https://bugzilla.redhat.com/show_bug.cgi?id=2119958
Bug ID: 2119958
Summary: python-matplotlib-3.6.0rc1 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: python-matplotlib
Keywords: FutureFeature, Triaged
Assignee: quantum.analyst(a)gmail.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
gwync(a)protonmail.com, jonathan.underwood(a)gmail.com,
paulo.cesar.pereira.de.andrade(a)gmail.com,
python-sig(a)lists.fedoraproject.org,
quantum.analyst(a)gmail.com, thibault(a)north.li,
tomspur(a)fedoraproject.org
Target Milestone: ---
Classification: Fedora
Releases retrieved: 3.6.0rc1
Upstream release that is considered latest: 3.6.0rc1
Current version/release in rawhide: 3.5.3-3.fc38
URL: https://pypi.python.org/pypi/matplotlib
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/3919/
To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/python-matplotlib
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2119958
https://bugzilla.redhat.com/show_bug.cgi?id=2116188
Bug ID: 2116188
Summary: perl-Text-CSV-2.02 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: perl-Text-CSV
Keywords: FutureFeature, Triaged
Assignee: jvromans(a)squirrel.nl
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
jvromans(a)squirrel.nl, lkundrak(a)v3.sk, mi(a)v3.sk,
perl-devel(a)lists.fedoraproject.org,
redhat-bugzilla(a)linuxnetz.de
Target Milestone: ---
Classification: Fedora
Releases retrieved: 2.02
Upstream release that is considered latest: 2.02
Current version/release in rawhide: 2.01-5.fc37
URL: http://search.cpan.org/dist/Text-CSV/
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/3433/
To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/perl-Text-CSV
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2116188
https://bugzilla.redhat.com/show_bug.cgi?id=2116447
Bug ID: 2116447
Summary: papirus-icon-theme-20220808 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: papirus-icon-theme
Keywords: FutureFeature, Triaged
Assignee: zebob.m(a)gmail.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name, zebob.m(a)gmail.com
Target Milestone: ---
Classification: Fedora
Releases retrieved: 20220808
Upstream release that is considered latest: 20220808
Current version/release in rawhide: 20220710-2.fc37
URL: https://github.com/PapirusDevelopmentTeam/papirus-icon-theme/
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/18645/
To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/papirus-icon-theme
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2116447
https://bugzilla.redhat.com/show_bug.cgi?id=2118244
Bug ID: 2118244
Summary: Remove xmlstarlet from epel8
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: xmlstarlet
Assignee: stickster(a)gmail.com
Reporter: rhel-process-autobot(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: daltonminer(a)gmail.com, dcavalca(a)fb.com,
epel-packagers-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name, ngompa13(a)gmail.com,
stickster(a)gmail.com
Target Milestone: ---
Classification: Fedora
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2118244
https://bugzilla.redhat.com/show_bug.cgi?id=2107201
Bug ID: 2107201
Summary: convert foo.jpg json: aborts with 6.9.12-58
Product: Fedora
Version: rawhide
Status: NEW
Component: ImageMagick
Assignee: luya_tfz(a)thefinalzone.net
Reporter: mtasaka(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: blaise(a)gmail.com, dcavalca(a)fb.com,
epel-packagers-sig(a)lists.fedoraproject.org,
fedora(a)famillecollet.com, luya_tfz(a)thefinalzone.net,
michel(a)michel-slm.name, ngompa13(a)gmail.com,
pampelmuse(a)gmx.at, sergio(a)serjux.com,
troy(a)troycurtisjr.com
Blocks: 1988079
Target Milestone: ---
Classification: Fedora
Description of problem:
convert foo.jpg json: aborts with 6.9.12-58 as reported on
https://github.com/ImageMagick/ImageMagick6/issues/191
Version-Release number of selected component (if applicable):
ImageMagick-6.9.12.58-1.fc37.x86_64
How reproducible:
100%
Steps to Reproduce:
1. convert foo.jpg json:
Actual results:
aborts
Expected results:
Should work, as with ImageMagick-6.9.12.52-1.fc36.x86_64
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1988079
[Bug 1988079] rubygem-image_processing: FTBFS in Fedora rawhide/f35
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2107201
https://bugzilla.redhat.com/show_bug.cgi?id=2105662
Bug ID: 2105662
Summary: ImageMagick-6.9.12.56 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: ImageMagick
Keywords: FutureFeature, Triaged
Assignee: luya_tfz(a)thefinalzone.net
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: blaise(a)gmail.com, dcavalca(a)fb.com,
