[Bug 2063508] New: authentication recquired The password you use does not match
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2063508
Bug ID: 2063508
Summary: authentication recquired The password you use does not
match
Product: Fedora
Version: 36
OS: Linux
Status: NEW
Component: keyrings-filesystem
Severity: high
Assignee: manisandro(a)gmail.com
Reporter: jjb(a)xs4all.nl
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
manisandro(a)gmail.com, sergio(a)serjux.com
Target Milestone: ---
Classification: Fedora
Description of problem:
Keyring is locked. (in Passwords and Keys, Seahorse)
try to solve error message "authentication required, the password you use to
log in to your computer no longer match that of your login keyring"
The known password is not accepted.
Version-Release number of selected component (if applicable):
How reproducible:
try to Get Geary (email program) at work.
At login to the computer the password is working all right.
Steps to Reproduce:
1.
2.
3.
Actual results:
cannot authenticate password.
Expected results:
no question of authentication
Additional info:
do not know how to solve this problem.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2063508
11 months, 2 weeks
[Bug 2090622] New: [abrt] xmlstarlet: xmlXPathCompUnaryExpr(): xmlstarlet killed by SIGSEGV
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2090622
Bug ID: 2090622
Summary: [abrt] xmlstarlet: xmlXPathCompUnaryExpr(): xmlstarlet
killed by SIGSEGV
Product: Fedora
Version: 36
Hardware: x86_64
Status: NEW
Whiteboard: abrt_hash:fae15203a4426ff6ea89539d9cb4c1ae9473b845;VAR
IANT_ID=workstation;
Component: xmlstarlet
Assignee: stickster(a)gmail.com
Reporter: mf.flip(a)gmail.com
QA Contact: extras-qa(a)fedoraproject.org
CC: daltonminer(a)gmail.com, dcavalca(a)fb.com,
epel-packagers-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name, ngompa13(a)gmail.com,
stickster(a)gmail.com
Target Milestone: ---
Classification: Fedora
Version-Release number of selected component:
xmlstarlet-1.6.1-18.fc36
Additional info:
reporter: libreport-2.17.1
backtrace_rating: 4
cgroup:
0::/user.slice/user-1000.slice/user@1000.service/app.slice/vte-spawn-b6417f15-9599-4249-82d4-24ff704344e1.scope
cmdline: xmlstarlet ed --without-comments activemq.xml
crash_function: xmlXPathCompUnaryExpr
executable: /usr/bin/xmlstarlet
journald_cursor:
s=952f321409164e31aecdcfe29dabfc09;i=2c2dd8;b=d8a42405eec240a19c823e14d4731d5c;m=7ac1a3fe9;t=5dfd855906ebd;x=1c1ad98bbbf498bf
kernel: 5.17.9-300.fc36.x86_64
rootdir: /
runlevel: N 5
type: CCpp
uid: 1000
Truncated backtrace:
Thread no. 1 (10 frames)
#0 xmlXPathCompUnaryExpr at
/usr/src/debug/libxml2-2.9.14-1.fc36.x86_64/xpath.c:10736
#1 xmlXPathCompMultiplicativeExpr at
/usr/src/debug/libxml2-2.9.14-1.fc36.x86_64/xpath.c:10769
#2 xmlXPathCompAdditiveExpr at
/usr/src/debug/libxml2-2.9.14-1.fc36.x86_64/xpath.c:10810
#3 xmlXPathCompRelationalExpr at
/usr/src/debug/libxml2-2.9.14-1.fc36.x86_64/xpath.c:10848
#4 xmlXPathCompEqualityExpr at
/usr/src/debug/libxml2-2.9.14-1.fc36.x86_64/xpath.c:10887
#5 xmlXPathCompAndExpr at
/usr/src/debug/libxml2-2.9.14-1.fc36.x86_64/xpath.c:10918
#6 xmlXPathCompileExpr at
/usr/src/debug/libxml2-2.9.14-1.fc36.x86_64/xpath.c:10956
#7 xmlXPathEvalExpr__internal_alias at
/usr/src/debug/libxml2-2.9.14-1.fc36.x86_64/xpath.c:14426
#9 xmlXPathEval__internal_alias at
/usr/src/debug/libxml2-2.9.14-1.fc36.x86_64/xpath.c:14466
#10 xmlXPathEvalExpression__internal_alias at
/usr/src/debug/libxml2-2.9.14-1.fc36.x86_64/xpath.c:14541
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2090622
11 months, 2 weeks
[Bug 2107574] New: fortune(6) man page indentation is messed up for -o and -s options
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2107574
Bug ID: 2107574
Summary: fortune(6) man page indentation is messed up for -o
and -s options
Product: Fedora
Version: 36
Status: NEW
Component: fortune-mod
Severity: low
Assignee: sheltren(a)fedoraproject.org
Reporter: rhbugs(a)n-dimensional.de
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
sergio(a)serjux.com, sheltren(a)fedoraproject.org,
shlomif(a)shlomifish.org
Target Milestone: ---
Classification: Fedora
Created attachment 1897376
--> https://bugzilla.redhat.com/attachment.cgi?id=1897376&action=edit
Quick fix patch to the fortune.6 file, copying the formatting -i and -n
Description of problem:
In the fortune(6) man page, the indentation for the description
of the options -o and -s is wrong.
