[EPEL-devel] Fedora EPEL 9 updates-testing report

2023-12-25 Thread updates
The following Fedora EPEL 9 Security updates need testing:
 Age  URL
   5  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-7ff32fc746   
podman-tui-0.15.0-2.el9
   4  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-b698d8c031   
proftpd-1.3.8b-1.el9
   4  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-b300e89045   
chromium-120.0.6099.129-1.el9
   3  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-75bf3d635e   
xerces-c-3.2.5-1.el9


The following builds have been pushed to Fedora EPEL 9 updates-testing

boxed-cpp-1.1.0-3.el9
ftxui-5.0.0-3.el9
mate-media-1.26.2-1.el9
partclone-0.3.27-2.el9
stduuid-1.2.3-2.el9

Details about builds:



 boxed-cpp-1.1.0-3.el9 (FEDORA-EPEL-2023-4712cedde4)
 Boxing primitive types in C++

Update Information:

update

ChangeLog:

* Mon Dec 25 2023 topazus  - 1.1.0-3
- fix packit and tests
* Sun Dec 17 2023 topazus  - 1.1.0-2
- disable tests for f38
* Sun Dec 17 2023 topazus  - 1.1.0-1
- initial import




 ftxui-5.0.0-3.el9 (FEDORA-EPEL-2023-f196be5006)
 A simple cross-platform C++ library for terminal based user interfaces

Update Information:

update

ChangeLog:

* Mon Dec 25 2023 topazus  - 5.0.0-3
- disable tests on epel
* Mon Dec 25 2023 topazus  - 5.0.0-2
- fix
* Sun Dec 24 2023 topazus  - 5.0.0-1
- initial import; rhbz#2255228




 mate-media-1.26.2-1.el9 (FEDORA-EPEL-2023-47fa883e14)
 MATE media programs

Update Information:

- update to 1.26.2 - fix German translation

ChangeLog:

* Mon Dec 25 2023 Wolfgang Ulbrich  - 1.26.2-1
- update to 1.26.2
- fix german translation




 partclone-0.3.27-2.el9 (FEDORA-EPEL-2023-667ea7001a)
 Utility to clone and restore a partition

Update Information:

- Build `fail-mbr.bin` on all architectures (using cross-compile)

ChangeLog:

* Mon Dec 25 2023 Robert Scheck  0.3.27-2
- Build fail-mbr.bin on all architectures (using cross-compile)




 stduuid-1.2.3-2.el9 (FEDORA-EPEL-2023-c3e38a8dec)
 A C++17 cross-platform implementation for UUIDs

Update Information:

update    update

ChangeLog:

* Mon Dec 25 2023 topazus  - 1.2.3-2
- fix
* Sun Dec 24 2023 topazus  - 1.2.3-1
- initial import; rhbz#2255198


--
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[EPEL-devel] Fedora EPEL 7 updates-testing report

2023-12-25 Thread updates
The following Fedora EPEL 7 Security updates need testing:
 Age  URL
   6  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-2ff4055b33   
php-Smarty-3.1.48-2.el7
   2  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-46203ab7be   
chromium-120.0.6099.129-1.el7


The following builds have been pushed to Fedora EPEL 7 updates-testing

partclone-0.3.27-2.el7

Details about builds:



 partclone-0.3.27-2.el7 (FEDORA-EPEL-2023-82cc70300e)
 Utility to clone and restore a partition

Update Information:

- Build `fail-mbr.bin` on all architectures (using cross-compile)

ChangeLog:

* Mon Dec 25 2023 Robert Scheck  0.3.27-2
- Build fail-mbr.bin on all architectures (using cross-compile)


--
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[EPEL-devel] Fedora EPEL 8 updates-testing report

2023-12-25 Thread updates
The following Fedora EPEL 8 Security updates need testing:
 Age  URL
   6  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-1bdb2efa01   
tor-0.4.8.10-1.el8
   6  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-4138b387a7   
php-adodb-5.22.7-1.el8
   2  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-f6a8bbe365   
xerces-c-3.2.5-1.el8
   2  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-f6ff23a804   
chromium-120.0.6099.129-1.el8


The following builds have been pushed to Fedora EPEL 8 updates-testing

boxed-cpp-1.1.0-3.el8
ftxui-5.0.0-3.el8
mate-media-1.26.2-1.el8
partclone-0.3.27-2.el8

Details about builds:



 boxed-cpp-1.1.0-3.el8 (FEDORA-EPEL-2023-f169d86f45)
 Boxing primitive types in C++

