https://bugzilla.redhat.com/show_bug.cgi?id=2052682
Bug ID: 2052682
Summary: CVE-2022-24303 python-pillow: temporary directory with
a space character allows removal of unrelated file
after im.show() and related action
Product: Security Response
Hardware: All
OS: Linux
Status: NEW
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: gsuckevi(a)redhat.com
CC: bdettelb(a)redhat.com, cstratak(a)redhat.com,
epel-packagers-sig(a)lists.fedoraproject.org,
infra-sig(a)lists.fedoraproject.org,
manisandro(a)gmail.com, miminar(a)redhat.com,
orion(a)nwra.com, python-maint(a)redhat.com,
python-sig(a)lists.fedoraproject.org, torsava(a)redhat.com
Target Milestone: ---
Classification: Other
If the path to the temporary directory on Linux or macOS contained a space,
this would break removal of the temporary image file after im.show() (and
related actions), and potentially remove an unrelated file. This been present
since PIL.
Reference:
https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2052682
https://bugzilla.redhat.com/show_bug.cgi?id=2042527
Bug ID: 2042527
Summary: CVE-2022-22817 python-pillow: PIL.ImageMath.eval
allows evaluation of arbitrary expressions
Product: Security Response
Hardware: All
OS: Linux
Status: NEW
Component: vulnerability
Keywords: Security
Severity: high
Priority: high
Assignee: security-response-team(a)redhat.com
Reporter: gsuckevi(a)redhat.com
CC: bdettelb(a)redhat.com, cstratak(a)redhat.com,
epel-packagers-sig(a)lists.fedoraproject.org,
infra-sig(a)lists.fedoraproject.org,
manisandro(a)gmail.com, miminar(a)redhat.com,
orion(a)nwra.com, python-maint(a)redhat.com,
python-sig(a)lists.fedoraproject.org, torsava(a)redhat.com
Target Milestone: ---
Classification: Other
PIL.ImageMath.eval in Pillow before 9.0.0 allows evaluation of arbitrary
expressions, such as ones that use the Python exec method.
Reference:
https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#restrict-bu…
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2042527
https://bugzilla.redhat.com/show_bug.cgi?id=2042522
Bug ID: 2042522
Summary: CVE-2022-22816 python-pillow: buffer over-read during
initialization of ImagePath.Path in path_getbbox() in
path.c
Product: Security Response
Hardware: All
OS: Linux
Status: NEW
Component: vulnerability
Keywords: Security
Severity: high
Priority: high
Assignee: security-response-team(a)redhat.com
Reporter: gsuckevi(a)redhat.com
CC: bdettelb(a)redhat.com, cstratak(a)redhat.com,
epel-packagers-sig(a)lists.fedoraproject.org,
infra-sig(a)lists.fedoraproject.org,
manisandro(a)gmail.com, miminar(a)redhat.com,
orion(a)nwra.com, python-maint(a)redhat.com,
python-sig(a)lists.fedoraproject.org, torsava(a)redhat.com
Target Milestone: ---
Classification: Other
path_getbbox in path.c in Pillow before 9.0.0 has a buffer over-read during
initialization of ImagePath.Path.
References:
https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1da…https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-image…
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2042522
https://bugzilla.redhat.com/show_bug.cgi?id=2042511
Bug ID: 2042511
Summary: CVE-2022-22815 python-pillow: improperly initializes
ImagePath.Path in path_getbbox() in path.c
Product: Security Response
Hardware: All
OS: Linux
Status: NEW
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: gsuckevi(a)redhat.com
CC: bdettelb(a)redhat.com, cstratak(a)redhat.com,
epel-packagers-sig(a)lists.fedoraproject.org,
infra-sig(a)lists.fedoraproject.org,
manisandro(a)gmail.com, miminar(a)redhat.com,
orion(a)nwra.com, python-maint(a)redhat.com,
python-sig(a)lists.fedoraproject.org, torsava(a)redhat.com
Target Milestone: ---
Classification: Other
path_getbbox in path.c in Pillow before 9.0.0 improperly initializes
ImagePath.Path.
