[Bug 2125190] New: [abrt] meld: help_callback(): meldapp.py:128:help_callback:gi.repository.GLib.GError: g-io-error-quark: The specified location is not supported (15)
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2125190
Bug ID: 2125190
Summary: [abrt] meld: help_callback():
meldapp.py:128:help_callback:gi.repository.GLib.GError
: g-io-error-quark: The specified location is not
supported (15)
Product: Fedora
Version: 36
Hardware: x86_64
Status: NEW
Whiteboard: abrt_hash:35a101c398ed0ff4b5936242a2309884d9ef9336;
Component: meld
Assignee: dmaphy(a)fedoraproject.org
Reporter: ilaurie(a)bigpond.net.au
QA Contact: extras-qa(a)fedoraproject.org
CC: cwickert(a)fedoraproject.org, dmaphy(a)fedoraproject.org,
epel-packagers-sig(a)lists.fedoraproject.org,
lkundrak(a)v3.sk, michel(a)michel-slm.name,
oliver(a)linux-kernel.at
Target Milestone: ---
Classification: Fedora
Description of problem:
Selected "Help" from the menu.
Version-Release number of selected component:
meld-3.22.0-1.fc36
Additional info:
reporter: libreport-2.17.2
cgroup: 0::/user.slice/user-1000.slice/session-2.scope
cmdline: /usr/bin/python3 /usr/bin/meld
crash_function: help_callback
exception_type: gi.repository.GLib.GError
executable: /usr/bin/meld
interpreter: python3-3.10.6-1.fc36.x86_64
kernel: 5.19.7-200.fc36.x86_64
runlevel: N 5
type: Python3
uid: 1000
Truncated backtrace:
meldapp.py:128:help_callback:gi.repository.GLib.GError: g-io-error-quark: The
specified location is not supported (15)
Traceback (most recent call last):
File "/usr/lib/python3.10/site-packages/meld/meldapp.py", line 128, in
help_callback
Gtk.show_uri(
gi.repository.GLib.GError: g-io-error-quark: The specified location is not
supported (15)
Local variables in innermost frame:
self: <meldapp.MeldApp object at 0x7f8f2e558740 (meld+meldapp+MeldApp at
0x55e5c654c210)>
action: <Gio.SimpleAction object at 0x7f8f286ef9c0 (GSimpleAction at
0x55e5c6a26c50)>
parameter: None
uri: 'help:meld'
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2125190
11 months, 4 weeks
[Bug 2092724] New: CVE-2022-21681 thrift: marked: regular expression inline.reflinkSearch may lead Denial of Service [fedora-all]
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2092724
Bug ID: 2092724
Summary: CVE-2022-21681 thrift: marked: regular expression
inline.reflinkSearch may lead Denial of Service
[fedora-all]
Product: Fedora
Version: 36
Status: NEW
Component: thrift
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: ctubbsii(a)fedoraproject.org
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: ctubbsii(a)fedoraproject.org,
epel-packagers-sig(a)lists.fedoraproject.org,
milleruntime(a)gmail.com, orion(a)nwra.com,
willb(a)redhat.com
Target Milestone: ---
Classification: Fedora
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of fedora-all.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2092724
11 months, 4 weeks
[Bug 2090581] New: CVE-2022-21680 thrift: marked: regular expression block.def may lead Denial of Service [fedora-all]
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2090581
Bug ID: 2090581
Summary: CVE-2022-21680 thrift: marked: regular expression
block.def may lead Denial of Service [fedora-all]
Product: Fedora
Version: 36
Status: NEW
Component: thrift
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: ctubbsii(a)fedoraproject.org
Reporter: saroy(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: ctubbsii(a)fedoraproject.org,
epel-packagers-sig(a)lists.fedoraproject.org,
milleruntime(a)gmail.com, orion(a)nwra.com,
willb(a)redhat.com
Target Milestone: ---
Classification: Fedora
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of fedora-all.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2090581
11 months, 4 weeks
[Bug 2135230] New: CVE-2021-36369 dropbear: <net-misc/dropbear-2022.82: forwarded agent abuse [fedora-all]
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2135230
Bug ID: 2135230
Summary: CVE-2021-36369 dropbear: <net-misc/dropbear-2022.82:
forwarded agent abuse [fedora-all]
Product: Fedora
Version: 36
Status: NEW
Component: dropbear
Keywords: Security, SecurityTracking
Severity: high
Priority: high
Assignee: buytenh(a)wantstofly.org
Reporter: mrehak(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: buytenh(a)wantstofly.org, cickumqt(a)gmail.com,
daniellarasouza(a)yahoo.com.br,
epel-packagers-sig(a)lists.fedoraproject.org
Target Milestone: ---
Classification: Fedora
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of fedora-all.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2135230
11 months, 4 weeks
[Bug 2159621] New: Importing xarray.tests.test_dataset fails
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2159621
Bug ID: 2159621
Summary: Importing xarray.tests.test_dataset fails
Product: Fedora
Version: rawhide
Status: NEW
Component: python-xarray
Assignee: quantum.analyst(a)gmail.com
Reporter: david08741(a)gmail.com
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
jonathan(a)almalinux.org,
python-packagers-sig(a)lists.fedoraproject.org,
quantum.analyst(a)gmail.com
Target Milestone: ---
Classification: Fedora
Description of problem:
Running
from xarray.tests.test_dataset import create_test_data
fails with:
missing pytest if only python3-xarray has been installed
Once python3-pytest is installed, the error is the following:
ImportError while importing test module
'/builddir/build/BUILD/xbout-0.3.4/xbout/tests/test_plot.py'.
Hint: make sure your test modules/packages have valid Python names.
Traceback:
/usr/lib64/python3.11/importlib/__init__.py:126: in import_module
return _bootstrap._gcd_import(name[level:], package, level)
xbout/tests/test_plot.py:8: in <module>
from xbout.tests.test_load import bout_xyt_example_files
xbout/tests/test_load.py:14: in <module>
from xarray.tests.test_dataset import create_test_data
/usr/lib/python3.11/site-packages/xarray/tests/test_dataset.py:11: in <module>
from pandas.core.computation.ops import UndefinedVariableError
E ImportError: cannot import name 'UndefinedVariableError' from
'pandas.core.computation.ops'
(/usr/lib64/python3.11/site-packages/pandas/core/computation/ops.py)
_________________ ERROR collecting xbout/tests/test_region.py
__________________
Version-Release number of selected component (if applicable):
2022.03.0
How reproducible:
always
Steps to Reproduce:
1. python3 -c "import xarray.tests.test_dataset"
Alternatively try to build python-xbout 0.3.4 for rawhide:
https://koji.fedoraproject.org/koji/taskinfo?taskID=95936268
Actual results:
An ImportError is raised. Presumably that is due to a change in pandas.
Expected results:
Import works
Additional info:
This seems to be fixed in 2022.12
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2159621
1 year