Version-Release number of selected component (if applicable):
fortune-mod-3.12.0-2.fc36.x86_64
How reproducible:
100%
Steps to Reproduce:
1. man fortune
2. type /record or scroll down
Actual results:
filename-record will precede the records from the file it names.
-n length
Set the longest fortune length (in characters) considered to be
“short” (the default is 160). All fortunes longer than this are
considered “long”. Be careful! If you set the length too short and
ask for short fortunes, or too long and ask for long ones, fortune
goes into a never-ending thrash loop.
-o Choose only from potentially offensive aphorisms. The -o option
is ignored if a fortune directory is specified.
Please, please, please request a potentially offensive fortune if
and only if you believe, deep in your heart, that you are willing
to be offended. (And that you'll just quit using -o rather than
give us grief about it, okay?)
... let us keep in mind the basic governing philosophy of The
Brotherhood, as handsomely summarized in these words: we believe in
healthy, hearty laughter -- at the expense of the whole human race,
if needs be. Needs be.
--H. Allen Smith, "Rude Jokes"
-s Short apothegms only. See -n on which fortunes are considered
“short”.
-i
Ignore case for -m patterns.
Expected results:
filename-record will precede the records from the file it names.
-n length
Set the longest fortune length (in characters) considered to be
“short” (the default is 160). All fortunes longer than this are
considered “long”. Be careful! If you set the length too short and
ask for short fortunes, or too long and ask for long ones, fortune
goes into a never-ending thrash loop.
-o
Choose only from potentially offensive aphorisms. The -o option is
ignored if a fortune directory is specified.
Please, please, please request a potentially offensive fortune if
and only if you believe, deep in your heart, that you are willing
to be offended. (And that you'll just quit using -o rather than
give us grief about it, okay?)
... let us keep in mind the basic governing philosophy of The
Brotherhood, as handsomely summarized in these words: we believe in
healthy, hearty laughter -- at the expense of the whole human race,
if needs be. Needs be.
--H. Allen Smith, "Rude Jokes"
-s
Short apothegms only. See -n on which fortunes are considered
“short”.
-i
Ignore case for -m patterns.
Additional info:
The attached patch only fixes the symptoms, not the root cause.
This should probably be fixed somewhere upstream deep inside the mass of perl
scripts building the man pages.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2107574
11 months, 2 weeks
[Bug 2126816] New: CVE-2021-40648 man2html: sys-apps/man2html: multiple vulnerabilities [fedora-all]
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2126816
Bug ID: 2126816
Summary: CVE-2021-40648 man2html: sys-apps/man2html: multiple
vulnerabilities [fedora-all]
Product: Fedora
Version: 36
Status: NEW
Component: man2html
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: sergio(a)serjux.com
Reporter: ybuenos(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
orion(a)nwra.com, sergio(a)serjux.com,
tchollingsworth(a)gmail.com, viktor.vix.jancik(a)gmail.com
Target Milestone: ---
Classification: Fedora
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of fedora-all.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2126816
11 months, 2 weeks
[Bug 2126814] New: CVE-2021-40647 man2html: sys-apps/man2html: multiple vulnerabilities [fedora-all]
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2126814
Bug ID: 2126814
Summary: CVE-2021-40647 man2html: sys-apps/man2html: multiple
vulnerabilities [fedora-all]
Product: Fedora
Version: 36
Status: NEW
Component: man2html
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: sergio(a)serjux.com
Reporter: ybuenos(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
orion(a)nwra.com, sergio(a)serjux.com,
tchollingsworth(a)gmail.com, viktor.vix.jancik(a)gmail.com
Target Milestone: ---
Classification: Fedora
