https://bugzilla.redhat.com/show_bug.cgi?id=2126426
Bug ID: 2126426
Summary: CVE-2022-39170 libdwarf: double free in
_dwarf_exec_frame_instr() in dwarf_frame.c
[fedora-all]
Product: Fedora
Version: 36
Status: NEW
Component: libdwarf
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: tom(a)compton.nu
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
jitesh.1337(a)gmail.com, michel(a)michel-slm.name,
orion(a)nwra.com, tom(a)compton.nu
Target Milestone: ---
Classification: Fedora
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of fedora-all.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2126426
https://bugzilla.redhat.com/show_bug.cgi?id=2126826
Bug ID: 2126826
Summary: CVE-2022-3213 ImageMagick: heap buffer overflow while
processing a malformed TIFF file [epel-all]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: ImageMagick
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: luya_tfz(a)thefinalzone.net
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: blaise(a)gmail.com, dcavalca(a)fb.com,
epel-packagers-sig(a)lists.fedoraproject.org,
fedora(a)famillecollet.com, luya_tfz(a)thefinalzone.net,
michel(a)michel-slm.name, ngompa13(a)gmail.com,
pampelmuse(a)gmx.at, sergio(a)serjux.com,
troy(a)troycurtisjr.com
Target Milestone: ---
Classification: Fedora
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of epel-all.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora EPEL. While
only one tracking bug has been filed, please correct all affected versions
at the same time. If you need to fix the versions independent of each
other, you may clone this bug as appropriate.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2126826
https://bugzilla.redhat.com/show_bug.cgi?id=2116541
Bug ID: 2116541
Summary: CVE-2022-2719 ImageMagick: Assertion Failure could
lead to DoS due to attempted writing of NULL image
list [epel-all]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: ImageMagick
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: luya_tfz(a)thefinalzone.net
Reporter: tcullum(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: blaise(a)gmail.com, dcavalca(a)fb.com,
epel-packagers-sig(a)lists.fedoraproject.org,
fedora(a)famillecollet.com, luya_tfz(a)thefinalzone.net,
michel(a)michel-slm.name, ngompa13(a)gmail.com,
pampelmuse(a)gmx.at, sergio(a)serjux.com,
troy(a)troycurtisjr.com
Target Milestone: ---
Classification: Fedora
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of epel-all.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora EPEL. While
only one tracking bug has been filed, please correct all affected versions
at the same time. If you need to fix the versions independent of each
other, you may clone this bug as appropriate.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2116541
https://bugzilla.redhat.com/show_bug.cgi?id=2124630
Bug ID: 2124630
Summary: Please include multi-threading in squashfuse_ll
Product: Fedora EPEL
Version: epel7
Status: NEW
Component: squashfuse
Assignee: kyrofa(a)ubuntu.com
Reporter: dwd(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
kyrofa(a)ubuntu.com, michel(a)michel-slm.name
Target Milestone: ---
Classification: Fedora
Description of problem:
The performance of squashfuse turns out to be very awful for multi-core
applications. Please see for details:
https://github.com/apptainer/apptainer/issues/665
We are about to release a version of apptainer (which I maintain in EPEL and
Fedora) that puts a heavy dependence on squashfuse. The performance of the
upstream squashfuse_ll multithreading patch at
https://github.com/vasi/squashfuse/pull/70
makes a huge difference, so much so that we have decided to for now include a
patched version of squashfuse_ll in the apptainer distribution. We would much
prefer of course if it would come directly from the EPEL/Fedora version of the
squashfuse package.
Version-Release number of selected component (if applicable):
0.1.102
How reproducible:
Very
Steps to Reproduce:
Please see the above issue for details.
Actual results:
With the detailed benchmark on a 16 core el7 node, reading from a local disk
takes 6:23, epel squashfuse by itself takes 41:11, and epel squashfuse_ll takes
13:06.
Expected results:
I expect results much more comparable to local disk, and in fact with the
multithreaded patch the benchmark time goes down to 6:35, nearly the local disk
time.