References:
https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1da…https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-image…
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2042511
https://bugzilla.redhat.com/show_bug.cgi?id=2032607
Bug ID: 2032607
Summary: F36FailsToInstall: hyperkitty
Product: Fedora
Version: rawhide
Status: NEW
Component: python-hyperkitty
Assignee: michel(a)michel-slm.name
Reporter: mhroncok(a)redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
infra-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name, ngompa13(a)gmail.com,
python-sig(a)lists.fedoraproject.org
Blocks: 1992487 (F36FailsToInstall,RAWHIDEFailsToInstall)
Target Milestone: ---
Classification: Fedora
Hello,
Please note that this comment was generated automatically. If you feel that
this output has mistakes, please contact me via email (mhroncok(a)redhat.com)
Your package (python-hyperkitty) Fails To Install in Fedora 36:
can't install hyperkitty:
- nothing provides python3.10dist(flufl-lock) >= 4 needed by
hyperkitty-1.3.5-1.fc36.noarch
- nothing provides python3.10dist(mistune) >= 2~rc1 needed by
hyperkitty-1.3.5-1.fc36.noarch
If you know about this problem and are planning on fixing it, please
acknowledge so by setting the bug status to ASSIGNED. If you don't have time to
maintain this package, consider orphaning it, so maintainers of dependent
packages realize the problem.
If you don't react accordingly to the policy for FTBFS/FTI bugs
(https://docs.fedoraproject.org/en-US/fesco/Fails_to_build_from_source_Fails…)
your package may be orphaned in 8+ weeks.
P.S. The data was generated solely from koji buildroot, so it might be newer
than the latest compose or the content on mirrors.
P.P.S. If this bug has been reported in the middle of upgrading multiple
dependent packages, please consider using side tags:
https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/#updating-inter-d…
Thanks!
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1992487
[Bug 1992487] Fedora 36 Fails To install Tracker
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2032607
https://bugzilla.redhat.com/show_bug.cgi?id=2046878
Bug ID: 2046878
Summary: python-hyperkitty: FTBFS in Fedora rawhide/f36
Product: Fedora
Version: rawhide
Status: NEW
Component: python-hyperkitty
Assignee: michel(a)michel-slm.name
Reporter: releng(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
infra-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name, ngompa13(a)gmail.com,
python-sig(a)lists.fedoraproject.org
Blocks: 1992484 (F36FTBFS)
Target Milestone: ---
Classification: Fedora
python-hyperkitty failed to build from source in Fedora rawhide/f36
https://koji.fedoraproject.org/koji/taskinfo?taskID=81985454
For details on the mass rebuild see:
https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild
Please fix python-hyperkitty at your earliest convenience and set the bug's
status to
ASSIGNED when you start fixing it. If the bug remains in NEW state for 8 weeks,
python-hyperkitty will be orphaned. Before branching of Fedora 37,
python-hyperkitty will be retired, if it still fails to build.
For more details on the FTBFS policy, please visit:
https://docs.fedoraproject.org/en-US/fesco/Fails_to_build_from_source_Fails…
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1992484
[Bug 1992484] Fedora 36 FTBFS Tracker
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2046878
https://bugzilla.redhat.com/show_bug.cgi?id=2049668
Bug ID: 2049668
Summary: libimagequant-4.0.0 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: libimagequant
Keywords: FutureFeature, Triaged
Assignee: manisandro(a)gmail.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
infra-sig(a)lists.fedoraproject.org,
manisandro(a)gmail.com,
python-sig(a)lists.fedoraproject.org, sergio(a)serjux.com
Target Milestone: ---
Classification: Fedora
Latest upstream release: 4.0.0
Current version/release in rawhide: 2.17.0-2.fc36
URL: https://pngquant.org/lib/
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/12768/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2049668
https://bugzilla.redhat.com/show_bug.cgi?id=2044963
Bug ID: 2044963
Summary: F36FailsToInstall: postorius
Product: Fedora
Version: rawhide
Status: NEW
Component: python-postorius
Assignee: michel(a)michel-slm.name
Reporter: mhroncok(a)redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
infra-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name, ngompa13(a)gmail.com,
python-sig(a)lists.fedoraproject.org
Blocks: 1992487 (F36FailsToInstall,RAWHIDEFailsToInstall)
Target Milestone: ---
Classification: Fedora
Hello,
Please note that this comment was generated automatically. If you feel that
this output has mistakes, please contact me via email (mhroncok(a)redhat.com)
Your package (python-postorius) Fails To Install in Fedora 36:
can't install postorius:
- nothing provides (python3.10dist(django) < 3.3~~ with
python3.10dist(django) >= 2.2) needed by postorius-1.3.6-1.fc36.noarch
If you know about this problem and are planning on fixing it, please
acknowledge so by setting the bug status to ASSIGNED. If you don't have time to
maintain this package, consider orphaning it, so maintainers of dependent
packages realize the problem.
