[EPEL-devel] Fedora EPEL 9 updates-testing report
The following Fedora EPEL 9 Security updates need testing: Age URL 5 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-7ff32fc746 podman-tui-0.15.0-2.el9 4 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-b698d8c031 proftpd-1.3.8b-1.el9 4 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-b300e89045 chromium-120.0.6099.129-1.el9 3 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-75bf3d635e xerces-c-3.2.5-1.el9 The following builds have been pushed to Fedora EPEL 9 updates-testing boxed-cpp-1.1.0-3.el9 ftxui-5.0.0-3.el9 mate-media-1.26.2-1.el9 partclone-0.3.27-2.el9 stduuid-1.2.3-2.el9 Details about builds: boxed-cpp-1.1.0-3.el9 (FEDORA-EPEL-2023-4712cedde4) Boxing primitive types in C++ Update Information: update ChangeLog: * Mon Dec 25 2023 topazus - 1.1.0-3 - fix packit and tests * Sun Dec 17 2023 topazus - 1.1.0-2 - disable tests for f38 * Sun Dec 17 2023 topazus - 1.1.0-1 - initial import ftxui-5.0.0-3.el9 (FEDORA-EPEL-2023-f196be5006) A simple cross-platform C++ library for terminal based user interfaces Update Information: update ChangeLog: * Mon Dec 25 2023 topazus - 5.0.0-3 - disable tests on epel * Mon Dec 25 2023 topazus - 5.0.0-2 - fix * Sun Dec 24 2023 topazus - 5.0.0-1 - initial import; rhbz#2255228 mate-media-1.26.2-1.el9 (FEDORA-EPEL-2023-47fa883e14) MATE media programs Update Information: - update to 1.26.2 - fix German translation ChangeLog: * Mon Dec 25 2023 Wolfgang Ulbrich - 1.26.2-1 - update to 1.26.2 - fix german translation partclone-0.3.27-2.el9 (FEDORA-EPEL-2023-667ea7001a) Utility to clone and restore a partition Update Information: - Build `fail-mbr.bin` on all architectures (using cross-compile) ChangeLog: * Mon Dec 25 2023 Robert Scheck 0.3.27-2 - Build fail-mbr.bin on all architectures (using cross-compile) stduuid-1.2.3-2.el9 (FEDORA-EPEL-2023-c3e38a8dec) A C++17 cross-platform implementation for UUIDs Update Information: update update ChangeLog: * Mon Dec 25 2023 topazus - 1.2.3-2 - fix * Sun Dec 24 2023 topazus - 1.2.3-1 - initial import; rhbz#2255198 -- ___ epel-devel mailing list -- epel-devel@lists.fedoraproject.org To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
[EPEL-devel] Fedora EPEL 7 updates-testing report
The following Fedora EPEL 7 Security updates need testing: Age URL 6 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-2ff4055b33 php-Smarty-3.1.48-2.el7 2 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-46203ab7be chromium-120.0.6099.129-1.el7 The following builds have been pushed to Fedora EPEL 7 updates-testing partclone-0.3.27-2.el7 Details about builds: partclone-0.3.27-2.el7 (FEDORA-EPEL-2023-82cc70300e) Utility to clone and restore a partition Update Information: - Build `fail-mbr.bin` on all architectures (using cross-compile) ChangeLog: * Mon Dec 25 2023 Robert Scheck 0.3.27-2 - Build fail-mbr.bin on all architectures (using cross-compile) -- ___ epel-devel mailing list -- epel-devel@lists.fedoraproject.org To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
[EPEL-devel] Fedora EPEL 8 updates-testing report
The following Fedora EPEL 8 Security updates need testing: Age URL 6 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-1bdb2efa01 tor-0.4.8.10-1.el8 6 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-4138b387a7 php-adodb-5.22.7-1.el8 2 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-f6a8bbe365 xerces-c-3.2.5-1.el8 2 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-f6ff23a804 chromium-120.0.6099.129-1.el8 The following builds have been pushed to Fedora EPEL 8 updates-testing boxed-cpp-1.1.0-3.el8 ftxui-5.0.0-3.el8 mate-media-1.26.2-1.el8 partclone-0.3.27-2.el8 Details about builds: boxed-cpp-1.1.0-3.el8 (FEDORA-EPEL-2023-f169d86f45) Boxing primitive types in C++ Update Information: update ChangeLog: * Mon Dec 25 2023 topazus - 1.1.0-3 - fix packit and tests * Sun Dec 17 2023 topazus - 1.1.0-2 - disable