https://bugzilla.redhat.com/show_bug.cgi?id=2117860
Bug ID: 2117860
Summary: Please branch and build libappindicator-devel in
epel8.
Product: Fedora
Version: 36
Status: NEW
Component: libappindicator
Assignee: echevemaster(a)gmail.com
Reporter: markus.muckhoff(a)softwaretechnik-und-mehr.de
QA Contact: extras-qa(a)fedoraproject.org
CC: dcavalca(a)fb.com, echevemaster(a)gmail.com,
epel-packagers-sig(a)lists.fedoraproject.org,
mailinglists(a)tpokorra.de, michel(a)michel-slm.name,
ngompa13(a)gmail.com, oliver(a)redhat.com,
philip.wyett(a)kathenas.org
Target Milestone: ---
Classification: Fedora
Please branch and build libappindicator-devel in epel8.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2117860
https://bugzilla.redhat.com/show_bug.cgi?id=2137393
Bug ID: 2137393
Summary: [abrt] meld: _flush_std_streams():
util.py:439:_flush_std_streams:OSError: [Errno 5]
Input/output error
Product: Fedora
Version: 36
Hardware: x86_64
Status: NEW
Whiteboard: abrt_hash:923f838279f1054d8f9f0ae9937e7aada5c35488;VAR
IANT_ID=xfce;
Component: meld
Assignee: dmaphy(a)fedoraproject.org
Reporter: dave(a)dave3.xyz
QA Contact: extras-qa(a)fedoraproject.org
CC: cwickert(a)fedoraproject.org, dmaphy(a)fedoraproject.org,
epel-packagers-sig(a)lists.fedoraproject.org,
lkundrak(a)v3.sk, michel(a)michel-slm.name,
oliver(a)linux-kernel.at
Target Milestone: ---
Classification: Fedora
Description of problem:
Launched 2 instances from cmd line in background. Bugged out after starting
program 2nd time. Launched from terminal inside Intellij.
Version-Release number of selected component:
meld-3.22.0-1.fc36
Additional info:
reporter: libreport-2.17.4
cgroup:
0::/user.slice/user-1000.slice/user@1000.service/app.slice/snap.intellij-idea-ultimate.intellij-idea-ultimate.e962ec3f-35e7-488f-8c46-7c6cd9a4da9c.scope
cmdline: /usr/bin/python3 /usr/bin/meld run_autocluster.py
run_autocluster_old.py
crash_function: _flush_std_streams
exception_type: OSError
executable: /usr/bin/meld
interpreter: python3-3.10.7-1.fc36.x86_64
kernel: 5.19.16-200.fc36.x86_64
runlevel: N 5
type: Python3
uid: 1000
Truncated backtrace:
util.py:439:_flush_std_streams:OSError: [Errno 5] Input/output error
Traceback (most recent call last):
File "/usr/lib64/python3.10/multiprocessing/process.py", line 121, in start
self._popen = self._Popen(self)
File "/usr/lib64/python3.10/multiprocessing/context.py", line 224, in _Popen
return _default_context.get_context().Process._Popen(process_obj)
File "/usr/lib64/python3.10/multiprocessing/context.py", line 281, in _Popen
return Popen(process_obj)
File "/usr/lib64/python3.10/multiprocessing/popen_fork.py", line 16, in
__init__
util._flush_std_streams()
File "/usr/lib64/python3.10/multiprocessing/util.py", line 439, in
_flush_std_streams
sys.stderr.flush()
OSError: [Errno 5] Input/output error
Local variables in innermost frame:
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2137393
https://bugzilla.redhat.com/show_bug.cgi?id=2125190
Bug ID: 2125190
Summary: [abrt] meld: help_callback():
meldapp.py:128:help_callback:gi.repository.GLib.GError
: g-io-error-quark: The specified location is not
supported (15)
Product: Fedora
Version: 36
Hardware: x86_64
Status: NEW
Whiteboard: abrt_hash:35a101c398ed0ff4b5936242a2309884d9ef9336;
Component: meld
Assignee: dmaphy(a)fedoraproject.org
Reporter: ilaurie(a)bigpond.net.au
QA Contact: extras-qa(a)fedoraproject.org
CC: cwickert(a)fedoraproject.org, dmaphy(a)fedoraproject.org,
epel-packagers-sig(a)lists.fedoraproject.org,
lkundrak(a)v3.sk, michel(a)michel-slm.name,
oliver(a)linux-kernel.at
Target Milestone: ---
Classification: Fedora
Description of problem:
Selected "Help" from the menu.
