trying to run blender, it fails, crash.
Version-Release number of selected component (if applicable):
fedora 34
blender 2.92.0 rpm fedora reository
How reproducible:
always
Steps to Reproduce:
1.install blender by,
sudo dnf install blender
2.trying to run blender by terminal
> blender
3.blender fails, crash
Actual results:
blender fails
Expected results:
we can run blender and use the software
Additional info:
terminal error,
[chris@f34 ~]$ blender
/usr/include/c++/11/bits/stl_deque.h:1328: std::deque<_Tp, _Alloc>::reference
std::deque<_Tp, _Alloc>::operator[](std::deque<_Tp, _Alloc>::size_type) [with
_Tp = nv50_ir::ValueRef; _Alloc = std::allocator<nv50_ir::ValueRef>;
std::deque<_Tp, _Alloc>::reference = nv50_ir::ValueRef&; std::deque<_Tp,
_Alloc>::size_type = long unsigned int]: Assertion '__n < this->size()' failed.
Aborted (core dumped)
[chris@f34 ~]$
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2020201
Bug ID: 2020201
Summary: oidn-1.4.2 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: oidn
Keywords: FutureFeature, Triaged
Assignee: luya_tfz(a)thefinalzone.net
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: design-devel(a)lists.fedoraproject.org,
luya_tfz(a)thefinalzone.net, negativo17(a)gmail.com
Target Milestone: ---
Classification: Fedora
Latest upstream release: 1.4.2
Current version/release in rawhide: 1.4.1-2.fc35
URL: https://openimagedenoise.github.io/
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from anitya:
https://release-monitoring.org/project/19531/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2020201
https://bugzilla.redhat.com/show_bug.cgi?id=2052019
Bug ID: 2052019
Summary: blender: Out-of-bounds memory access due to malformed
DDS image file [epel-all]
Product: Fedora EPEL
Version: epel7
Status: NEW
Component: blender
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: negativo17(a)gmail.com
Reporter: mcascell(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: design-devel(a)lists.fedoraproject.org,
kwizart(a)gmail.com, luya_tfz(a)thefinalzone.net,
negativo17(a)gmail.com, promac(a)gmail.com
Target Milestone: ---
Classification: Fedora
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of epel-all.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora EPEL. While
only one tracking bug has been filed, please correct all affected versions
at the same time. If you need to fix the versions independent of each
other, you may clone this bug as appropriate.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2052019
https://bugzilla.redhat.com/show_bug.cgi?id=2052012
Bug ID: 2052012
Summary: blender: Out-of-bounds memory access in IMB_flipy()
due to large image dimensions
Product: Security Response
Hardware: All
OS: Linux
Status: NEW
Component: vulnerability
Keywords: Security
Severity: high
Priority: high
Assignee: security-response-team(a)redhat.com
Reporter: mcascell(a)redhat.com
CC: design-devel(a)lists.fedoraproject.org,
kwizart(a)gmail.com, luya_tfz(a)thefinalzone.net,
negativo17(a)gmail.com, promac(a)gmail.com
Blocks: 2052005
Target Milestone: ---
Classification: Other
An integer overflow in the processing of loaded 2D images leads to a
write-what-where vulnerability and an out-of-bounds read vulnerability,
allowing an attacker to leak sensitive information or achieve code execution in
the context of the Blender process when a specially crafted image file is
loaded.
Upstream issue:
https://developer.blender.org/T94629
Upstream patch:
https://developer.blender.org/D13744
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2052012
https://bugzilla.redhat.com/show_bug.cgi?id=2052013
Bug ID: 2052013
Summary: blender: Out-of-bounds memory access in IMB_flipy()
due to large image dimensions [epel-all]
Product: Fedora EPEL
Version: epel7
Status: NEW
Component: blender
Keywords: Security, SecurityTracking
Severity: high
Priority: high
Assignee: negativo17(a)gmail.com
Reporter: mcascell(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: design-devel(a)lists.fedoraproject.org,
kwizart(a)gmail.com, luya_tfz(a)thefinalzone.net,
negativo17(a)gmail.com, promac(a)gmail.com
Target Milestone: ---
Classification: Fedora
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of epel-all.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora EPEL. While
only one tracking bug has been filed, please correct all affected versions
at the same time. If you need to fix the versions independent of each
other, you may clone this bug as appropriate.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2052013