tests for f38 * Sun Dec 17 2023 topazus - 1.1.0-1 - initial import ftxui-5.0.0-3.el8 (FEDORA-EPEL-2023-c6457c83bb) A simple cross-platform C++ library for terminal based user interfaces Update Information: update ChangeLog: * Mon Dec 25 2023 topazus - 5.0.0-3 - disable tests on epel * Mon Dec 25 2023 topazus - 5.0.0-2 - fix * Sun Dec 24 2023 topazus - 5.0.0-1 - initial import; rhbz#2255228 mate-media-1.26.2-1.el8 (FEDORA-EPEL-2023-457b9b934d) MATE media programs Update Information: - update to 1.26.2 - fix German translation ChangeLog: * Mon Dec 25 2023 Wolfgang Ulbrich - 1.26.2-1 - update to 1.26.2 - fix german translation partclone-0.3.27-2.el8 (FEDORA-EPEL-2023-7e8e6125bc) Utility to clone and restore a partition Update Information: - Build `fail-mbr.bin` on all architectures (using cross-compile) ChangeLog: * Mon Dec 25 2023 Robert Scheck 0.3.27-2 - Build fail-mbr.bin on all architectures (using cross-compile) -- ___ epel-devel mailing list -- epel-devel@lists.fedoraproject.org To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
[Bug 2255872] TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2255872 --- Comment #1 from Robb Gatica --- Use the following template to for the 'fedpkg update' request to submit an update for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure that all associated bugs get updated when new packages are pushed to stable. = # bugfix, security, enhancement, newpackage (required) type=security # low, medium, high, urgent (required) severity=medium # testing, stable request=testing # Bug numbers: 1234,9876 bugs=2255871,2255872 # Description of your update notes=Security fix for [PUT CVEs HERE] # Enable request automation based on the stable/unstable karma thresholds autokarma=True stable_karma=3 unstable_karma=-3 # Automatically close bugs when this marked as stable close_bugs=True # Suggest that users restart after update suggest_reboot=False == Additionally, you may opt to use the bodhi web interface to submit updates: https://bodhi.fedoraproject.org/updates/new -- You are receiving this mail because: You are on the CC list for the bug. https://bugzilla.redhat.com/show_bug.cgi?id=2255872 Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202255872%23c1 -- ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
[Bug 2255873] New: TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2255873 Bug ID: 2255873 Summary: TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [fedora-all] Product: Fedora Version: 39 Status: NEW Component: perl-Spreadsheet-ParseExcel Keywords: Security, SecurityTracking Severity: medium Priority: medium Assignee: jpazdzi...@redhat.com Reporter: rgat...@redhat.com QA Contact: extras...@fedoraproject.org CC: jpazdzi...@redhat.com, m...@fale.io, p...@city-fan.org, perl-devel@lists.fedoraproject.org, redhat-bugzi...@linuxnetz.de, st...@silug.org Target Milestone: --- Classification: Fedora More information about this security flaw is available in the following bug: http://bugzilla.redhat.com/show_bug.cgi?id=2255871 Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process. -- You are receiving this mail because: You are on the CC list for the bug. https://bugzilla.redhat.com/show_bug.cgi?id=2255873 Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202255873%23c0 -- ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