Update Information:

update

ChangeLog:

* Mon Dec 25 2023 topazus  - 1.1.0-3
- fix packit and tests
* Sun Dec 17 2023 topazus  - 1.1.0-2
- disable tests for f38
* Sun Dec 17 2023 topazus  - 1.1.0-1
- initial import




 ftxui-5.0.0-3.el8 (FEDORA-EPEL-2023-c6457c83bb)
 A simple cross-platform C++ library for terminal based user interfaces

Update Information:

update

ChangeLog:

* Mon Dec 25 2023 topazus  - 5.0.0-3
- disable tests on epel
* Mon Dec 25 2023 topazus  - 5.0.0-2
- fix
* Sun Dec 24 2023 topazus  - 5.0.0-1
- initial import; rhbz#2255228




 mate-media-1.26.2-1.el8 (FEDORA-EPEL-2023-457b9b934d)
 MATE media programs

Update Information:

- update to 1.26.2 - fix German translation

ChangeLog:

* Mon Dec 25 2023 Wolfgang Ulbrich  - 1.26.2-1
- update to 1.26.2
- fix german translation




 partclone-0.3.27-2.el8 (FEDORA-EPEL-2023-7e8e6125bc)
 Utility to clone and restore a partition

Update Information:

- Build `fail-mbr.bin` on all architectures (using cross-compile)

ChangeLog:

* Mon Dec 25 2023 Robert Scheck  0.3.27-2
- Build fail-mbr.bin on all architectures (using cross-compile)


--
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2255872] TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [epel-all]

2023-12-25 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2255872



--- Comment #1 from Robb Gatica  ---
Use the following template to for the 'fedpkg update' request to submit an
update for this issue as it contains the top-level parent bug(s) as well as
this tracking bug.  This will ensure that all associated bugs get updated
when new packages are pushed to stable.

=

# bugfix, security, enhancement, newpackage (required)
type=security

# low, medium, high, urgent (required)
severity=medium

# testing, stable
request=testing

# Bug numbers: 1234,9876
bugs=2255871,2255872

# Description of your update
notes=Security fix for [PUT CVEs HERE]

# Enable request automation based on the stable/unstable karma thresholds
autokarma=True
stable_karma=3
unstable_karma=-3

# Automatically close bugs when this marked as stable
close_bugs=True

# Suggest that users restart after update
suggest_reboot=False

==

Additionally, you may opt to use the bodhi web interface to submit updates:

https://bodhi.fedoraproject.org/updates/new


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2255872

Report this comment as SPAM: 
https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202255872%23c1
--
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2255873] New: TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [fedora-all]

2023-12-25 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2255873

Bug ID: 2255873
   Summary: TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel:
unvalidated input can lead to arbitrary code execution
vulnerability [fedora-all]
   Product: Fedora
   Version: 39
Status: NEW
 Component: perl-Spreadsheet-ParseExcel
  Keywords: Security, SecurityTracking
  Severity: medium
  Priority: medium
  Assignee: jpazdzi...@redhat.com
  Reporter: rgat...@redhat.com
QA Contact: extras...@fedoraproject.org
CC: jpazdzi...@redhat.com, m...@fale.io, p...@city-fan.org,
perl-devel@lists.fedoraproject.org,
redhat-bugzi...@linuxnetz.de, st...@silug.org
  Target Milestone: ---
Classification: Fedora




More information about this security flaw is available in the following bug:

http://bugzilla.redhat.com/show_bug.cgi?id=2255871

Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2255873

Report this comment as SPAM: 
https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202255873%23c0
--
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2255873] TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [fedora-all]

2023-12-25 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2255873



--- Comment #1 from Robb Gatica  ---
Use the following template to for the 'fedpkg update' request to submit an
update for this issue as it contains the top-level parent bug(s) as well as
this tracking bug.  This will ensure that all associated bugs get updated
when new packages are pushed to stable.

