https://bugzilla.redhat.com/show_bug.cgi?id=2354999
Bug ID: 2354999
Summary: Finishing touch: default background image not shown
Product: Fedora
Version: 42
OS: Linux
Status: NEW
Component: slick-greeter
Keywords: Desktop, Upgrades
Severity: low
Assignee: leigh123linux(a)googlemail.com
Reporter: hmmsjan(a)kpnplanet.nl
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
leigh123linux(a)googlemail.com
Target Milestone: ---
Classification: Fedora
The compiled in default background and /etc/lightdm/slick-greeter.conf point to
a no long existing background image.
default.png ---> default.jxl
Reproducible: Always
Steps to Reproduce:
1.Upgrade or install, using lightdm
2.
3.
Actual Results:
Black screen with login prompt
Expected Results:
Background image with login prompt
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2354999
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2370918
Bug ID: 2370918
Summary: Please branch and build <package> in epel10
Product: Fedora EPEL
Version: epel10
Status: NEW
Component: lbzip2
Assignee: dominik(a)greysector.net
Reporter: ledestin(a)gmail.com
QA Contact: extras-qa(a)fedoraproject.org
CC: dominik(a)greysector.net,
epel-packagers-sig(a)lists.fedoraproject.org,
lzap(a)redhat.com, michel(a)michel-slm.name,
mizdebsk(a)redhat.com
Target Milestone: ---
Classification: Fedora
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2370918
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2303150
Bug ID: 2303150
Summary: asio-1.31.0 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: asio
Keywords: FutureFeature, Triaged
Assignee: belegdol(a)gmail.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: belegdol(a)gmail.com, davide(a)cavalca.name,
epel-packagers-sig(a)lists.fedoraproject.org,
me(a)fale.io, uwog(a)uwog.net
Target Milestone: ---
Classification: Fedora
Releases retrieved: 1.31.0
Upstream release that is considered latest: 1.31.0
Current version/release in rawhide: 1.30.2-3.fc41
URL: https://think-async.com/Asio/
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_M…
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/117/
To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/asio
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2303150
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2342110
Bug ID: 2342110
Summary: scribus-1.7.0 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: scribus
Keywords: FutureFeature, Triaged
Assignee: walter.pete(a)yandex.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: dan(a)danny.cz,
epel-packagers-sig(a)lists.fedoraproject.org,
luya_tfz(a)thefinalzone.net, walter.pete(a)yandex.com
Target Milestone: ---
Classification: Fedora
Releases retrieved: 1.7.0
Upstream release that is considered latest: 1.7.0
Current version/release in rawhide: 1.6.3-2.fc42
URL: https://www.scribus.net
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_M…
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/4773/
To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/scribus
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2342110
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2310294
Bug ID: 2310294
Summary: CVE-2024-42491 asterisk: A malformed Contact or
Record-Route URI in an incoming SIP request can cause
crash [fedora-40]
Product: Fedora
Version: 40
Status: NEW
Whiteboard: {"flaws": ["b43ba178-910d-4466-8ab5-39e9c901317b"]}
Component: asterisk
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: jsmith.fedora(a)gmail.com
Reporter: rgatica(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bennie.joubert(a)jsdaav.com,
epel-packagers-sig(a)lists.fedoraproject.org,
jsmith.fedora(a)gmail.com
Blocks: 2310279 (CVE-2024-42491)
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
https://bugzilla.redhat.com/show_bug.cgi?id=2310279
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=2310279
[Bug 2310279] CVE-2024-42491 asterisk: A malformed Contact or Record-Route URI
in an incoming SIP request can cause crash
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2310294
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2310293
Bug ID: 2310293
Summary: CVE-2024-42491 asterisk: A malformed Contact or
Record-Route URI in an incoming SIP request can cause
crash [fedora-39]
Product: Fedora
Version: 39
Status: NEW
Whiteboard: {"flaws": ["b43ba178-910d-4466-8ab5-39e9c901317b"]}
Component: asterisk
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: jsmith.fedora(a)gmail.com
Reporter: rgatica(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bennie.joubert(a)jsdaav.com,
epel-packagers-sig(a)lists.fedoraproject.org,
jsmith.fedora(a)gmail.com
Blocks: 2310279 (CVE-2024-42491)
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
https://bugzilla.redhat.com/show_bug.cgi?id=2310279
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=2310279
[Bug 2310279] CVE-2024-42491 asterisk: A malformed Contact or Record-Route URI
in an incoming SIP request can cause crash
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2310293
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2303919
Bug ID: 2303919
Summary: CVE-2024-42365 asterisk: Write=originate, is
sufficient permissions for code execution / System()
dialplan [fedora-all]
Product: Fedora
Version: 40
Status: NEW
Whiteboard: {"flaws": ["2962b812-edb6-4ab1-b6f2-23cedc7f313d"]}
Component: asterisk
Keywords: Security, SecurityTracking
Severity: high
Priority: high
Assignee: jsmith.fedora(a)gmail.com
Reporter: pdelbell(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bennie.joubert(a)jsdaav.com,
epel-packagers-sig(a)lists.fedoraproject.org,
jsmith.fedora(a)gmail.com
Blocks: 2303740
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
https://bugzilla.redhat.com/show_bug.cgi?id=2303740
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2303919
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2281497
Bug ID: 2281497
Summary: CVE-2024-35190 asterisk: wrongly matches ALL
unauthorized SIP requests [fedora-all]
Product: Fedora
Version: 40
Status: NEW
Component: asterisk
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: jsmith.fedora(a)gmail.com
Reporter: ybuenos(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bennie.joubert(a)jsdaav.com,
epel-packagers-sig(a)lists.fedoraproject.org,
jsmith.fedora(a)gmail.com, rbryant(a)redhat.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2281495
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2281497
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…