https://bugzilla.redhat.com/show_bug.cgi?id=2272297
Bug ID: 2272297
Summary: [abrt] cinnamon: __call__():
Gio.py:349:__call__:gi.repository.GLib.GError:
g-dbus-error-quark:
GDBus.Error:org.freedesktop.DBus.Error.ServiceUnknown:
The name is not activatable (2)
Product: Fedora
Version: 39
Hardware: x86_64
Status: NEW
Whiteboard: abrt_hash:a9f5931b61281c794f0d34514f8fac599628f275;VAR
IANT_ID=cinnamon;
Component: cinnamon
Assignee: leigh123linux(a)googlemail.com
Reporter: vehre(a)gmx.de
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
leigh123linux(a)googlemail.com, miketwebster(a)gmail.com,
riehecky(a)fnal.gov
Target Milestone: ---
Classification: Fedora
Version-Release number of selected component:
cinnamon-6.0.4-5.fc39
Additional info:
reporter: libreport-2.17.11
kernel: 6.7.10-200.fc39.x86_64
cgroup: 0::/user.slice/user-1000.slice/session-2.scope
open_fds:
uid: 1000
reason: Gio.py:349:__call__:gi.repository.GLib.GError:
g-dbus-error-quark: GDBus.Error:org.freedesktop.DBus.Error.ServiceUnknown: The
name is not activatable (2)
executable: /usr/share/cinnamon/cinnamon-settings/cinnamon-settings.py
type: Python3
package: cinnamon-6.0.4-5.fc39
runlevel: N 5
exception_type: gi.repository.GLib.GError
crash_function: __call__
Truncated backtrace:
Gio.py:349:__call__:gi.repository.GLib.GError: g-dbus-error-quark:
GDBus.Error:org.freedesktop.DBus.Error.ServiceUnknown: The name is not
activatable (2)
Traceback (most recent call last):
File "/usr/share/cinnamon/cinnamon-settings/modules/cs_power.py", line 295,
in build_battery_page
devices = self.csd_power_proxy.GetDevices()
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/lib/python3.12/site-packages/gi/overrides/Gio.py", line 349, in
__call__
result = self.dbus_proxy.call_sync(self.method_name, arg_variant,
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
gi.repository.GLib.GError: g-dbus-error-quark:
GDBus.Error:org.freedesktop.DBus.Error.ServiceUnknown: The name is not
activatable (2)
Local variables in innermost frame:
self: <gi.overrides.Gio._DBusProxyMethodCall object at 0x7f150c65a4e0>
args: ()
kwargs: {}
signature: '()'
arg_variant: GLib.Variant('()', ())
Potential duplicate: bug 2242539
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2272297
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2271050
Bug ID: 2271050
Summary: CVE-2024-28564 freeimage: buffer overflow in
Imf_2_2::CharPtrIO::readChars() function when reading
images in EXR format [fedora-all]
Product: Fedora
Version: 39
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: bruno(a)wolff.to
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2271044
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2271050
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2271047
Bug ID: 2271047
Summary: CVE-2024-28563 freeimage: buffer overflow in
Imf_2_2::DwaCompressor::Classifier::Classifier()
function when reading images in EXR format
[fedora-all]
Product: Fedora
Version: 39
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: bruno(a)wolff.to
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2271043
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2271047
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2271041
Bug ID: 2271041
Summary: CVE-2024-28562 freeimage: buffer overflow in
Imf_2_2::copyIntoFrameBuffer() component when reading
images in EXR format [fedora-all]
Product: Fedora
Version: 39
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: bruno(a)wolff.to
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2271038
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2271041
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2271037
Bug ID: 2271037
Summary: CVE-2024-28584 freeimage: null pointer dereference in
J2KImageToFIBITMAP() function when reading images in
J2K format [fedora-all]
Product: Fedora
Version: 39
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: bruno(a)wolff.to
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2271035
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2271037
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2271031
Bug ID: 2271031
Summary: CVE-2024-28583 freeimage: buffer overflow in
readLine() function when reading images in XPM format
[fedora-all]
Product: Fedora
Version: 39
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: bruno(a)wolff.to
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2271029
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2271031
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2271030
Bug ID: 2271030
Summary: CVE-2024-28582 freeimage: buffer overflow in
rgbe_RGBEToFloat() function when reading images in HDR
format [fedora-all]
Product: Fedora
Version: 39
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: bruno(a)wolff.to
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2271027
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2271030
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2271024
Bug ID: 2271024
Summary: CVE-2024-28581 freeimage: buffer overflow in
_assignPixel<>() function when reading images in TARGA
format [fedora-all]
Product: Fedora
Version: 39
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: bruno(a)wolff.to
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2271020
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2271024
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2271023
Bug ID: 2271023
Summary: CVE-2024-28580 freeimage: buffer overflow in
ReadData() function when reading images in RAS format
[fedora-all]
Product: Fedora
Version: 39
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: bruno(a)wolff.to
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2271019
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2271023
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2271018
Bug ID: 2271018
Summary: CVE-2024-28579 freeimage: buffer overflow in
FreeImage_Unload() function when reading images in HDR
format [fedora-all]
Product: Fedora
Version: 39
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: bruno(a)wolff.to
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2271014
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2271018
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…