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of fedora-all.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2126814
11 months, 2 weeks
[Bug 2104905] New: CVE-2022-2097 openssl: AES OCB fails to encrypt some bytes
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2104905
Bug ID: 2104905
Summary: CVE-2022-2097 openssl: AES OCB fails to encrypt some
bytes
Product: Security Response
Hardware: All
OS: Linux
Status: NEW
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: mcascell(a)redhat.com
CC: bdettelb(a)redhat.com, berrange(a)redhat.com,
bootloader-eng-team(a)redhat.com, caswilli(a)redhat.com,
cfergeau(a)redhat.com, cllang(a)redhat.com,
crobinso(a)redhat.com,
crypto-team(a)lists.fedoraproject.org,
csutherl(a)redhat.com, dbelyavs(a)redhat.com,
ddepaula(a)redhat.com, dffrench(a)redhat.com,
dhalasz(a)redhat.com, dkuc(a)redhat.com, dueno(a)redhat.com,
elima(a)redhat.com,
epel-packagers-sig(a)lists.fedoraproject.org,
erik-fedora(a)vanpienbroek.nl, f4bug(a)amsat.org,
fjansen(a)redhat.com, fmartine(a)redhat.com,
gzaronik(a)redhat.com, jary(a)redhat.com,
jburrell(a)redhat.com, jclere(a)redhat.com,
jferlan(a)redhat.com, jkoehler(a)redhat.com,
jwong(a)redhat.com, jwon(a)redhat.com, kaycoth(a)redhat.com,
krathod(a)redhat.com, kraxel(a)redhat.com,
kshier(a)redhat.com, ktietz(a)redhat.com,
marcandre.lureau(a)redhat.com,
michal.skrivanek(a)redhat.com, michel(a)michel-slm.name,
micjohns(a)redhat.com, mjg59(a)srcf.ucam.org,
mmadzin(a)redhat.com, mperina(a)redhat.com,
mspacek(a)redhat.com, mturk(a)redhat.com,
ngough(a)redhat.com, pbonzini(a)redhat.com,
peholase(a)redhat.com, pjindal(a)redhat.com,
pjones(a)redhat.com, plodge(a)redhat.com,
redhat-bugzilla(a)linuxnetz.de, rgodfrey(a)redhat.com,
rharwood(a)redhat.com, rh-spice-bugs(a)redhat.com,
rjones(a)redhat.com, sahana(a)redhat.com,
sbonazzo(a)redhat.com, stcannon(a)redhat.com,
sthirugn(a)redhat.com, szappis(a)redhat.com,
tfister(a)redhat.com, tm(a)t8m.info,
virt-maint(a)lists.fedoraproject.org,
virt-maint(a)redhat.com, vkrizan(a)redhat.com,
vkumar(a)redhat.com, vmugicag(a)redhat.com
Blocks: 2104175
Target Milestone: ---
Classification: Other
AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised
implementation will not encrypt the entirety of the data under some
circumstances. This could reveal sixteen bytes of data that was preexisting in
the memory that wasn't written. In the special case of "in place" encryption,
sixteen bytes of the plaintext would be revealed.
OpenSSL security advisory:
https://www.openssl.org/news/secadv/20220705.txt
Upstream fix:
https://github.com/openssl/openssl/commit/6ebf6d51596f51d23ccbc17930778d1...
[master]
https://github.com/openssl/openssl/commit/919925673d6c9cfed3c1085497f5dfb...
[1_1_1-stable]
https://github.com/openssl/openssl/commit/a98f339ddd7e8f487d6e0088d4a9a42...
[openssl-3.0]
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2104905
11 months, 2 weeks
[Bug 2134911] New: QSocketNotifier: Can only be used with threads started with QThread
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2134911
Bug ID: 2134911
Summary: QSocketNotifier: Can only be used with threads started
with QThread
Product: Fedora
Version: 36
Hardware: x86_64
OS: Linux
Status: NEW
Component: python-matplotlib
Assignee: quantum.analyst(a)gmail.com
Reporter: dev(a)javinator9889.com
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
gwync(a)protonmail.com, jonathan.underwood(a)gmail.com,
paulo.cesar.pereira.de.andrade(a)gmail.com,
python-packagers-sig(a)lists.fedoraproject.org,
quantum.analyst(a)gmail.com, thibault(a)north.li,
tomspur(a)fedoraproject.org
Target Milestone: ---
Classification: Fedora
Created attachment 1918084
--> https://bugzilla.redhat.com/attachment.cgi?id=1918084&action=edit
Python script to replicate exactly the issue (one needs to have cuDNN and CUDA
for make it work)
Description of problem:
Trying to replicate a convolutional AI model on my local computer I faced this
issue when simply trying to display the generated images by such model. The
"guide" I'm following is:
https://keras.io/guides/keras_cv/generate_images_with_stable_diffusion/?s...