Additional info:
Would you consider upgrading to squashfuse 0.1.105, including the multithreaded
patch, and compiling it with `--enable-multithreading`? The upstream provider
does not seem to be in any hurry to include the patch; he hasn't even commented
on the thread which has been available for several months.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2124630
https://bugzilla.redhat.com/show_bug.cgi?id=2088754
Bug ID: 2088754
Summary: python-libtmux-0.12.0a0 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: python-libtmux
Keywords: FutureFeature, Triaged
Assignee: mail(a)fabian-affolter.ch
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: dcavalca(a)fb.com,
epel-packagers-sig(a)lists.fedoraproject.org,
mail(a)fabian-affolter.ch
Target Milestone: ---
Classification: Fedora
Latest upstream release: 0.12.0a0
Current version/release in rawhide: 0.11.0-1.fc37
URL: https://pypi.python.org/pypi/libtmux
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/13040/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2088754
https://bugzilla.redhat.com/show_bug.cgi?id=2078238
Bug ID: 2078238
Summary: gssdp-1.5.0 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: gssdp
Keywords: FutureFeature, Triaged
Assignee: klember(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: dcavalca(a)fb.com,
epel-packagers-sig(a)lists.fedoraproject.org,
klember(a)redhat.com, zeenix(a)redhat.com
Target Milestone: ---
Classification: Fedora
Latest upstream release: 1.5.0
Current version/release in rawhide: 1.4.0.1-2.fc36
URL: https://developer.gnome.org/gssdp/
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/1262/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2078238
https://bugzilla.redhat.com/show_bug.cgi?id=2118163
Bug ID: 2118163
Summary: F37FailsToInstall: mkdocs
Product: Fedora
Version: 37
Status: NEW
Component: mkdocs
Assignee: manisandro(a)gmail.com
Reporter: mhroncok(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
manisandro(a)gmail.com, rcallicotte(a)mailbox.org,
williamjmorenor(a)gmail.com
Blocks: 2045109 (F37FailsToInstall)
Target Milestone: ---
Classification: Fedora
Hello,
Please note that this comment was generated automatically. If you feel that
this output has mistakes, please contact me via email (mhroncok(a)redhat.com)
Your package (mkdocs) Fails To Install in Fedora 37:
can't install mkdocs:
- nothing provides (python3.11dist(markdown) < 3.4~~ with
python3.11dist(markdown) >= 3.2.1) needed by mkdocs-1.3.1-2.fc37.noarch
If you know about this problem and are planning on fixing it, please
acknowledge so by setting the bug status to ASSIGNED. If you don't have time to
maintain this package, consider orphaning it, so maintainers of dependent
packages realize the problem.
If you don't react accordingly to the policy for FTBFS/FTI bugs
(https://docs.fedoraproject.org/en-US/fesco/Fails_to_build_from_source_Fails…)
your package may be orphaned in 8+ weeks.
P.S. The data was generated solely from koji buildroot, so it might be newer
than the latest compose or the content on mirrors. To reproduce, use the
koji/local repo only, e.g. in mock:
$ mock -r fedora-37-x86_64 --config-opts mirrored=False install mkdocs
P.P.S. If this bug has been reported in the middle of upgrading multiple
dependent packages, please consider using side tags:
https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/#updating-inter-d…
Thanks!
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=2045109
[Bug 2045109] Fedora 37 Fails To install Tracker
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2118163
https://bugzilla.redhat.com/show_bug.cgi?id=2118159
Bug ID: 2118159
Summary: F38FailsToInstall: mkdocs
Product: Fedora
Version: rawhide
Status: NEW
Component: mkdocs
Assignee: manisandro(a)gmail.com
Reporter: mhroncok(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
manisandro(a)gmail.com, rcallicotte(a)mailbox.org,
williamjmorenor(a)gmail.com
Blocks: 2117177 (F38FailsToInstall,RAWHIDEFailsToInstall)
Target Milestone: ---
Classification: Fedora
Hello,
Please note that this comment was generated automatically. If you feel that
this output has mistakes, please contact me via email (mhroncok(a)redhat.com)
Your package (mkdocs) Fails To Install in Fedora 38:
can't install mkdocs:
- nothing provides (python3.11dist(markdown) < 3.4~~ with
python3.11dist(markdown) >= 3.2.1) needed by mkdocs-1.3.1-2.fc37.noarch
If you know about this problem and are planning on fixing it, please
acknowledge so by setting the bug status to ASSIGNED. If you don't have time to
maintain this package, consider orphaning it, so maintainers of dependent
packages realize the problem.
If you don't react accordingly to the policy for FTBFS/FTI bugs
(https://docs.fedoraproject.org/en-US/fesco/Fails_to_build_from_source_Fails…)
your package may be orphaned in 8+ weeks.
P.S. The data was generated solely from koji buildroot, so it might be newer
than the latest compose or the content on mirrors. To reproduce, use the
koji/local repo only, e.g. in mock:
$ mock -r fedora-38-x86_64 --config-opts mirrored=False install mkdocs
P.P.S. If this bug has been reported in the middle of upgrading multiple
dependent packages, please consider using side tags:
https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/#updating-inter-d…
Thanks!
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=2117177
[Bug 2117177] Fedora 38 Fails To install Tracker
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2118159