Version-Release number of selected component:
meld-3.22.0-1.fc36
Additional info:
reporter: libreport-2.17.2
cgroup: 0::/user.slice/user-1000.slice/session-2.scope
cmdline: /usr/bin/python3 /usr/bin/meld
crash_function: help_callback
exception_type: gi.repository.GLib.GError
executable: /usr/bin/meld
interpreter: python3-3.10.6-1.fc36.x86_64
kernel: 5.19.7-200.fc36.x86_64
runlevel: N 5
type: Python3
uid: 1000
Truncated backtrace:
meldapp.py:128:help_callback:gi.repository.GLib.GError: g-io-error-quark: The
specified location is not supported (15)
Traceback (most recent call last):
File "/usr/lib/python3.10/site-packages/meld/meldapp.py", line 128, in
help_callback
Gtk.show_uri(
gi.repository.GLib.GError: g-io-error-quark: The specified location is not
supported (15)
Local variables in innermost frame:
self: <meldapp.MeldApp object at 0x7f8f2e558740 (meld+meldapp+MeldApp at
0x55e5c654c210)>
action: <Gio.SimpleAction object at 0x7f8f286ef9c0 (GSimpleAction at
0x55e5c6a26c50)>
parameter: None
uri: 'help:meld'
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2125190
https://bugzilla.redhat.com/show_bug.cgi?id=2092724
Bug ID: 2092724
Summary: CVE-2022-21681 thrift: marked: regular expression
inline.reflinkSearch may lead Denial of Service
[fedora-all]
Product: Fedora
Version: 36
Status: NEW
Component: thrift
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: ctubbsii(a)fedoraproject.org
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: ctubbsii(a)fedoraproject.org,
epel-packagers-sig(a)lists.fedoraproject.org,
milleruntime(a)gmail.com, orion(a)nwra.com,
willb(a)redhat.com
Target Milestone: ---
Classification: Fedora
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of fedora-all.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2092724
https://bugzilla.redhat.com/show_bug.cgi?id=2090581
Bug ID: 2090581
Summary: CVE-2022-21680 thrift: marked: regular expression
block.def may lead Denial of Service [fedora-all]
Product: Fedora
Version: 36
Status: NEW
Component: thrift
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: ctubbsii(a)fedoraproject.org
Reporter: saroy(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: ctubbsii(a)fedoraproject.org,
epel-packagers-sig(a)lists.fedoraproject.org,
milleruntime(a)gmail.com, orion(a)nwra.com,
willb(a)redhat.com
Target Milestone: ---
Classification: Fedora
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of fedora-all.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2090581
https://bugzilla.redhat.com/show_bug.cgi?id=2135230
Bug ID: 2135230
Summary: CVE-2021-36369 dropbear: <net-misc/dropbear-2022.82:
forwarded agent abuse [fedora-all]
Product: Fedora
Version: 36
Status: NEW
Component: dropbear
Keywords: Security, SecurityTracking
Severity: high
Priority: high
Assignee: buytenh(a)wantstofly.org
Reporter: mrehak(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: buytenh(a)wantstofly.org, cickumqt(a)gmail.com,
daniellarasouza(a)yahoo.com.br,
epel-packagers-sig(a)lists.fedoraproject.org
Target Milestone: ---
Classification: Fedora
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of fedora-all.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2135230