There is no issue when generating the images but when displaying them.
Version-Release number of selected component (if applicable): tried with both
matplotlib from pip (3.6.1) and the one bundled with Fedora 36 (3.5.3-2, at the
time of writting this). Notice that the shipped Python version is in use
(3.10.2)
How reproducible: always, inside a Wayland environment (I didn't tried with
Xorg but I've seen in general that this issue is only related to Wayland)
Steps to Reproduce:
1. Generate a bunch of images using the model, or any other application
2. In a Python console:
```
import matplotlib.pyplot as plt
# images = <matrix of generated images>
plt.imshow(images)
```
Actual results:
QSocketNotifier: Can only be used with threads started with QThread
Expected results:
The set of images show up and are displayed
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2134911
11 months, 2 weeks
[Bug 2119663] New: [abrt] ImageMagick: MagickSignalHandler(): convert killed by SIGABRT
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2119663
Bug ID: 2119663
Summary: [abrt] ImageMagick: MagickSignalHandler(): convert
killed by SIGABRT
Product: Fedora
Version: 36
Hardware: x86_64
Status: NEW
Whiteboard: abrt_hash:99097730e8acace0088df17b6d8c7e8cabcd7117;VAR
IANT_ID=workstation;
Component: ImageMagick
Assignee: luya_tfz(a)thefinalzone.net
Reporter: EldarK(a)outlook.com
QA Contact: extras-qa(a)fedoraproject.org
CC: blaise(a)gmail.com, dcavalca(a)fb.com,
epel-packagers-sig(a)lists.fedoraproject.org,
fedora(a)famillecollet.com, luya_tfz(a)thefinalzone.net,
michel(a)michel-slm.name, ngompa13(a)gmail.com,
pampelmuse(a)gmx.at, sergio(a)serjux.com,
troy(a)troycurtisjr.com
Target Milestone: ---
Classification: Fedora
Version-Release number of selected component:
ImageMagick-1:6.9.12.52-1.fc36
Additional info:
reporter: libreport-2.17.1
backtrace_rating: 4
cgroup:
0::/user.slice/user-1000.slice/user@1000.service/app.slice/app-gnome-variety-4755.scope
cmdline: convert
/home/eldar/.config/variety/Downloaded/Unsplash/photo-1659782682835-bf57d0f0bee4.jpg
-auto-orient
/home/eldar/.config/variety/wallpaper/wallpaper-auto-rotated-620c47dc4cdbd5f227b0e1d753b50b2f.jpg
crash_function: MagickSignalHandler
executable: /usr/bin/convert
journald_cursor:
s=9340a345271846d3b1e89d8cb69dd7b7;i=3a5f;b=30c3a79f23984832a0bb195d5db5f7f8;m=17c174a0f;t=5e68547d57561;x=a5e9921b867075a9
kernel: 5.18.17-200.fc36.x86_64
rootdir: /
runlevel: N 5
type: CCpp
uid: 1000
Truncated backtrace:
Thread no. 1 (10 frames)
#10 MagickSignalHandler at magick/magick.c:1191
#12 __memmove_sse2_unaligned_erms at
../sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S:273
#13 memcpy at /usr/include/bits/string_fortified.h:29
#14 ReadBlob at magick/blob.c:3310
#15 FillInputBuffer at coders/jpeg.c:256
#16 jpeg_fill_bit_buffer at
/usr/src/debug/libjpeg-turbo-2.1.2-2.fc36.x86_64/jdhuff.c:305
#17 decode_mcu_AC_first at
/usr/src/debug/libjpeg-turbo-2.1.2-2.fc36.x86_64/jdphuff.c:402
#18 consume_data at
/usr/src/debug/libjpeg-turbo-2.1.2-2.fc36.x86_64/jdcoefct.c:235
#19 jpeg_start_decompress at
/usr/src/debug/libjpeg-turbo-2.1.2-2.fc36.x86_64/jdapistd.c:67
#20 ReadJPEGImage_ at coders/jpeg.c:1437
Potential duplicate: bug 1644520
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2119663
11 months, 2 weeks