=

# bugfix, security, enhancement, newpackage (required)
type=security

# low, medium, high, urgent (required)
severity=medium

# testing, stable
request=testing

# Bug numbers: 1234,9876
bugs=2255871,2255873

# Description of your update
notes=Security fix for [PUT CVEs HERE]

# Enable request automation based on the stable/unstable karma thresholds
autokarma=True
stable_karma=3
unstable_karma=-3

# Automatically close bugs when this marked as stable
close_bugs=True

# Suggest that users restart after update
suggest_reboot=False

==

Additionally, you may opt to use the bodhi web interface to submit updates:

https://bodhi.fedoraproject.org/updates/new


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2255873

Report this comment as SPAM: 
https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202255873%23c1
--
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2255872] TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [epel-all]

2023-12-25 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2255872

Robb Gatica  changed:

   What|Removed |Added

 Blocks||2255871 (CVE-2023-7101)





Referenced Bugs:

https://bugzilla.redhat.com/show_bug.cgi?id=2255871
[Bug 2255871] CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can
lead to arbitrary code execution vulnerability
-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2255872
--
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2255872] New: TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [epel-all]

2023-12-25 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2255872

Bug ID: 2255872
   Summary: TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel:
unvalidated input can lead to arbitrary code execution
vulnerability [epel-all]
   Product: Fedora EPEL
   Version: epel8
Status: NEW
 Component: perl-Spreadsheet-ParseExcel
  Keywords: Security, SecurityTracking
  Severity: medium
  Priority: medium
  Assignee: m...@fale.io
  Reporter: rgat...@redhat.com
QA Contact: extras...@fedoraproject.org
CC: jpazdzi...@redhat.com, m...@fale.io, p...@city-fan.org,
perl-devel@lists.fedoraproject.org,
redhat-bugzi...@linuxnetz.de, st...@silug.org
  Target Milestone: ---
Classification: Fedora




More information about this security flaw is available in the following bug:

http://bugzilla.redhat.com/show_bug.cgi?id=2255871

Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2255872

Report this comment as SPAM: 
https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202255872%23c0
--
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2255873] TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [fedora-all]

2023-12-25 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2255873

Robb Gatica  changed:

   What|Removed |Added

 Blocks||2255871 (CVE-2023-7101)





Referenced Bugs:

https://bugzilla.redhat.com/show_bug.cgi?id=2255871
[Bug 2255871] CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can
lead to arbitrary code execution vulnerability
-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2255873
--
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


OpenImageIO 2.5.x w/ soname bump

2023-12-25 Thread Richard Shaw
I plan to build OpenImageIO 2.5.x in rawhide in the near future.

Affected packages to be built in a side tag:
$ fedrq wr -F "name" -s OpenImageIO-devel
OpenColorIO
blender
embree
luxcorerender
oidn
openshadinglanguage
usd

Thanks,
Richard
FAS: hobbes1069
--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: rpmbuild core dumps

2023-12-25 Thread Sam Varshavchik

Sam Varshavchik writes:



Looking at a diff between the 4.19.0 an 4.19.1 tags, a call to rpmfiStat()  
was added to fill_archive_entry(). The backtrace above shows the execution  
finding its way from rpmfiStat() into very-much-thread-unsafe code in rpmug.c


That code is used only by rpm2archive, though.

But the backtrace does show an execution path from packageBinaries into  
rpmug.c.


I wonder what happens if someone were to try to rebuild texlive, and all of  
its umpteen packages. That should thoroughly excersize the problematic code…




pgpSGpzBw4aNy.pgp
Description: PGP signature
--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: rpmbuild core dumps

2023-12-25 Thread Sam Varshavchik

Stephen Smoogen writes:


                   #1  0x7f05dd8588ee raise (libc.so.6 + 0x3e8ee)
                   #2  0x7f05dd8408ff abort (libc.so.6 + 0x268ff)
                   #3  0x7f05dd8417d0 __libc_message.cold (libc.so.6 +
   0x277d0)
                   #4  0x7f05dd8b47a5 malloc_printerr (libc.so.6 +
   0x9a7a5)
                   #5  0x7f05dd8b6a3a _int_free (libc.so.6 + 0x9ca3a)
                   #6  0x7f05dd8b93de free (libc.so.6 + 0x9f3de)
                   #7  0x7f05dda984ec rpmugUid (librpm.so.10 + 0x584ec)
                   #8  0x7f05dda84255 rpmfilesStat (librpm.so.10 +
   0x44255)
                   #9  0x7f05dda8438f rpmfiStat (librpm.so.10 + 0x4438f)
                   #10 0x7f05dda8 rpmfiArchiveWriteHeader (librpm.so.
   10 + 0x4)
                   #11 0x7f05dda871c9 iterWriteArchiveNext (librpm.so.10
   + 0x471c9)


Thanks. I was wondering if it was dnf/rpm on the system or dnf/rpm in the  
chroot but it sounds like something changed between 4.19.0.1 (what I had on  
my system since September?)  and 4.19.1 ( December)




Looking at a diff between the 4.19.0 an 4.19.1 tags, a call to rpmfiStat()  
was added to fill_archive_entry(). The backtrace above shows the execution  
finding its way from rpmfiStat() into very-much-thread-unsafe code in rpmug.c


Further up the backtrace is packageBinaries() which, according to the  
backtrace, is being multithreaded via OMP. Looking at the core dump, I see a  
bunch of execution threads running packageBinaries().


