https://bugzilla.redhat.com/show_bug.cgi?id=2322867
Bug ID: 2322867
Summary: selinux policy violations when asterisk tries to read
/proc/sys/net
Product: Fedora
Version: 41
Hardware: x86_64
OS: Linux
Status: NEW
Component: asterisk
Severity: medium
Assignee: jsmith.fedora(a)gmail.com
Reporter: davek(a)komacke.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bennie.joubert(a)jsdaav.com,
epel-packagers-sig(a)lists.fedoraproject.org,
jsmith.fedora(a)gmail.com
Target Milestone: ---
Classification: Fedora
This seems to have been around for a while. It was reported in Redhat here:
1810727, which was closed for being reported too late in a release cycle.
pjsip wants to read /proc/sys/net to figure out some networking information to
configure itself. This seems to be triggering selinux policy violations. As
covered in the bug above this local policy will resolve it:
module my-asterisk 1.0;
require {
type asterisk_t;
type sysctl_net_t;
class dir search;
class file { getattr open read };
}
#============= asterisk_t ==============
allow asterisk_t sysctl_net_t:dir search;
allow asterisk_t sysctl_net_t:file { getattr open read };
Reproducible: Always
Steps to Reproduce:
1. configure asterisk to use pjsip with a "type = transport" section
2. start asterisk
3. check for selinux policy violations for reading from /proc/sys/net/ipv6 and
ipv4
Actual Results:
I think asterisk is actually running ok. I found these issues by reviewing my
journalctl setroubleshoot output.
Expected Results:
No selinux policy voilations
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2322867
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2338642
Bug ID: 2338642
Summary: python-dask-2025.1.0 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: python-dask
Keywords: FutureFeature, Triaged
Assignee: quantum.analyst(a)gmail.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
gui1ty(a)penguinpee.nl, jonathan(a)almalinux.org,
python-packagers-sig(a)lists.fedoraproject.org,
quantum.analyst(a)gmail.com
Target Milestone: ---
Classification: Fedora
Releases retrieved: 2025.1.0
Upstream release that is considered latest: 2025.1.0
Current version/release in rawhide: 2024.12.1-1.fc42~bootstrap
URL: https://github.com/dask/dask/
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_M…
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/18909/
To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/python-dask
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2338642
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2249131
Bug ID: 2249131
Summary: python-terminado-0.18.0 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: python-terminado
Keywords: FutureFeature, Triaged
Assignee: orion(a)nwra.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
jonathan(a)almalinux.org, mhroncok(a)redhat.com,
orion(a)nwra.com,
python-packagers-sig(a)lists.fedoraproject.org,
TicoTimo(a)gmail.com
Target Milestone: ---
Classification: Fedora
Releases retrieved: 0.18.0
Upstream release that is considered latest: 0.18.0
Current version/release in rawhide: 0.17.1-6.fc39
URL: https://github.com/jupyter/terminado
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_M…
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/13390/
To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/python-terminado
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2249131
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2337166
Bug ID: 2337166
Summary: python-hypothesis-6.123.15 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: python-hypothesis
Keywords: FutureFeature, Triaged
Assignee: mhroncok(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: davide(a)cavalca.name,
epel-packagers-sig(a)lists.fedoraproject.org,
igor.raits(a)gmail.com, kkeithle(a)redhat.com,
mhroncok(a)redhat.com, michel(a)michel-slm.name,
pingou(a)pingoured.fr,
python-packagers-sig(a)lists.fedoraproject.org
Target Milestone: ---
Classification: Fedora
Releases retrieved: 6.123.14, 6.123.15
Upstream release that is considered latest: 6.123.15
Current version/release in rawhide: 6.123.0-1.fc42
URL: https://hypothesis.works/
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_M…
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/7372/
To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/python-hypothesis
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2337166
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2345667
Bug ID: 2345667
Summary: fasterxml-oss-parent-63 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: fasterxml-oss-parent
Keywords: FutureFeature, Triaged
Assignee: edewata(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: ckelley(a)redhat.com, edewata(a)redhat.com,
epel-packagers-sig(a)lists.fedoraproject.org,
java-sig-commits(a)lists.fedoraproject.org,
mfargett(a)redhat.com, michel(a)michel-slm.name,
puntogil(a)libero.it
Target Milestone: ---
Classification: Fedora
Releases retrieved: 63
Upstream release that is considered latest: 63
Current version/release in rawhide: 62-2.fc42
URL: https://github.com/FasterXML/oss-parent
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_M…
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/114915/
To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/fasterxml-oss-parent
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2345667
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2339189
Bug ID: 2339189
Summary: xscreensaver-auth: pam_unix(xscreensaver:account):
setuid failed: Operace není povolena
Product: Fedora
Version: 41
OS: Linux
Status: NEW
Component: xscreensaver
Severity: medium
Assignee: mtasaka(a)fedoraproject.org
Reporter: jskarvad(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: cheese(a)nosuchhost.net,
epel-packagers-sig(a)lists.fedoraproject.org,
jonathan(a)almalinux.org, lkundrak(a)v3.sk,
mtasaka(a)fedoraproject.org
Target Milestone: ---
Classification: Fedora
After some recent update the following error started to periodically show in
the syslog:
Jan 21 19:59:04 localhost xscreensaver-auth[32844]:
pam_unix(xscreensaver:account): setuid failed: Operace není povolena
"Operace neni povolena" is error message in my locale, in english it means
"Operation not permitted".