epel-packagers-sig(a)lists.fedoraproject.org,
fedora(a)famillecollet.com, luya_tfz(a)thefinalzone.net,
michel(a)michel-slm.name, ngompa13(a)gmail.com,
pampelmuse(a)gmx.at, sergio(a)serjux.com,
troy(a)troycurtisjr.com
Target Milestone: ---
Classification: Fedora
Releases retrieved: 6.9.12.53, 6.9.12.54, 6.9.12.55, 6.9.12.56
Upstream release that is considered latest: 6.9.12.56
Current version/release in rawhide: 6.9.12.52-1.fc37
URL: https://legacy.imagemagick.org
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/258035/
To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/ImageMagick
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2105662
https://bugzilla.redhat.com/show_bug.cgi?id=2120851
Bug ID: 2120851
Summary: xsimd-9.0.0 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: xsimd
Keywords: FutureFeature, Triaged
Assignee: mhroncok(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
kkeithle(a)redhat.com, mhroncok(a)redhat.com,
sguelton(a)redhat.com
Target Milestone: ---
Classification: Fedora
Releases retrieved: 9.0.0
Upstream release that is considered latest: 9.0.0
Current version/release in rawhide: 8.1.0-2.fc38
URL: https://github.com/xtensor-stack/xsimd
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/138109/
To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/xsimd
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2120851
https://bugzilla.redhat.com/show_bug.cgi?id=2122362
Bug ID: 2122362
Summary: CVE-2020-35535 LibRaw: Out-of-bounds read in
LibRaw::parseSonySRF() function
Product: Security Response
Hardware: All
OS: Linux
Status: NEW
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: psampaio(a)redhat.com
CC: dchen(a)redhat.com, debarshir(a)redhat.com,
epel-packagers-sig(a)lists.fedoraproject.org,
gwync(a)protonmail.com, hobbes1069(a)gmail.com,
jridky(a)redhat.com, manisandro(a)gmail.com,
mattdm(a)redhat.com, mattia.verga(a)proton.me,
michel(a)michel-slm.name, ngompa13(a)gmail.com,
nphilipp(a)redhat.com, sebastian(a)sdziallas.com,
sergio(a)serjux.com, siddharth.kde(a)gmail.com,
sipoyare(a)redhat.com, thibault(a)north.li
Target Milestone: ---
Classification: Other
In LibRaw, there is an out-of-bounds read vulnerability within the
"LibRaw::parseSonySRF()" function (libraw\src\metadata\sony.cpp) when
processing srf files.
Upstream issue:
https://github.com/LibRaw/LibRaw/issues/283
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2122362
https://bugzilla.redhat.com/show_bug.cgi?id=2122360
Bug ID: 2122360
Summary: CVE-2020-35534 LibRaw: Memory corruption in
"crxFreeSubbandData()" function
Product: Security Response
Hardware: All
OS: Linux
Status: NEW
Component: vulnerability
Keywords: Security
Severity: low
Priority: low
Assignee: security-response-team(a)redhat.com
Reporter: psampaio(a)redhat.com
CC: dchen(a)redhat.com, debarshir(a)redhat.com,
epel-packagers-sig(a)lists.fedoraproject.org,
gwync(a)protonmail.com, hobbes1069(a)gmail.com,
jridky(a)redhat.com, manisandro(a)gmail.com,
mattdm(a)redhat.com, mattia.verga(a)proton.me,
michel(a)michel-slm.name, ngompa13(a)gmail.com,
nphilipp(a)redhat.com, sebastian(a)sdziallas.com,
sergio(a)serjux.com, siddharth.kde(a)gmail.com,
sipoyare(a)redhat.com, thibault(a)north.li
Target Milestone: ---
Classification: Other
In LibRaw, there is a memory corruption vulnerability within the
"crxFreeSubbandData()" function (libraw\src\decoders\crx.cpp) when processing
cr3 files.
Upstream issue:
https://github.com/LibRaw/LibRaw/issues/279
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2122360
https://bugzilla.redhat.com/show_bug.cgi?id=2122358
Bug ID: 2122358
Summary: CVE-2020-35533 LibRaw: Out-of-bounds read in
LibRaw::adobe_copy_pixel() function
Product: Security Response
Hardware: All
OS: Linux
Status: NEW
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: psampaio(a)redhat.com
CC: dchen(a)redhat.com, debarshir(a)redhat.com,
epel-packagers-sig(a)lists.fedoraproject.org,
gwync(a)protonmail.com, hobbes1069(a)gmail.com,
jridky(a)redhat.com, manisandro(a)gmail.com,
mattdm(a)redhat.com, mattia.verga(a)proton.me,
michel(a)michel-slm.name, ngompa13(a)gmail.com,
nphilipp(a)redhat.com, sebastian(a)sdziallas.com,
sergio(a)serjux.com, siddharth.kde(a)gmail.com,
sipoyare(a)redhat.com, thibault(a)north.li
Target Milestone: ---
Classification: Other
In LibRaw, an out-of-bounds read vulnerability exists within the
"LibRaw::adobe_copy_pixel()" function (libraw\src\decoders\dng.cpp) when
reading data from the image file.
Upstream issue:
https://github.com/LibRaw/LibRaw/issues/273
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2122358