https://bugzilla.redhat.com/show_bug.cgi?id=2264467
Bug ID: 2264467
Summary: [abrt] blender: module():
gltf2_blender_mesh.py:7:<module>:ModuleNotFoundError:
No module named 'numpy'
Product: Fedora
Version: 39
Hardware: x86_64
Status: NEW
Whiteboard: abrt_hash:91b42a297b2d4684dda5966a94ec0dde31c4285a;VAR
IANT_ID=kde;
Component: blender
Assignee: luya_tfz(a)thefinalzone.net
Reporter: fkwilcz2(a)gmail.com
QA Contact: extras-qa(a)fedoraproject.org
CC: code(a)musicinmybrain.net,
design-devel(a)lists.fedoraproject.org,
epel-packagers-sig(a)lists.fedoraproject.org,
kwizart(a)gmail.com, luya_tfz(a)thefinalzone.net,
negativo17(a)gmail.com
Target Milestone: ---
Classification: Fedora
Description of problem:
I tried to open texture file in blender.
Version-Release number of selected component:
blender-1:4.0.2-1.fc39
Additional info:
reporter: libreport-2.17.11
kernel: 6.6.9-200.fc39.x86_64
cmdline: /usr/bin/blender
cgroup:
0::/user.slice/user-1000.slice/user@1000.service/app.slice/app-blender-fdd367f870fc467785ed9b527d7240e1.scope
uid: 1000
reason: gltf2_blender_mesh.py:7:<module>:ModuleNotFoundError: No module
named 'numpy'
executable: /usr/bin/blender
type: Python3
package: blender-1:4.0.2-1.fc39
runlevel: N 5
exception_type: ModuleNotFoundError
crash_function: module
interpreter: blender-4.0.2-1.fc39.x86_64
comment: I tried to open texture file in blender.
Truncated backtrace:
#1
[/usr/share/blender/4.0/scripts/addons/io_scene_gltf2/blender/imp/gltf2_blender_mesh.py:7]
<module>
#2
[/usr/share/blender/4.0/scripts/addons/io_scene_gltf2/blender/imp/gltf2_blender_node.py:10]
<module>
#3
[/usr/share/blender/4.0/scripts/addons/io_scene_gltf2/blender/imp/gltf2_blender_scene.py:7]
<module>
#4
[/usr/share/blender/4.0/scripts/addons/io_scene_gltf2/blender/imp/gltf2_blender_gltf.py:8]
<module>
#5 [/usr/share/blender/4.0/scripts/addons/io_scene_gltf2/__init__.py:1747]
unit_import
#6 [/usr/share/blender/4.0/scripts/addons/io_scene_gltf2/__init__.py:1737]
import_gltf2
#7 [/usr/share/blender/4.0/scripts/addons/io_scene_gltf2/__init__.py:1709]
execute
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2264467
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2259368
Bug ID: 2259368
Summary: blender package has no content in the blender man page
Product: Fedora
Version: 39
Hardware: x86_64
OS: Linux
Status: NEW
Component: blender
Keywords: Documentation
Severity: medium
Assignee: luya_tfz(a)thefinalzone.net
Reporter: moschleg(a)gmail.com
QA Contact: extras-qa(a)fedoraproject.org
CC: code(a)musicinmybrain.net,
design-devel(a)lists.fedoraproject.org,
epel-packagers-sig(a)lists.fedoraproject.org,
kwizart(a)gmail.com, luya_tfz(a)thefinalzone.net,
negativo17(a)gmail.com
Target Milestone: ---
Classification: Fedora
The 'blender' package blender-4.0.2-1.fc39.x86_64 was installed and the man
page was attempted to be read:
$ man blender
Manual page blender(1) byte 0/0 (END) (press h for help or q to quit)
but the man page was empty. The package was checked and it was apparent the
package man page is empty:
$ rpm -qlv blender | grep /man/
-rw-r--r-- 1 root root 20 Dec 9 19:00
/usr/share/man/man1/blender.1.gz
The -qlv shows the man page is 20 bytes which is the size of an 0 byte file
that's been gzipped. Directly checking by ungzipping to stdout also showed
it's empty:
$ gzip -dc /usr/share/man/man1/blender.1.gz | wc -c
0
Reproducible: Always
Steps to Reproduce:
1. Install blender rpm package for 4.0.2-1.fc39
2. run "man blender"
Actual Results:
Man page for blender has no contents
Expected Results:
Packages should not include empty man pages or 'blender' man page should have
the usual type of content expected in man pages like instructions on usage and
so on.