Reproducible: Always
Steps to Reproduce:
1. Lock screen
2. Unlock screen
3.
Actual Results:
The following error in the syslog:
Jan 21 19:59:04 localhost xscreensaver-auth[32844]:
pam_unix(xscreensaver:account): setuid failed: Operace není povolena
Expected Results:
No error
pam-1.6.1-7.fc41.x86_64
xscreensaver-6.09-3.fc41.x86_64
$ rpm -qV xscreensaver
EMPTY
$ rpm -qV pam
..?...... c /etc/security/opasswd
..?...... /usr/sbin/unix_update
..?...... c /etc/security/opasswd
IMHO this is for password change, so it should be unrelated to the error.
Reproduced in the Xfce desktop.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2339189
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2338442
Bug ID: 2338442
Summary: hugo-0.141.0 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: hugo
Keywords: FutureFeature, Triaged
Assignee: athoscribeiro(a)gmail.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: athoscribeiro(a)gmail.com,
epel-packagers-sig(a)lists.fedoraproject.org,
go-sig(a)lists.fedoraproject.org,
loranallensmith(a)gmail.com, neil(a)shrug.pw,
quantum.analyst(a)gmail.com, redhat(a)flyn.org
Target Milestone: ---
Classification: Fedora
Releases retrieved: 0.141.0
Upstream release that is considered latest: 0.141.0
Current version/release in rawhide: 0.140.2-2.fc42
URL: https://gohugo.io
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_M…
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/12959/
To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/hugo
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2338442
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2328713
Bug ID: 2328713
Summary: python-matplotlib fails to build with Python 3.14:
RecursionError: maximum recursion depth exceeded
Product: Fedora
Version: rawhide
Status: NEW
Component: python-matplotlib
Assignee: quantum.analyst(a)gmail.com
Reporter: ksurma(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
gwync(a)protonmail.com, ksurma(a)redhat.com,
mhroncok(a)redhat.com,
paulo.cesar.pereira.de.andrade(a)gmail.com,
python-packagers-sig(a)lists.fedoraproject.org,
quantum.analyst(a)gmail.com
Blocks: 2322407 (PYTHON3.14)
Target Milestone: ---
Classification: Fedora
python-matplotlib fails to build with Python 3.14.0a2.