[Bug 2255873] TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2255873 --- Comment #1 from Robb Gatica --- Use the following template to for the 'fedpkg update' request to submit an update for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure that all associated bugs get updated when new packages are pushed to stable. = # bugfix, security, enhancement, newpackage (required) type=security # low, medium, high, urgent (required) severity=medium # testing, stable request=testing # Bug numbers: 1234,9876 bugs=2255871,2255873 # Description of your update notes=Security fix for [PUT CVEs HERE] # Enable request automation based on the stable/unstable karma thresholds autokarma=True stable_karma=3 unstable_karma=-3 # Automatically close bugs when this marked as stable close_bugs=True # Suggest that users restart after update suggest_reboot=False == Additionally, you may opt to use the bodhi web interface to submit updates: https://bodhi.fedoraproject.org/updates/new -- You are receiving this mail because: You are on the CC list for the bug. https://bugzilla.redhat.com/show_bug.cgi?id=2255873 Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202255873%23c1 -- ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
[Bug 2255872] TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2255872 Robb Gatica changed: What|Removed |Added Blocks||2255871 (CVE-2023-7101) Referenced Bugs: https://bugzilla.redhat.com/show_bug.cgi?id=2255871 [Bug 2255871] CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability -- You are receiving this mail because: You are on the CC list for the bug. https://bugzilla.redhat.com/show_bug.cgi?id=2255872 -- ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
[Bug 2255872] New: TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2255872 Bug ID: 2255872 Summary: TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [epel-all] Product: Fedora EPEL Version: epel8 Status: NEW Component: perl-Spreadsheet-ParseExcel Keywords: Security, SecurityTracking Severity: medium Priority: medium Assignee: m...@fale.io Reporter: rgat...@redhat.com QA Contact: extras...@fedoraproject.org CC: jpazdzi...@redhat.com, m...@fale.io, p...@city-fan.org, perl-devel@lists.fedoraproject.org, redhat-bugzi...@linuxnetz.de, st...@silug.org Target Milestone: --- Classification: Fedora More information about this security flaw is available in the following bug: http://bugzilla.redhat.com/show_bug.cgi?id=2255871 Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process. -- You are receiving this mail because: You are on the CC list for the bug. https://bugzilla.redhat.com/show_bug.cgi?id=2255872 Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla=report-spam_desc=Report%20of%20Bug%202255872%23c0 -- ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
[Bug 2255873] TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2255873 Robb Gatica changed: What|Removed |Added Blocks||2255871 (CVE-2023-7101) Referenced Bugs: https://bugzilla.redhat.com/show_bug.cgi?id=2255871 [Bug 2255871] CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability -- You are receiving this mail because: You are on the CC list for the bug. https://bugzilla.redhat.com/show_bug.cgi?id=2255873 -- ___ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
OpenImageIO 2.5.x w/ soname bump
I plan to build OpenImageIO 2.5.x in rawhide in the near future. Affected packages to be built in a side tag: $ fedrq wr -F "name" -s OpenImageIO-devel OpenColorIO blender embree luxcorerender oidn openshadinglanguage usd Thanks, Richard FAS: hobbes1069 -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
Re: rpmbuild core dumps
Sam Varshavchik writes: Looking at a diff between the 4.19.0 an 4.19.1 tags, a call to rpmfiStat() was added to fill_archive_entry(). The backtrace above shows the execution finding its way from rpmfiStat() into very-much-thread-unsafe code in rpmug.c That code is used only by rpm2archive, though. But the backtrace does show an execution path from packageBinaries into rpmug.c. I wonder what happens if someone were to try to rebuild texlive, and all of its umpteen packages. That should thoroughly excersize the problematic code… pgpSGpzBw4aNy.pgp Description: PGP signature -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
Re: rpmbuild core dumps
