https://bugzilla.redhat.com/show_bug.cgi?id=2276553
Bug ID: 2276553
Summary: Clicking in Hamburger menu causes calendar to scroll
up
Product: Fedora
Version: 39
Hardware: x86_64
OS: Linux
Status: NEW
Component: gnome-calendar
Severity: medium
Assignee: gnome-sig(a)lists.fedoraproject.org
Reporter: steve8988(a)gmail.com
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
gnome-sig(a)lists.fedoraproject.org,
igor.raits(a)gmail.com, klember(a)redhat.com
Target Milestone: ---
Classification: Fedora
In the GNOME calendar app, when clicking on the hamburger menu on the left or
scrolling through the menu items (using either mouse or keyboard), each click
or scroll causes the calendar to scroll up.
Reproducible: Always
Steps to Reproduce:
1. Open calendar app in GNOME
2. Click on the hamburger menu in left panel and randomly scroll through each
menu item
3. Watch calendar scroll up on its own
Actual Results:
The calendar scrolls up on its own each time a menu item is selected (via mouse
or keyboard)
Expected Results:
Unless this is a feature, it shouldn't scroll the calendar up when selecting
something from the menu.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2276553
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2276141
Bug ID: 2276141
Summary: CVE-2024-31745 libdwarf: use after free in
dw_empty_errlist_item in dwarf_alloc.c [fedora-all]
Product: Fedora
Version: 39
Status: NEW
Component: libdwarf
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: tom(a)compton.nu
Reporter: rgatica(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name, orion(a)nwra.com, tom(a)compton.nu
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2276140
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2276141
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2275236
Bug ID: 2275236
Summary: CVE-2024-22189 dnscrypt-proxy: quic-go: memory
exhaustion attack against QUIC's connection ID
mechanism [fedora-39]
Product: Fedora
Version: 39
Status: NEW
Component: dnscrypt-proxy
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: davide(a)cavalca.name
Reporter: askrabec(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: davide(a)cavalca.name,
epel-packagers-sig(a)lists.fedoraproject.org,
go-sig(a)lists.fedoraproject.org, zebob.m(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2273513
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2275236
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2274129
Bug ID: 2274129
Summary: CVE-2024-2236 mingw-libgcrypt: libgcrypt: vulnerable
to Marvin Attack [fedora-all]
Product: Fedora
Version: 39
Status: NEW
Component: mingw-libgcrypt
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: rjones(a)redhat.com
Reporter: darunesh(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: cfergeau(a)redhat.com, elima(a)redhat.com,
epel-packagers-sig(a)lists.fedoraproject.org,
marcandre.lureau(a)redhat.com, rjones(a)redhat.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2245218
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2274129
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2272893
Bug ID: 2272893
Summary: CVE-2024-3205 python-ruamel-yaml-clib: libyaml:
Heap-Based Buffer Overflow [fedora-all]
Product: Fedora
Version: 39
Status: NEW
Component: python-ruamel-yaml-clib
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: chkumar(a)redhat.com
Reporter: ahanwate(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: chkumar(a)redhat.com,
epel-packagers-sig(a)lists.fedoraproject.org,
jmontleo(a)redhat.com,
openstack-sig(a)lists.fedoraproject.org
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2272889
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2272893
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2272537
Bug ID: 2272537
Summary: [abrt] cinnamon:
g_type_check_instance_is_fundamentally_a(): cinnamon
killed by SIGSEGV
Product: Fedora
Version: 39
Hardware: x86_64
Status: NEW
Whiteboard: abrt_hash:6c263b498a3d4c26e1928969a4e9de9e0329e4e7;VAR
IANT_ID=cinnamon;
Component: cinnamon
Assignee: leigh123linux(a)googlemail.com
Reporter: fabiojlbc1982(a)gmail.com
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
leigh123linux(a)googlemail.com, miketwebster(a)gmail.com,
riehecky(a)fnal.gov
Target Milestone: ---
Classification: Fedora
Version-Release number of selected component:
cinnamon-6.0.4-5.fc39
Additional info:
reporter: libreport-2.17.11
type: CCpp
reason: cinnamon killed by SIGSEGV
journald_cursor:
s=1e245aff504d4b34a4fd82b2ec8a3314;i=3307;b=3dc5f41207ab483dae627f11424b52e5;m=13e249d9;t=6150e2cd51e7b;x=e38b2a60bcdc3ccd
executable: /usr/bin/cinnamon
cmdline: /usr/bin/cinnamon --replace
cgroup: 0::/user.slice/user-1000.slice/session-2.scope
rootdir: /
uid: 1000
kernel: 6.7.10-200.fc39.x86_64
package: cinnamon-6.0.4-5.fc39
runlevel: N 5
backtrace_rating: 4
crash_function: g_type_check_instance_is_fundamentally_a
Truncated backtrace:
Thread no. 1 (19 frames)