Either not included the blender.1.gz file at all if there's no such manual file
or included related Blender content in the file.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2259368
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2276143
Bug ID: 2276143
Summary: openssl3 epel-8 SIGILL on ppc64le Power8
Product: Fedora EPEL
Version: epel8
Hardware: ppc64le
Status: NEW
Component: openssl3
Severity: high
Assignee: michel(a)michel-slm.name
Reporter: younes.m(a)gmail.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name
Target Milestone: ---
Classification: Fedora
Description of problem:
openssl3 crashes with a SIGILL on Power8 systems because it executes a code
path intended for P9 and later.
The bug has already been fixed upstream and in Fedora, but not in EPEL. See
links below for context.
Version-Release number of selected component (if applicable):
3.0.7-5.el8.1
How reproducible:
Very reproducible (e.g. ssh)
Steps to Reproduce:
1. Download the src rpm
2. rpmbuild -bc ~/rpmbuild/SPECS/openssl3.spec
3. make -C ~/rpmbuild/BUILD/openssl-3.0.7 test
4. Look for SIGILL crashes in `test/evp_test` for example
Additional info:
https://bugzilla.redhat.com/show_bug.cgi?id=2124845https://github.com/openssl/openssl/issues/19163https://github.com/openssl/openssl/pull/19182
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2276143
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2258505
Bug ID: 2258505
Summary: CVE-2023-6237 openssl3: openssl: Excessive time spent
checking invalid RSA public keys [epel-all]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: openssl3
Keywords: Security, SecurityTracking
Severity: low
Priority: low
Assignee: michel(a)michel-slm.name
Reporter: mcascell(a)redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2258502
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2258505
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2257573
Bug ID: 2257573
Summary: CVE-2023-6129 openssl3: openssl: POLY1305 MAC
implementation corrupts vector registers on PowerPC
[epel-all]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: openssl3
Keywords: Security, SecurityTracking
Severity: low
Priority: low
Assignee: michel(a)michel-slm.name
Reporter: trathi(a)redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2257571
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2257573
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2249063
Bug ID: 2249063
Summary: CVE-2023-5363 openssl3: openssl: Incorrect cipher key
and IV length processing [epel-8]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: openssl3
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: michel(a)michel-slm.name
Reporter: saroy(a)redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2243839
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2249063
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2248621
Bug ID: 2248621
Summary: CVE-2023-5678 openssl3: openssl: Generating
excessively long X9.42 DH keys or checking excessively
long X9.42 DH keys or parameters may be very slow
[epel-8]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: openssl3
Keywords: Security, SecurityTracking
Severity: low
Priority: low
Assignee: michel(a)michel-slm.name
Reporter: askrabec(a)redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2248616
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2248621
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2228050
Bug ID: 2228050
Summary: CVE-2023-3817 openssl3: OpenSSL: Excessive time spent
checking DH q parameter value [epel-all]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: openssl3
Keywords: Security, SecurityTracking
Severity: low
Priority: low
Assignee: michel(a)michel-slm.name
Reporter: saroy(a)redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2227852
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2228050
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2223821
Bug ID: 2223821
Summary: TRIAGE-CVE-2023-2975 openssl3: openSSL: AES-SIV cipher
implementation contains a bug that causes it to ignore
empty associated data entries [epel-8]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: openssl3
Keywords: Security, SecurityTracking
Severity: low
Priority: low
Assignee: michel(a)michel-slm.name
Reporter: saroy(a)redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2223016
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2223821
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…