Stephen Smoogen writes: #1 0x7f05dd8588ee raise (libc.so.6 + 0x3e8ee) #2 0x7f05dd8408ff abort (libc.so.6 + 0x268ff) #3 0x7f05dd8417d0 __libc_message.cold (libc.so.6 + 0x277d0) #4 0x7f05dd8b47a5 malloc_printerr (libc.so.6 + 0x9a7a5) #5 0x7f05dd8b6a3a _int_free (libc.so.6 + 0x9ca3a) #6 0x7f05dd8b93de free (libc.so.6 + 0x9f3de) #7 0x7f05dda984ec rpmugUid (librpm.so.10 + 0x584ec) #8 0x7f05dda84255 rpmfilesStat (librpm.so.10 + 0x44255) #9 0x7f05dda8438f rpmfiStat (librpm.so.10 + 0x4438f) #10 0x7f05dda8 rpmfiArchiveWriteHeader (librpm.so. 10 + 0x4) #11 0x7f05dda871c9 iterWriteArchiveNext (librpm.so.10 + 0x471c9) Thanks. I was wondering if it was dnf/rpm on the system or dnf/rpm in the chroot but it sounds like something changed between 4.19.0.1 (what I had on my system since September?) and 4.19.1 ( December) Looking at a diff between the 4.19.0 an 4.19.1 tags, a call to rpmfiStat() was added to fill_archive_entry(). The backtrace above shows the execution finding its way from rpmfiStat() into very-much-thread-unsafe code in rpmug.c Further up the backtrace is packageBinaries() which, according to the backtrace, is being multithreaded via OMP. Looking at the core dump, I see a bunch of execution threads running packageBinaries(). I'm confident that this is the breakage. 4.19.1 needs to be fixed ASAP. My humble suggestion for the simplest fix is to slap a __thread on all those static variables in rpmug.c. Or, perhaps, throw a mutex around them so that all execution thread share that micro-optimization those static variables are used for… Hopefully that's the only thing that's thread unsafe in there… pgpUdgoKdRnr2.pgp Description: PGP signature -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
Re: rpmbuild core dumps
On Sun, 24 Dec 2023 at 15:51, Sam Varshavchik wrote: > Stephen Smoogen writes: > > > »My apologies for bad quoting.. email from phone. What version of rpm > build > > is used and what are some packages which are rebuilt that show this > issue. > > This may be needed if the core dump is due to something else in the > > environment like memory limits etc > > It's 4.19.1 on FC39, and it's packages that I'm working on. It's glibc > complaining about a double-free, and not any resource limits. I can get a > backtrace out of it: > > #1 0x7f05dd8588ee raise (libc.so.6 + 0x3e8ee) > #2 0x7f05dd8408ff abort (libc.so.6 + 0x268ff) > #3 0x7f05dd8417d0 __libc_message.cold (libc.so.6 + > 0x277d0) > #4 0x7f05dd8b47a5 malloc_printerr (libc.so.6 + > 0x9a7a5) > #5 0x7f05dd8b6a3a _int_free (libc.so.6 + 0x9ca3a) > #6 0x7f05dd8b93de free (libc.so.6 + 0x9f3de) > #7 0x7f05dda984ec rpmugUid (librpm.so.10 + 0x584ec) > #8 0x7f05dda84255 rpmfilesStat (librpm.so.10 + > 0x44255) > #9 0x7f05dda8438f rpmfiStat (librpm.so.10 + 0x4438f) > #10 0x7f05dda8 rpmfiArchiveWriteHeader > (librpm.so.10 + 0x4) > #11 0x7f05dda871c9 iterWriteArchiveNext (librpm.so.10 > + 0x471c9) > > I am looking at this core dump. I see 32 active execution threads at the > time this whole thing went kaput, and all the code in rpmug.c is > definitely > not thread safe. I did not look very hard, I don't know if there are > mutexes > higher up the call chain, but the overall behavior – occasional core > dumps > -- is indicative of thread races. > > Thanks. I was wondering if it was dnf/rpm on the system or dnf/rpm in the chroot but it sounds like something changed between 4.19.0.1 (what I had on my system since September?) and 4.19.1 ( December) The changelog doesn't say much beyond * Tue Dec 12 2023 Michal Domonkos - 4.19.1-1 - Update to 4.19.1 (https://rpm.org/wiki/Releases/4.19.1) I forget if there is a way to pin an rpm in a mock environment so that you don't update over 4.19.0 to see if you can see if a) the problem still happens with that (possibly indicating that whatever is calling into rpm is broken) or b) the problem doesn't occur and it is a change between .0.1 and .19.1 > > -- > ___ > devel mailing list -- devel@lists.fedoraproject.org > To unsubscribe send an email to devel-le...@lists.fedoraproject.org > Fedora Code of Conduct: > https://docs.fedoraproject.org/en-US/project/code-of-conduct/ > List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines > List Archives: > https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org > Do not reply to spam, report it: > https://pagure.io/fedora-infrastructure/new_issue > -- Stephen Smoogen, Red Hat Automotive Let us be kind to one another, for most of us are fighting a hard battle. -- Ian MacClaren -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