#0 g_type_check_instance_is_fundamentally_a at ../gobject/gtype.c:4184
#2 cinnamon_app_state_transition at ../src/cinnamon-app.c:931
#3 _cinnamon_app_remove_window at ../src/cinnamon-app.c:995
#6 signal_emit_unlocked_R.isra.0 at ../gobject/gsignal.c:3980
#7 signal_emit_valist_unlocked at ../gobject/gsignal.c:3612
#10 meta_window_unmanage at ../src/core/window.c:1679
#11 meta_wayland_shell_surface_destroy_window at
../src/wayland/meta-wayland-shell-surface.c:368
#12 xdg_toplevel_destructor.lto_priv at
../src/wayland/meta-wayland-xdg-shell.c:194
#13 destroy_resource at ../src/wayland-server.c:732
#14 wl_resource_destroy at ../src/wayland-server.c:749
#15 ffi_call_unix64 at ../src/x86/unix64.S:104
#16 ffi_call_int at ../src/x86/ffi64.c:673
#17 ffi_call at ../src/x86/ffi64.c:710
#18 wl_closure_invoke at ../src/connection.c:1025
#19 wl_client_connection_data at ../src/wayland-server.c:438
#20 wl_event_loop_dispatch at ../src/event-loop.c:1027
#21 wayland_event_source_dispatch at ../src/wayland/meta-wayland.c:94
#23 g_main_context_dispatch_unlocked at ../glib/gmain.c:4284
#24 g_main_context_iterate_unlocked.isra.0 at ../glib/gmain.c:4349
Potential duplicate: bug 2235025
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2272537
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2272297
Bug ID: 2272297
Summary: [abrt] cinnamon: __call__():
Gio.py:349:__call__:gi.repository.GLib.GError:
g-dbus-error-quark:
GDBus.Error:org.freedesktop.DBus.Error.ServiceUnknown:
The name is not activatable (2)
Product: Fedora
Version: 39
Hardware: x86_64
Status: NEW
Whiteboard: abrt_hash:a9f5931b61281c794f0d34514f8fac599628f275;VAR
IANT_ID=cinnamon;
Component: cinnamon
Assignee: leigh123linux(a)googlemail.com
Reporter: vehre(a)gmx.de
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
leigh123linux(a)googlemail.com, miketwebster(a)gmail.com,
riehecky(a)fnal.gov
Target Milestone: ---
Classification: Fedora
Version-Release number of selected component:
cinnamon-6.0.4-5.fc39
Additional info:
reporter: libreport-2.17.11
kernel: 6.7.10-200.fc39.x86_64
cgroup: 0::/user.slice/user-1000.slice/session-2.scope
open_fds:
uid: 1000
reason: Gio.py:349:__call__:gi.repository.GLib.GError:
g-dbus-error-quark: GDBus.Error:org.freedesktop.DBus.Error.ServiceUnknown: The
name is not activatable (2)
executable: /usr/share/cinnamon/cinnamon-settings/cinnamon-settings.py
type: Python3
package: cinnamon-6.0.4-5.fc39
runlevel: N 5
exception_type: gi.repository.GLib.GError
crash_function: __call__
Truncated backtrace:
Gio.py:349:__call__:gi.repository.GLib.GError: g-dbus-error-quark:
GDBus.Error:org.freedesktop.DBus.Error.ServiceUnknown: The name is not
activatable (2)
Traceback (most recent call last):
File "/usr/share/cinnamon/cinnamon-settings/modules/cs_power.py", line 295,
in build_battery_page
devices = self.csd_power_proxy.GetDevices()
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/lib/python3.12/site-packages/gi/overrides/Gio.py", line 349, in
__call__
result = self.dbus_proxy.call_sync(self.method_name, arg_variant,
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
gi.repository.GLib.GError: g-dbus-error-quark:
GDBus.Error:org.freedesktop.DBus.Error.ServiceUnknown: The name is not
activatable (2)
Local variables in innermost frame:
self: <gi.overrides.Gio._DBusProxyMethodCall object at 0x7f150c65a4e0>
args: ()
kwargs: {}
signature: '()'
arg_variant: GLib.Variant('()', ())
Potential duplicate: bug 2242539
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2272297
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2271050
Bug ID: 2271050
Summary: CVE-2024-28564 freeimage: buffer overflow in
Imf_2_2::CharPtrIO::readChars() function when reading
images in EXR format [fedora-all]
Product: Fedora
Version: 39
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: bruno(a)wolff.to
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2271044
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2271050
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2271047
Bug ID: 2271047
Summary: CVE-2024-28563 freeimage: buffer overflow in
Imf_2_2::DwaCompressor::Classifier::Classifier()
function when reading images in EXR format
[fedora-all]
Product: Fedora
Version: 39
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: bruno(a)wolff.to
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2271043
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2271047
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2271041
Bug ID: 2271041
Summary: CVE-2024-28562 freeimage: buffer overflow in
Imf_2_2::copyIntoFrameBuffer() component when reading
images in EXR format [fedora-all]
Product: Fedora
Version: 39
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: bruno(a)wolff.to
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2271038
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2271041
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…