I'm confident that this is the breakage. 4.19.1 needs to be fixed ASAP.

My humble suggestion for the simplest fix is to slap a __thread on all those  
static variables in rpmug.c. Or, perhaps, throw a mutex around them so that  
all execution thread share that micro-optimization those static variables  
are used for…


Hopefully that's the only thing that's thread unsafe in there…



pgpUdgoKdRnr2.pgp
Description: PGP signature
--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: rpmbuild core dumps

2023-12-25 Thread Stephen Smoogen
On Sun, 24 Dec 2023 at 15:51, Sam Varshavchik  wrote:

> Stephen Smoogen writes:
>
> > »My apologies for bad quoting.. email from phone. What version of rpm
> build
> > is used and what are some packages which are rebuilt that show this
> issue.
> > This may be needed if the core dump is due to something else in the
> > environment like memory limits etc
>
> It's 4.19.1 on FC39, and it's packages that I'm working on. It's glibc
> complaining about a double-free, and not any resource limits. I can get a
> backtrace out of it:
>
> #1  0x7f05dd8588ee raise (libc.so.6 + 0x3e8ee)
> #2  0x7f05dd8408ff abort (libc.so.6 + 0x268ff)
> #3  0x7f05dd8417d0 __libc_message.cold (libc.so.6 +
> 0x277d0)
> #4  0x7f05dd8b47a5 malloc_printerr (libc.so.6 +
> 0x9a7a5)
> #5  0x7f05dd8b6a3a _int_free (libc.so.6 + 0x9ca3a)
> #6  0x7f05dd8b93de free (libc.so.6 + 0x9f3de)
> #7  0x7f05dda984ec rpmugUid (librpm.so.10 + 0x584ec)
> #8  0x7f05dda84255 rpmfilesStat (librpm.so.10 +
> 0x44255)
> #9  0x7f05dda8438f rpmfiStat (librpm.so.10 + 0x4438f)
> #10 0x7f05dda8 rpmfiArchiveWriteHeader
> (librpm.so.10 + 0x4)
> #11 0x7f05dda871c9 iterWriteArchiveNext (librpm.so.10
> + 0x471c9)
>
> I am looking at this core dump. I see 32 active execution threads at the
> time this whole thing went kaput, and all the code in rpmug.c is
> definitely
> not thread safe. I did not look very hard, I don't know if there are
> mutexes
> higher up the call chain, but the overall behavior – occasional core
> dumps
> -- is indicative of thread races.
>
>
Thanks. I was wondering if it was dnf/rpm on the system or dnf/rpm in the
chroot but it sounds like something changed between 4.19.0.1 (what I had on
my system since September?)  and 4.19.1 ( December)

The changelog doesn't say much beyond
* Tue Dec 12 2023 Michal Domonkos  - 4.19.1-1
- Update to 4.19.1 (https://rpm.org/wiki/Releases/4.19.1)

I forget if there is a way to pin an rpm in a mock environment so that you
don't update over 4.19.0 to see if you can see if
a) the problem still happens with that (possibly indicating that whatever
is calling into rpm is broken) or b) the problem doesn't occur and it is a
change between .0.1 and .19.1


>
> --
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue
>


-- 
Stephen Smoogen, Red Hat Automotive
Let us be kind to one another, for most of us are fighting a hard battle.
-- Ian MacClaren
--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Fedora 40 System-Wide Change: java-21-openjdk as system JDK in F40 pre-announcement

2023-12-25 Thread Petra Mikova
Hi,

Before the final announcement arrives, I would like to inform the
community about the upcoming change proposal:
https://fedoraproject.org/wiki/Changes/Java21

I am grateful for any feedback regarding the proposed changes.

Thank you!