_______________________________ test_fancy[png]
________________________________
[gw0] linux -- Python 3.14.0 /usr/bin/python3
@image_comparison(['fancy.png'], remove_text=True, style='mpl20',
tol=0.011 if platform.machine() == 'arm64' else 0)
def test_fancy():
fig, ax = plt.subplots(subplot_kw=dict(projection='3d'))
ax.plot(np.arange(10), np.full(10, 5), np.full(10, 5), 'o--',
label='line')
ax.scatter(np.arange(10), np.arange(10, 0, -1), label='scatter')
ax.errorbar(np.full(10, 5), np.arange(10), np.full(10, 10),
xerr=0.5, zerr=0.5, label='errorbar')
> ax.legend(loc='lower left', ncols=2, title='My legend', numpoints=1)
../BUILDROOT/usr/lib64/python3.14/site-packages/mpl_toolkits/mplot3d/tests/test_legend3d.py:38:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
../BUILDROOT/usr/lib64/python3.14/site-packages/matplotlib/axes/_axes.py:342:
in legend
self.legend_ = mlegend.Legend(self, handles, labels, **kwargs)
../BUILDROOT/usr/lib64/python3.14/site-packages/matplotlib/legend.py:563: in
__init__
self._init_legend_box(handles, labels, markerfirst)
../BUILDROOT/usr/lib64/python3.14/site-packages/matplotlib/legend.py:910: in
_init_legend_box
handle_list.append(handler.legend_artist(self, orig_handle,
../BUILDROOT/usr/lib64/python3.14/site-packages/matplotlib/legend_handler.py:129:
in legend_artist
artists = self.create_artists(legend, orig_handle,
../BUILDROOT/usr/lib64/python3.14/site-packages/matplotlib/legend_handler.py:303:
in create_artists
self.update_prop(legline, orig_handle, legend)
../BUILDROOT/usr/lib64/python3.14/site-packages/matplotlib/legend_handler.py:88:
in update_prop
self._update_prop(legend_handle, orig_handle)
../BUILDROOT/usr/lib64/python3.14/site-packages/matplotlib/legend_handler.py:79:
in _update_prop
self._default_update_prop(legend_handle, orig_handle)
../BUILDROOT/usr/lib64/python3.14/site-packages/matplotlib/legend_handler.py:84:
in _default_update_prop
legend_handle.update_from(orig_handle)
../BUILDROOT/usr/lib64/python3.14/site-packages/matplotlib/lines.py:1357: in
update_from
self._marker = MarkerStyle(marker=other._marker)
../BUILDROOT/usr/lib64/python3.14/site-packages/matplotlib/markers.py:248: in
__init__
self._set_marker(marker)
../BUILDROOT/usr/lib64/python3.14/site-packages/matplotlib/markers.py:323: in
_set_marker
self.__dict__ = copy.deepcopy(marker.__dict__)
/usr/lib64/python3.14/copy.py:140: in deepcopy
y = copier(x, memo)
/usr/lib64/python3.14/copy.py:211: in _deepcopy_dict
y[deepcopy(key, memo)] = deepcopy(value, memo)
/usr/lib64/python3.14/copy.py:147: in deepcopy
y = copier(memo)
../BUILDROOT/usr/lib64/python3.14/site-packages/matplotlib/path.py:285: in
__deepcopy__
p = copy.deepcopy(super(), memo)
/usr/lib64/python3.14/copy.py:166: in deepcopy
y = _reconstruct(x, memo, *rv)
/usr/lib64/python3.14/copy.py:243: in _reconstruct
y = func(*args)
/usr/lib64/python3.14/copy.py:242: in <genexpr>
args = (deepcopy(arg, memo) for arg in args)
/usr/lib64/python3.14/copy.py:147: in deepcopy
y = copier(memo)
E RecursionError: maximum recursion depth exceeded
!!! Recursion detected (same locals & position)
Reported upstream: https://github.com/python/cpython/issues/126817https://docs.python.org/3.14/whatsnew/3.14.html
For the build logs, see:
https://copr-be.cloud.fedoraproject.org/results/@python/python3.14/fedora-r…
For all our attempts to build python-matplotlib with Python 3.14, see:
https://copr.fedorainfracloud.org/coprs/g/python/python3.14/package/python-…
Testing and mass rebuild of packages is happening in copr.
You can follow these instructions to test locally in mock if your package
builds with Python 3.14:
https://copr.fedorainfracloud.org/coprs/g/python/python3.14/
Let us know here if you have any questions.
Python 3.14 is planned to be included in Fedora 43.
To make that update smoother, we're building Fedora packages with all
pre-releases of Python 3.14.
A build failure prevents us from testing all dependent packages (transitive
[Build]Requires),
so if this package is required a lot, it's important for us to get it fixed
soon.
We'd appreciate help from the people who know this package best,
but if you don't want to work on this now, let us know so we can try to work
around it on our side.
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=2322407
[Bug 2322407] Python 3.14
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2328713
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…