If you don't react accordingly to the policy for FTBFS/FTI bugs
(https://docs.fedoraproject.org/en-US/fesco/Fails_to_build_from_source_Fails…)
your package may be orphaned in 8+ weeks.
P.S. The data was generated solely from koji buildroot, so it might be newer
than the latest compose or the content on mirrors.
P.P.S. If this bug has been reported in the middle of upgrading multiple
dependent packages, please consider using side tags:
https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/#updating-inter-d…
Thanks!
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1992487
[Bug 1992487] Fedora 36 Fails To install Tracker
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2044963
https://bugzilla.redhat.com/show_bug.cgi?id=2059360
Bug ID: 2059360
Summary: yarnpkg for fedora 35 installs binary
'/usr/bin/%{fc_name}'
Product: Fedora
Version: 35
Status: NEW
Component: yarnpkg
Assignee: zsvetlik(a)redhat.com
Reporter: martin.kuehl(a)gmail.com
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
ngompa13(a)gmail.com, zsvetlik(a)redhat.com
Target Milestone: ---
Classification: Fedora
Description of problem:
the current yarnpkg rpm installs a binary at the path '/usr/bin/%{fc_name}'
this is also visible at:
https://packages.fedoraproject.org/pkgs/yarnpkg/yarnpkg/fedora-35.html#files
Version-Release number of selected component (if applicable):
yarnpkg-1.22.10-3.fc35
How reproducible:
always
Steps to Reproduce:
1. dnf repoquery --list yarnpkg | grep /usr/bin
or look at
https://packages.fedoraproject.org/pkgs/yarnpkg/yarnpkg/fedora-35.html#files
Actual results:
/usr/bin/%{fc_name}
/usr/bin/yarn
/usr/bin/yarnpkg
Expected results:
judging by the package for fedora 36:
/usr/bin/nodejs-yarn
/usr/bin/yarn
/usr/bin/yarnpkg
Additional info:
if i remember correctly that's rpm spec template syntax so there might be some
stray escaping or something?
it's also apparently fixed for f36 so backporting that package would be just
fine.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2059360
https://bugzilla.redhat.com/show_bug.cgi?id=2058882
Bug ID: 2058882
Summary: ipython-8.1.0 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: ipython
Keywords: FutureFeature, Triaged
Assignee: lbalhar(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: dcantrell(a)redhat.com,
epel-packagers-sig(a)lists.fedoraproject.org,
lbalhar(a)redhat.com, mhroncok(a)redhat.com,
michel(a)michel-slm.name, mrunge(a)redhat.com,
orion(a)nwra.com, python-sig(a)lists.fedoraproject.org,
tomspur(a)fedoraproject.org
Target Milestone: ---
Classification: Fedora
Latest upstream release: 8.1.0
Current version/release in rawhide: 8.0.1-1.fc36
URL: https://ipython.org/
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/1399/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2058882
https://bugzilla.redhat.com/show_bug.cgi?id=2058448
Bug ID: 2058448
Summary: rocksdb: rebuild for gflags update in c8s
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: rocksdb
Assignee: epel-packagers-sig(a)lists.fedoraproject.org
Reporter: carl(a)redhat.com
CC: dcavalca(a)fb.com,
epel-packagers-sig(a)lists.fedoraproject.org,
hegjon(a)gmail.com, mmuzila(a)redhat.com
Target Milestone: ---
Classification: Fedora
Description of problem:
In CentOS Stream 8, the gflags package was updated from 2.1.2-6.el8 to
2.2.2-1.el8 (see bug 2035143). That introduces an soname bump from
libgflags.so.2.1 to libgflags.so.2.2. rocksdb links against that soname and
must be rebuilt in epel8-next to work correctly on c8s.
Version-Release number of selected component (if applicable):
rocksdb-6.26.1-2.el8
Steps to Reproduce:
1. dnf install rocksdb (this resolves to the older gflags in the repo)
2. dnf update gflags
Actual results:
Error:
Problem: problem with installed package rocksdb-6.26.1-2.el8.x86_64
- package rocksdb-6.26.1-2.el8.x86_64 requires libgflags.so.2.1()(64bit), but
none of the providers can be installed
- cannot install both gflags-2.2.2-1.el8.x86_64 and gflags-2.1.2-6.el8.x86_64
- cannot install the best update candidate for package
gflags-2.1.2-6.el8.x86_64
(try to add '--allowerasing' to command line to replace conflicting packages or
'--skip-broken' to skip uninstallable packages or '--nobest' to use not only
best candidate packages)
Expected results:
installation of the latest gflags and rocksdb
Additional info:
This is happening in c8s now, but will also happen when RHEL 8.6 is released.