-- 
Petra Alice Mikova
OpenJDK QE,  Senior Quality Engineer
Red Hat
--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Orphaned packages looking for new maintainers

2023-12-25 Thread Neal Gompa
On Mon, Dec 25, 2023 at 6:34 AM Ondrej Mosnáček  wrote:
>
> On Mon, 18 Dec 2023 at 19:39, Priscila Gutierres  wrote:
> >
> > virtme-ng makes testing a new kernel and developing new modules A LOT 
> > easier.
> >
> > On Mon, Dec 18, 2023 at 10:27 AM Richard W.M. Jones  
> > wrote:
> >>
> >> On Mon, Dec 18, 2023 at 11:20:22AM +0100, Miro Hrončok wrote:
> >> > virtmeorphan   4 
> >> > weeks ago
> >>
> >> I have no special knowledge of this package, but I did read the
> >> article below a few weeks ago about virtme-ng.  In particular
> >> virtme-ng uses virtiofs (instead of 9p) which is a more modern way to
> >> export filesystems into VMs.  We (the virt team) have for a very very
> >> long time recommended people steer clear of 9p, for security,
> >> performance and maintainability reasons.
> >>
> >> https://lwn.net/Articles/951313/
>
> FWIW, I wanted to try out virtme-ng, so I packaged it and submitted for 
> review:
> https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2255805
>
> If anyone is interested in having it in Fedora, please consider taking
> the review. Co-maintainer offers are also welcome :)

I grabbed the review. :)




--
真実はいつも一つ!/ Always, there's only one truth!
--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Orphaned packages looking for new maintainers

2023-12-25 Thread Ondrej Mosnáček
On Mon, 18 Dec 2023 at 19:39, Priscila Gutierres  wrote:
>
> virtme-ng makes testing a new kernel and developing new modules A LOT easier.
>
> On Mon, Dec 18, 2023 at 10:27 AM Richard W.M. Jones  wrote:
>>
>> On Mon, Dec 18, 2023 at 11:20:22AM +0100, Miro Hrončok wrote:
>> > virtmeorphan   4 weeks 
>> > ago
>>
>> I have no special knowledge of this package, but I did read the
>> article below a few weeks ago about virtme-ng.  In particular
>> virtme-ng uses virtiofs (instead of 9p) which is a more modern way to
>> export filesystems into VMs.  We (the virt team) have for a very very
>> long time recommended people steer clear of 9p, for security,
>> performance and maintainability reasons.
>>
>> https://lwn.net/Articles/951313/

FWIW, I wanted to try out virtme-ng, so I packaged it and submitted for review:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2255805

If anyone is interested in having it in Fedora, please consider taking
the review. Co-maintainer offers are also welcome :)
--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Fedora rawhide compose report: 20231225.n.0 changes

2023-12-25 Thread Fedora Rawhide Report
OLD: Fedora-Rawhide-20231224.n.0
NEW: Fedora-Rawhide-20231225.n.0

= SUMMARY =
Added images:2
Dropped images:  3
Added packages:  4
Dropped packages:0
Upgraded packages:   37
Downgraded packages: 0

Size of added packages:  2.37 MiB
Size of dropped packages:0 B
Size of upgraded packages:   2.00 GiB
Size of downgraded packages: 0 B

Size change of upgraded packages:   -11.65 MiB
Size change of downgraded packages: 0 B

= ADDED IMAGES =
Image: Silverblue dvd-ostree aarch64
Path: 
Silverblue/aarch64/iso/Fedora-Silverblue-ostree-aarch64-Rawhide-20231225.n.0.iso
Image: Onyx dvd-ostree x86_64
Path: Onyx/x86_64/iso/Fedora-Onyx-ostree-x86_64-Rawhide-20231225.n.0.iso

= DROPPED IMAGES =
Image: Kinoite dvd-ostree aarch64
Path: Kinoite/aarch64/iso/Fedora-Kinoite-ostree-aarch64-Rawhide-20231224.n.0.iso
Image: i3 live aarch64
Path: Spins/aarch64/iso/Fedora-i3-Live-aarch64-Rawhide-20231224.n.0.iso
Image: Container_Base docker x86_64
Path: 
Container/x86_64/images/Fedora-Container-Base-Rawhide-20231224.n.0.x86_64.tar.xz

= ADDED PACKAGES =
Package: ftxui-5.0.0-1.fc40
Summary: A simple cross-platform C++ library for terminal based user interfaces
RPMs:ftxui ftxui-devel
Size:1.62 MiB

Package: openhmd-0.3.0^20230112gite64708b-1.fc40
Summary: Free and Open Source API and drivers for immersive technology
RPMs:openhmd openhmd-devel openhmd-doc openhmd-examples
Size:653.81 KiB

Package: stduuid-1.2.3-1.fc40
Summary: A C++17 cross-platform implementation for UUIDs
RPMs:stduuid-devel
Size:102.41 KiB

