https://bugzilla.redhat.com/show_bug.cgi?id=2267831
Bug ID: 2267831
Summary: [abrt] nemo:
nemo_global_preferences_get_mono_font_family_match():
nemo killed by SIGSEGV
Product: Fedora
Version: 38
Hardware: x86_64
Status: NEW
Whiteboard: abrt_hash:0588c901cdc12490c9e61566d51c7c3a3a170659;VAR
IANT_ID=cinnamon;
Component: nemo
Assignee: leigh123linux(a)googlemail.com
Reporter: david.wells5(a)ntlworld.com
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
leigh123linux(a)googlemail.com, riehecky(a)fnal.gov
Target Milestone: ---
Classification: Fedora
Description of problem:
Developed on Sat - no system updates or changes made prior to onset.
Problem is that with Fedora 38 Cinnamon spin the file manager crashes when
trying to start and generates the attached error.
I have rolled back the Nemo version and this does not fix the issue. I also
tried with an earlier kernel instance and that did not
fix things either. Tried reseting Nemo settings to defaults and that didn't
work.
What is strange is that when logged in as a user the issue happens whether I
run Nemo from a terminal window or from menus
or clicking on a folder on the desktop. However, if I run Nemo from a terminal
window using sudo it starts up and works, though there
are some warnings in the terminal window:
$ sudo nemo
Swipe your right index finger across the fingerprint reader
ERROR SET META:15 Setting attribute metadata::nemo-list-view-sort-column not
supported
ERROR SET META:15 Setting attribute metadata::nemo-list-view-sort-reversed not
supported
ERROR SET META:15 Setting attribute metadata::nemo-list-view-zoom-level not
supported
The machine is a Thinkpad T440P with an internal M2 SSD and two 2.5" 1TB
internal SSD drives. Native OS is Fedora 38 with VirtualBox
being used to support W10 and W7 VMs when needed. Fedora/Cinnamon has been
stable on this machine for years so I doubt it's a
hardware issue.
Any suggestions on what to do next would be welcome.
Dave
Version-Release number of selected component:
nemo-6.0.2-1.fc38
Additional info:
reporter: libreport-2.17.11
journald_cursor:
s=56d1aca382704fcbb0916f6eb1e1a23d;i=8c24a;b=85e7a3373a3e4d958bcccc7387fa1800;m=7e594c1c;t=612be591db3e9;x=4a6fea010c345d72
cmdline: /usr/bin/nemo /home/dave
kernel: 6.7.6-100.fc38.x86_64
package: nemo-6.0.2-1.fc38
runlevel: N 5
uid: 1000
executable: /usr/bin/nemo
type: CCpp
backtrace_rating: 4
reason: nemo killed by SIGSEGV
cgroup: 0::/user.slice/user-1000.slice/session-2.scope
rootdir: /
crash_function: nemo_global_preferences_get_mono_font_family_match
Truncated backtrace:
Thread no. 1 (14 frames)
#0 nemo_global_preferences_get_mono_font_family_match at
../libnemo-private/nemo-global-preferences.c:382
#1 update_date_fonts at ../src/nemo-list-view.c:2443
#2 create_and_set_up_tree_view at ../src/nemo-list-view.c:2733
#3 nemo_list_view_init at ../src/nemo-list-view.c:4345
#4 g_type_create_instance at ../gobject/gtype.c:1983
#5 g_object_new_internal at ../gobject/gobject.c:2246
#7 g_object_new_valist at ../gobject/gobject.c:2585
#9 nemo_view_factory_create at ../src/nemo-view-factory.c:70
#10 create_content_view at ../src/nemo-window-manage-views.c:1056
#11 got_file_info_for_view_selection_callback at
../src/nemo-window-manage-views.c:951
#12 call_ready_callbacks_at_idle at
../libnemo-private/nemo-directory-async.c:1851
#16 g_main_context_iterate.isra.0 at ../glib/gmain.c:4276
#17 g_main_context_iteration at ../glib/gmain.c:4343
#18 g_application_run at ../gio/gapplication.c:2573
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2267831
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2267464
Bug ID: 2267464
Summary: DNSCrypt leak ISP DNS on Fedora Linux
Product: Fedora
Version: 38
OS: Linux
Status: NEW
Component: dnscrypt-proxy
Severity: high
Assignee: davide(a)cavalca.name
Reporter: yousifjkadom(a)yahoo.com
QA Contact: extras-qa(a)fedoraproject.org
CC: davide(a)cavalca.name,
epel-packagers-sig(a)lists.fedoraproject.org,
go-sig(a)lists.fedoraproject.org, zebob.m(a)gmail.com
Target Milestone: ---
Classification: Fedora
Hello !
Please look for the discussion in the following link that opened by me on
Fedora community forum, where my user name on this forum is User808:
https://forums.fedoraforum.org/showthread.php?332133-DNSCrypt-leak-ISP-DNS-…!
I'm already notify developer about it, but no any comment from his side till
this moment ! - see the following link:
https://github.com/DNSCrypt/dnscrypt-proxy/discussions/2585
It seem that issue is due to internal error in Fedora 38's dnscrypt-proxy
package.
Please your kind attention toward this serious bug !
Regards !
Reproducible: Always
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2267464
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2254635
Bug ID: 2254635
Summary: TRIAGE CVE-2023-49786 asterisk: race condition in the
hello handshake phase of the DTLS protocol triggers
denial of service [fedora-all]
Product: Fedora
Version: 38
Status: NEW
Component: asterisk
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: jsmith.fedora(a)gmail.com
Reporter: rgatica(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bennie.joubert(a)jsdaav.com,
epel-packagers-sig(a)lists.fedoraproject.org,
jsmith.fedora(a)gmail.com, rbryant(a)redhat.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2254633
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2254635
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2254632
Bug ID: 2254632
Summary: TRIAGE CVE-2023-49294 asterisk: access to arbitrary
files via directory traversal [fedora-all]
Product: Fedora
Version: 38
Status: NEW
Component: asterisk
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: jsmith.fedora(a)gmail.com
Reporter: rgatica(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bennie.joubert(a)jsdaav.com,
epel-packagers-sig(a)lists.fedoraproject.org,
jsmith.fedora(a)gmail.com, rbryant(a)redhat.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2254630
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2254632
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2254627
Bug ID: 2254627
Summary: TRIAGE CVE-2023-37457 asterisk: potential buffer
overflow in PJSIP_HEADER dialplan function
[fedora-all]
Product: Fedora
Version: 38
Status: NEW
Component: asterisk
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: jsmith.fedora(a)gmail.com
Reporter: rgatica(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bennie.joubert(a)jsdaav.com,
epel-packagers-sig(a)lists.fedoraproject.org,
jsmith.fedora(a)gmail.com, rbryant(a)redhat.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2254625
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2254627
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2253951
Bug ID: 2253951
Summary: no workspace switch with keyboard shortcut
Product: Fedora
Version: 38
OS: Linux
Status: NEW
Component: cinnamon
Severity: medium
Assignee: leigh123linux(a)googlemail.com
Reporter: customercare(a)resellerdesktop.de
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
leigh123linux(a)googlemail.com, miketwebster(a)gmail.com,
riehecky(a)fnal.gov
Target Milestone: ---
Classification: Fedora
Created attachment 2003701
--> https://bugzilla.redhat.com/attachment.cgi?id=2003701&action=edit
correct setup
Version-Release number of selected component (if applicable):
cinnamon-5.8.4-5.fc38.x86_64
Description of problem:
the shortcuts:
SUPER+UP/DOWN
CTRL+ALT+LEFT/RIGHT
do not work in cinnamon.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2253951
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…