At that point it can be remediated in regular epel8.
--
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2058448
https://bugzilla.redhat.com/show_bug.cgi?id=2052684
Bug ID: 2052684
Summary: CVE-2022-24303 python-pillow: temporary directory with
a space character allows removal of unrelated file
after im.show() and related action [fedora-all]
Product: Fedora
Version: 35
Status: NEW
Component: python-pillow
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: manisandro(a)gmail.com
Reporter: gsuckevi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
infra-sig(a)lists.fedoraproject.org,
manisandro(a)gmail.com, miminar(a)redhat.com,
python-sig(a)lists.fedoraproject.org
Target Milestone: ---
Classification: Fedora
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of fedora-all.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2052684
https://bugzilla.redhat.com/show_bug.cgi?id=2057729
Bug ID: 2057729
Summary: libdwarf-0.3.4 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: libdwarf
Keywords: FutureFeature, Triaged
Assignee: tom(a)compton.nu
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
jitesh.1337(a)gmail.com, michel(a)michel-slm.name,
orion(a)nwra.com, tom(a)compton.nu
Target Milestone: ---
Classification: Fedora
Latest upstream release: 0.3.4
Current version/release in rawhide: 0.3.3-1.fc37
URL: http://www.prevanders.net/dwarf.html
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/1597/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2057729
https://bugzilla.redhat.com/show_bug.cgi?id=2057214
Bug ID: 2057214
Summary: python-flit-3.7.0 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: python-flit
Keywords: FutureFeature, Triaged
Assignee: mhroncok(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
mhroncok(a)redhat.com, michel(a)michel-slm.name,
python-sig(a)lists.fedoraproject.org
Target Milestone: ---
Classification: Fedora
Latest upstream release: 3.7.0
Current version/release in rawhide: 3.5.1-2.fc36
URL: https://flit.readthedocs.io/en/latest/
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/12061/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2057214
https://bugzilla.redhat.com/show_bug.cgi?id=2058883
Bug ID: 2058883
Summary: python-libtmux-0.11.0b0 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: python-libtmux
Keywords: FutureFeature, Triaged
Assignee: mail(a)fabian-affolter.ch
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: dcavalca(a)fb.com,
epel-packagers-sig(a)lists.fedoraproject.org,
mail(a)fabian-affolter.ch
Target Milestone: ---
Classification: Fedora
Latest upstream release: 0.11.0b0
Current version/release in rawhide: 0.10.3-1.fc37
URL: https://pypi.python.org/pypi/libtmux
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/13040/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2058883
https://bugzilla.redhat.com/show_bug.cgi?id=2057217
Bug ID: 2057217
Summary: libdwarf-0.3.3 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: libdwarf
Assignee: tom(a)compton.nu
Reporter: michel(a)michel-slm.name
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
jitesh.1337(a)gmail.com, michel(a)michel-slm.name,
orion(a)nwra.com, tom(a)compton.nu
Target Milestone: ---
Classification: Fedora
Filing this manually, as release monitoring is broken since libdwarf went
semver (all the new versions are still showing as older than the old YYYYMMDD).