Package: xr-hardware-1.1.0-1.fc40
Summary: Udev rules files for normal user access to XR input devices
RPMs:xr-hardware
Size:12.94 KiB


= DROPPED PACKAGES =

= UPGRADED PACKAGES =
Package:  bodhi-server-8.0.1-1.fc40
Old package:  bodhi-server-8.0.0-1.fc40
Summary:  Bodhi server
RPMs: bodhi-composer bodhi-server
Size: 4.62 MiB
Size change:  24 B
Changelog:
  * Sun Dec 24 2023 Mattia Verga  - 8.0.1-1
  - Update to 8.0.1


Package:  firecracker-1.6.0-1.fc40
Old package:  firecracker-1.5.1-1.fc40
Summary:  Secure and fast microVMs for serverless computing
RPMs: firecracker
Size: 5.09 MiB
Size change:  357.69 KiB
Changelog:
  * Wed Dec 20 2023 David Michael  - 1.6.0-1
  - Update to the 1.6.0 release.


Package:  firefox-121.0-3.fc40
Old package:  firefox-121.0-1.fc40
Summary:  Mozilla Firefox Web browser
RPMs: firefox firefox-langpacks
Dropped RPMs: firefox-wayland firefox-x11
Size: 439.37 MiB
Size change:  -206.17 KiB
Changelog:
  * Mon Dec 18 2023 Martin Stransky - 121.0-2
  - Enable Gnome Shell Search provider for Fedora 40+
  - Don't ship firefox-x11 and firefox-wayland on Fedora 40+

  * Tue Dec 19 2023 Martin Stransky - 121.0-2
  - Added Wayland proxy cache (mzbz#1743144)

  * Fri Dec 22 2023 Martin Stransky - 121.0-3
  - Disabled DBus activations


Package:  gnome-shell-45.2-3.fc40
Old package:  gnome-shell-45.2-1.fc40
Summary:  Window management and application launching for GNOME
RPMs: gnome-shell
Size: 6.91 MiB
Size change:  2.84 KiB
Changelog:
  * Wed Dec 20 2023 Martin Stransky  - 45.2-2
  - Renamed Firefox desktop file from firefox.desktop to
org.mozilla.firefox.desktop

  * Thu Dec 21 2023 Martin Stransky  - 45.2-3
  - Rename firefox.desktop to org.mozilla.firefox.desktop at
RENAMED_DESKTOP_IDS


Package:  groonga-13.0.9-1.fc40
Old package:  groonga-10.0.8-8.fc39
Summary:  An Embeddable Fulltext Search Engine
RPMs: groonga groonga-devel groonga-doc groonga-examples groonga-libs 
groonga-munin-plugins groonga-plugin-suggest groonga-plugin-token-filters 
groonga-plugin-tokenizer-mecab groonga-server-common groonga-server-gqtp 
groonga-server-http groonga-tools
Added RPMs:   groonga-examples groonga-plugin-tokenizer-mecab 
groonga-server-http groonga-tools
Dropped RPMs: groonga-httpd groonga-tokenizer-mecab
Size: 25.58 MiB
Size change:  6.50 MiB
Changelog:
  * Tue Nov 21 2023 topazus  - 13.0.9-1
  - update to 13.0.9


Package:  hfg-gmuend-openmoji-fonts-15.0.0-1.fc40
Old package:  hfg-gmuend-openmoji-fonts-14.0.0-2.fc37
Summary:  Emojis with a line-drawn style
RPMs: hfg-gmuend-openmoji-black-fonts hfg-gmuend-openmoji-color-fonts 
hfg-gmuend-openmoji-fonts-all
Size: 1.92 MiB
Size change:  -2.73 MiB
Changelog:
  * Thu Jan 19 2023 Fedora Release Engineering  - 
14.0.0-3
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_38_Mass_Rebuild

  * Mon Apr 24 2023 Peter Oliver  - 14.0.0-4
  - SPDX migration.

  * Sun Dec 24 2023 Peter Oliver  - 15.0.0-1
  - Update to version 15.0.0


Package:  jd-1:0.11.0~beta-1.fc40
Old package:  jd-1:0.10.1-1.fc39
Summary:  A 2ch browser
RPMs: jd
Size: 6.17 MiB
Size change:  133.66 KiB
Changelog:
  * Sun Dec 24 2023 Mamoru TASAKA  - 1:0.11.0~beta-1
  - 0.11.0 beta


Package:  kernel-6.7.0-0.rc7.54.fc40
Old package