https://bugzilla.redhat.com/show_bug.cgi?id=2250709
Bug ID: 2250709
Summary: Notice: python-flit-core will be automatically retired
from EPEL 9 when RHEL 9.4 is released
Product: Fedora EPEL
Version: epel9
Status: NEW
Component: python-flit-core
Assignee: maxwell(a)gtmx.me
Reporter: rhel-process-autobot(a)bot.bugzilla.redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
maxwell(a)gtmx.me, mhroncok(a)redhat.com,
python-packagers-sig(a)lists.fedoraproject.org
Target Milestone: ---
Classification: Fedora
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2250709
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2178639
Bug ID: 2178639
Summary: The overview bar does not update with calendar changes
Product: Fedora
Version: 38
Hardware: x86_64
OS: Linux
Status: NEW
Component: gnome-calendar
Assignee: gnome-sig(a)lists.fedoraproject.org
Reporter: lruzicka(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
gnome-sig(a)lists.fedoraproject.org,
igor.raits(a)gmail.com, klember(a)redhat.com
Target Milestone: ---
Link ID: GNOME Gitlab GNOME/gnome-calendar/-/issues/994
Classification: Fedora
Description of problem:
This is a tracking bug for Blocker Review purpose. Please refer to the upstream
issue to provide details and discuss
https://gitlab.gnome.org/GNOME/gnome-calendar/-/issues/994
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2178639
https://bugzilla.redhat.com/show_bug.cgi?id=2253406
Bug ID: 2253406
Summary: [abrt] lirc-core: main():
lircd-setup:37:main:AttributeError: module
'configparser' has no attribute 'SafeConfigParser'.
Did you mean: 'RawConfigParser'?
Product: Fedora
Version: 39
Hardware: x86_64
Status: NEW
Whiteboard: abrt_hash:6d2dfe5acadf98aebb748f349d9160f72fa8764a;VAR
IANT_ID=workstation;
Component: lirc
Assignee: leamas.alec(a)gmail.com
Reporter: nigel.jewell(a)grufty.co.uk
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, jarod(a)redhat.com,
leamas.alec(a)gmail.com, sean(a)mess.org
Target Milestone: ---
Classification: Fedora
Description of problem:
This occurs when the service tries to start from systemd. It looks like this
has been fixed upstream, adding a condition to call
configparser.SafeConfigParser or configparser.ConfigParser based upon python
version.
Version-Release number of selected component:
lirc-core-0.10.0-40.fc39
Additional info:
reporter: libreport-2.17.11
exception_type: AttributeError
interpreter: python3-3.12.0-1.fc39.x86_64
cgroup: 0::/system.slice/lircd-setup.service
cmdline: /usr/bin/python3 /usr/sbin/lircd-setup
type: Python3
reason: lircd-setup:37:main:AttributeError: module 'configparser' has
no attribute 'SafeConfigParser'. Did you mean: 'RawConfigParser'?
kernel: 6.6.2-201.fc39.x86_64
comment: This occurs when the service tries to start from systemd. It
looks like this has been fixed upstream, adding a condition to call
configparser.SafeConfigParser or configparser.ConfigParser based upon python
version.
crash_function: main
package: lirc-core-0.10.0-40.fc39
runlevel: unknown
executable: /usr/sbin/lircd-setup
uid: 0
Truncated backtrace:
lircd-setup:37:main:AttributeError: module 'configparser' has no attribute
'SafeConfigParser'. Did you mean: 'RawConfigParser'?
Traceback (most recent call last):
File "/usr/sbin/lircd-setup", line 51, in <module>
main()
File "/usr/sbin/lircd-setup", line 37, in main
parser = configparser.SafeConfigParser()
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
AttributeError: module 'configparser' has no attribute 'SafeConfigParser'. Did
you mean: 'RawConfigParser'?
Local variables in innermost frame:
path: '/etc/lirc/lirc_options.conf'
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2253406
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2259368
Bug ID: 2259368
Summary: blender package has no content in the blender man page
Product: Fedora
Version: 39
Hardware: x86_64
OS: Linux
Status: NEW
Component: blender
Keywords: Documentation
Severity: medium
Assignee: luya_tfz(a)thefinalzone.net
Reporter: moschleg(a)gmail.com
QA Contact: extras-qa(a)fedoraproject.org
CC: code(a)musicinmybrain.net,
design-devel(a)lists.fedoraproject.org,
epel-packagers-sig(a)lists.fedoraproject.org,
kwizart(a)gmail.com, luya_tfz(a)thefinalzone.net,
negativo17(a)gmail.com
Target Milestone: ---
Classification: Fedora
The 'blender' package blender-4.0.2-1.fc39.x86_64 was installed and the man
page was attempted to be read:
$ man blender
Manual page blender(1) byte 0/0 (END) (press h for help or q to quit)
but the man page was empty. The package was checked and it was apparent the
package man page is empty:
$ rpm -qlv blender | grep /man/
-rw-r--r-- 1 root root 20 Dec 9 19:00
/usr/share/man/man1/blender.1.gz
The -qlv shows the man page is 20 bytes which is the size of an 0 byte file
that's been gzipped. Directly checking by ungzipping to stdout also showed
it's empty:
$ gzip -dc /usr/share/man/man1/blender.1.gz | wc -c
0
Reproducible: Always
Steps to Reproduce:
1. Install blender rpm package for 4.0.2-1.fc39
2. run "man blender"
Actual Results:
Man page for blender has no contents
Expected Results:
Packages should not include empty man pages or 'blender' man page should have
the usual type of content expected in man pages like instructions on usage and
so on.
Either not included the blender.1.gz file at all if there's no such manual file
or included related Blender content in the file.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2259368
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2258505
Bug ID: 2258505
Summary: CVE-2023-6237 openssl3: openssl: Excessive time spent
checking invalid RSA public keys [epel-all]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: openssl3
Keywords: Security, SecurityTracking
Severity: low
Priority: low
Assignee: michel(a)michel-slm.name
Reporter: mcascell(a)redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2258502
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2258505
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2257573
Bug ID: 2257573
Summary: CVE-2023-6129 openssl3: openssl: POLY1305 MAC
implementation corrupts vector registers on PowerPC
[epel-all]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: openssl3
Keywords: Security, SecurityTracking
Severity: low
Priority: low
Assignee: michel(a)michel-slm.name
Reporter: trathi(a)redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2257571
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2257573
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2249063
Bug ID: 2249063
Summary: CVE-2023-5363 openssl3: openssl: Incorrect cipher key
and IV length processing [epel-8]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: openssl3
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: michel(a)michel-slm.name
Reporter: saroy(a)redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2243839
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2249063
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2248621
Bug ID: 2248621
Summary: CVE-2023-5678 openssl3: openssl: Generating
excessively long X9.42 DH keys or checking excessively
long X9.42 DH keys or parameters may be very slow
[epel-8]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: openssl3
Keywords: Security, SecurityTracking
Severity: low
Priority: low
Assignee: michel(a)michel-slm.name
Reporter: askrabec(a)redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2248616
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2248621
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2228050
Bug ID: 2228050
Summary: CVE-2023-3817 openssl3: OpenSSL: Excessive time spent
checking DH q parameter value [epel-all]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: openssl3
Keywords: Security, SecurityTracking
Severity: low
Priority: low
Assignee: michel(a)michel-slm.name
Reporter: saroy(a)redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2227852
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2228050
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…