Fedora 40 System-Wide Change: java-21-openjdk as system JDK in F40 pre-announcement
Hi, Before the final announcement arrives, I would like to inform the community about the upcoming change proposal: https://fedoraproject.org/wiki/Changes/Java21 I am grateful for any feedback regarding the proposed changes. Thank you! -- Petra Alice Mikova OpenJDK QE, Senior Quality Engineer Red Hat -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
Re: Orphaned packages looking for new maintainers
On Mon, Dec 25, 2023 at 6:34 AM Ondrej Mosnáček wrote: > > On Mon, 18 Dec 2023 at 19:39, Priscila Gutierres wrote: > > > > virtme-ng makes testing a new kernel and developing new modules A LOT > > easier. > > > > On Mon, Dec 18, 2023 at 10:27 AM Richard W.M. Jones > > wrote: > >> > >> On Mon, Dec 18, 2023 at 11:20:22AM +0100, Miro Hrončok wrote: > >> > virtmeorphan 4 > >> > weeks ago > >> > >> I have no special knowledge of this package, but I did read the > >> article below a few weeks ago about virtme-ng. In particular > >> virtme-ng uses virtiofs (instead of 9p) which is a more modern way to > >> export filesystems into VMs. We (the virt team) have for a very very > >> long time recommended people steer clear of 9p, for security, > >> performance and maintainability reasons. > >> > >> https://lwn.net/Articles/951313/ > > FWIW, I wanted to try out virtme-ng, so I packaged it and submitted for > review: > https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2255805 > > If anyone is interested in having it in Fedora, please consider taking > the review. Co-maintainer offers are also welcome :) I grabbed the review. :) -- 真実はいつも一つ!/ Always, there's only one truth! -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
Re: Orphaned packages looking for new maintainers
On Mon, 18 Dec 2023 at 19:39, Priscila Gutierres wrote: > > virtme-ng makes testing a new kernel and developing new modules A LOT easier. > > On Mon, Dec 18, 2023 at 10:27 AM Richard W.M. Jones wrote: >> >> On Mon, Dec 18, 2023 at 11:20:22AM +0100, Miro Hrončok wrote: >> > virtmeorphan 4 weeks >> > ago >> >> I have no special knowledge of this package, but I did read the >> article below a few weeks ago about virtme-ng. In particular >> virtme-ng uses virtiofs (instead of 9p) which is a more modern way to >> export filesystems into VMs. We (the virt team) have for a very very >> long time recommended people steer clear of 9p, for security, >> performance and maintainability reasons. >> >> https://lwn.net/Articles/951313/ FWIW, I wanted to try out virtme-ng, so I packaged it and submitted for review: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2255805 If anyone is interested in having it in Fedora, please consider taking the review. Co-maintainer offers are also welcome :) -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
Fedora rawhide compose report: 20231225.n.0 changes
OLD: Fedora-Rawhide-20231224.n.0 NEW: Fedora-Rawhide-20231225.n.0 = SUMMARY = Added images:2 Dropped images: 3 Added packages: 4 Dropped packages:0 Upgraded packages: 37 Downgraded packages: 0 Size of added packages: 2.37 MiB Size of dropped packages:0 B Size of upgraded packages: 2.00 GiB Size of downgraded packages: 0 B Size change of upgraded packages: -11.65 MiB Size change of downgraded packages: 0 B = ADDED IMAGES = Image: Silverblue dvd-ostree aarch64 Path: Silverblue/aarch64/iso/Fedora-Silverblue-ostree-aarch64-Rawhide-20231225.n.0.iso Image: Onyx dvd-ostree x86_64 Path: Onyx/x86_64/iso/Fedora-Onyx-ostree-x86_64-Rawhide-20231225.n.0.iso = DROPPED IMAGES = Image: Kinoite dvd-ostree aarch64 Path: Kinoite/aarch64/iso/Fedora-Kinoite-ostree-aarch64-Rawhide-20231224.n.0.iso Image: i3 live aarch64 Path: Spins/aarch64/iso/Fedora-i3-Live-aarch64-Rawhide-20231224.n.0.iso Image: Container_Base docker x86_64 Path: Container/x86_64/images/Fedora-Container-Base-Rawhide-20231224.n.0.x86_64.tar.xz = ADDED PACKAGES = Package: ftxui-5.0.0-1.fc40 Summary: A simple cross-platform C++ library for terminal based user interfaces RPMs:ftxui ftxui-devel Size:1.62 MiB Package: openhmd-0.3.0^20230112gite64708b-1.fc40 Summary: Free and Open Source API and drivers for immersive technology RPMs:openhmd openhmd-devel openhmd-doc openhmd-examples Size:653.81 KiB Package: stduuid-1.2.3-1.fc40 Summary: A C++17 cross-platform implementation for UUIDs RPMs:stduuid-devel Size:102.41 KiB Package: xr-hardware-1.1.0-1.fc40 Summary: Udev rules files for normal user access to XR input devices RPMs:xr-hardware Size:12.94 KiB = DROPPED PACKAGES = = UPGRADED PACKAGES = Package: bodhi-server-8.0.1-1.fc40 Old package: bodhi-server-8.0.0-1.fc40 Summary: Bodhi server RPMs: bodhi-composer bodhi-server Size: 4.62 MiB Size change: 24 B Changelog: * Sun Dec 24 2023 Mattia Verga - 8.0.1-1 - Update to 8.0.1 Package: firecracker-1.6.0-1.fc40 Old package: firecracker-1.5.1-1.fc40 Summary: Secure and fast microVMs for serverless computing RPMs: firecracker Size: 5.09 MiB Size change: 357.69 KiB Changelog: * Wed Dec 20 2023 David Michael - 1.6.0-1 - Update to the 1.6.0 release. Package: firefox-121.0-3.fc40 Old package: firefox-121.0-1.fc40 Summary: Mozilla Firefox Web browser RPMs: firefox firefox-langpacks Dropped RPMs: firefox-wayland firefox-x11 Size: 439.37 MiB Size change: -206.17 KiB Changelog: * Mon Dec 18 2023 Martin Stransky - 121.0-2 - Enable Gnome Shell Search provider for Fedora 40+ - Don't ship firefox-x11 and firefox-wayland on Fedora 40+ * Tue Dec 19 2023 Martin Stransky - 121.0-2 - Added Wayland proxy cache (mzbz#1743144) * Fri Dec 22 2023 Martin Stransky - 121.0-3 - Disabled DBus activations Package: gnome-shell-45.2-3.fc40 Old package: gnome-shell-45.2-1.fc40 Summary: Window management and application launching for GNOME RPMs: gnome-shell Size: 6.91 MiB Size change: 2.84 KiB Changelog: * Wed Dec 20 2023 Martin Stransky - 45.2-2 - Renamed Firefox desktop file from firefox.desktop to org.mozilla.firefox.desktop * Thu Dec 21 2023 Martin Stransky - 45.2-3 - Rename firefox.desktop to org.mozilla.firefox.desktop at RENAMED_DESKTOP_IDS Package: groonga-13.0.9-1.fc40 Old package: groonga-10.0.8-8.fc39 Summary: An Embeddable Fulltext Search Engine RPMs: groonga groonga-devel groonga-doc groonga-examples groonga-libs groonga-munin-plugins groonga-plugin-suggest groonga-plugin-token-filters groonga-plugin-tokenizer-mecab groonga-server-common groonga-server-gqtp groonga-server-http groonga-tools Added RPMs: groonga-examples groonga-plugin-tokenizer-mecab groonga-server-http groonga-tools Dropped RPMs: groonga-httpd groonga-tokenizer-mecab Size: 25.58 MiB Size change: 6.50 MiB Changelog: * Tue Nov 21 2023 topazus - 13.0.9-1 - update to 13.0.9 Package: hfg-gmuend-openmoji-fonts-15.0.0-1.fc40 Old package: hfg-gmuend-openmoji-fonts-14.0.0-2.fc37 Summary: Emojis with a line-drawn style RPMs: hfg-gmuend-openmoji-black-fonts hfg-gmuend-openmoji-color-fonts hfg-gmuend-openmoji-fonts-all Size: 1.92 MiB Size change: -2.73 MiB Changelog: * Thu Jan 19 2023 Fedora Release Engineering - 14.0.0-3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_38_Mass_Rebuild * Mon Apr 24 2023 Peter Oliver - 14.0.0-4 - SPDX migration. * Sun Dec 24 2023 Peter Oliver - 15.0.0-1 - Update to version 15.0.0 Package: jd-1:0.11.0~beta-1.fc40 Old package: jd-1:0.10.1-1.fc39 Summary: A 2ch browser RPMs: jd Size: 6.17 MiB Size change: 133.66 KiB Changelog: * Sun Dec 24 2023 Mamoru TASAKA - 1:0.11.0~beta-1 - 0.11.0 beta Package: kernel-6.7.0-0.rc7.54.fc40 Old package