I've updated the regex and filed
https://github.com/fedora-infra/anitya/issues/1307 to request old versions to
be purged.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2057217
https://bugzilla.redhat.com/show_bug.cgi?id=2054370
Bug ID: 2054370
Summary: python-stack-data-0.2.0 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: python-stack-data
Keywords: FutureFeature, Triaged
Assignee: lbalhar(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
lbalhar(a)redhat.com, michel(a)michel-slm.name
Target Milestone: ---
Classification: Fedora
Latest upstream release: 0.2.0
Current version/release in rawhide: 0.1.4-2.fc36
URL: https://pypi.org/project/stack-data/0.0.7
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/90020/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2054370
https://bugzilla.redhat.com/show_bug.cgi?id=2050264
Bug ID: 2050264
Summary: pyelftools-0.28 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: pyelftools
Keywords: FutureFeature, Triaged
Assignee: dominik(a)greysector.net
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: besser82(a)fedoraproject.org, dcavalca(a)fb.com,
dominik(a)greysector.net,
epel-packagers-sig(a)lists.fedoraproject.org,
mail(a)kushaldas.in, moez.roy(a)gmail.com,
terjeros(a)phys.ntnu.no
Target Milestone: ---
Classification: Fedora
Latest upstream release: 0.28
Current version/release in rawhide: 0.27-6.fc36
URL: https://pypi.python.org/pypi/pyelftools
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/16219/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2050264
https://bugzilla.redhat.com/show_bug.cgi?id=2048817
Bug ID: 2048817
Summary: Branch and build proxychains-ng for EPEL 9
Product: Fedora EPEL
Version: epel9
Status: NEW
Component: proxychains-ng
Assignee: michel(a)michel-slm.name
Reporter: michel(a)michel-slm.name
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name, mtasaka(a)tbz.t-com.ne.jp,
pranav913(a)gmail.com
Target Milestone: ---
Classification: Fedora
Because why not
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2048817
https://bugzilla.redhat.com/show_bug.cgi?id=2044459
Bug ID: 2044459
Summary: proxychains-ng-4.16 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: proxychains-ng
Keywords: FutureFeature, Triaged
Assignee: pranav913(a)gmail.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name, mtasaka(a)tbz.t-com.ne.jp,
pranav913(a)gmail.com
Target Milestone: ---
Classification: Fedora
Latest upstream release: 4.16
Current version/release in rawhide: 4.15-1.fc35
URL: https://github.com/rofl0r/proxychains-ng
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/6499/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2044459
https://bugzilla.redhat.com/show_bug.cgi?id=2051057
Bug ID: 2051057
Summary: python-sphinx-copybutton-0.5.0 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: python-sphinx-copybutton
Keywords: FutureFeature, Triaged
Assignee: loganjerry(a)gmail.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
loganjerry(a)gmail.com, michel(a)michel-slm.name
Target Milestone: ---
Classification: Fedora
Latest upstream release: 0.5.0
Current version/release in rawhide: 0.4.0-3.fc36
URL: https://pypi.org/project/sphinx-copybutton/0.2.6
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/51120/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2051057
https://bugzilla.redhat.com/show_bug.cgi?id=2042530
Bug ID: 2042530
Summary: CVE-2022-22817 python-pillow: PIL.ImageMath.eval
allows evaluation of arbitrary expressions
[fedora-all]
Product: Fedora
Version: 35
Status: NEW
Component: python-pillow
Keywords: Security, SecurityTracking
Severity: high
Priority: high
Assignee: manisandro(a)gmail.com
Reporter: gsuckevi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
infra-sig(a)lists.fedoraproject.org,
manisandro(a)gmail.com, miminar(a)redhat.com,
python-sig(a)lists.fedoraproject.org
Target Milestone: ---
Classification: Fedora
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of fedora-all.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2042530
https://bugzilla.redhat.com/show_bug.cgi?id=2042513
Bug ID: 2042513
Summary: CVE-2022-22815 python-pillow: improperly initializes
ImagePath.Path in path_getbbox() in path.c
[fedora-all]
Product: Fedora
Version: 35
Status: NEW
Component: python-pillow
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: manisandro(a)gmail.com
Reporter: gsuckevi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
infra-sig(a)lists.fedoraproject.org,
manisandro(a)gmail.com, miminar(a)redhat.com,
python-sig(a)lists.fedoraproject.org
Target Milestone: ---
Classification: Fedora
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of fedora-all.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2042513
https://bugzilla.redhat.com/show_bug.cgi?id=2042523
Bug ID: 2042523
Summary: CVE-2022-22816 python-pillow: buffer over-read during
initialization of ImagePath.Path in path_getbbox() in
path.c [fedora-all]
Product: Fedora
Version: 35
Status: NEW
Component: python-pillow
Keywords: Security, SecurityTracking
Severity: high
Priority: high
Assignee: manisandro(a)gmail.com
Reporter: gsuckevi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
infra-sig(a)lists.fedoraproject.org,
manisandro(a)gmail.com, miminar(a)redhat.com,
python-sig(a)lists.fedoraproject.org
Target Milestone: ---
Classification: Fedora
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of fedora-all.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2042523
https://bugzilla.redhat.com/show_bug.cgi?id=2050013
Bug ID: 2050013
Summary: python-pillow-9.0.1 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: python-pillow
Keywords: FutureFeature, Triaged
Assignee: manisandro(a)gmail.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
infra-sig(a)lists.fedoraproject.org,
manisandro(a)gmail.com, miminar(a)redhat.com,
python-sig(a)lists.fedoraproject.org
Target Milestone: ---
Classification: Fedora
Latest upstream release: 9.0.1
Current version/release in rawhide: 9.0.0-2.fc36
URL: http://python-pillow.github.io/
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/7974/
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2050013