Re: F40 Change Proposal: Optimized Binaries for the AMD64 Architecture (System-Wide)

2023-12-31 Thread Dominique Martinet
John Reiser wrote on Sun, Dec 31, 2023 at 02:52:53PM -0800: > > Additional paths will be inserted into the search path used for > > executables on systems which have a compatible CPU. > > Searching $PATH is a slow operation. It is so slow that a shell script which > typically processes many files

[Bug 2256089] please enable builds for EPEL8 and EPEL9

2023-12-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2256089 --- Comment #4 from Fedora Update System --- FEDORA-EPEL-2023-880a437f82 has been pushed to the Fedora EPEL 8 testing repository. You can provide feedback for this update here:

[Bug 2255872] TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [epel-all]

2023-12-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2255872 --- Comment #7 from Fedora Update System --- FEDORA-EPEL-2023-c87fdba1fc has been pushed to the Fedora EPEL 8 testing repository. You can provide feedback for this update here:

[EPEL-devel] Fedora EPEL 8 updates-testing report

2023-12-31 Thread updates
The following Fedora EPEL 8 Security updates need testing: Age URL 2 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-3cf7145249 proftpd-1.3.6e-6.el8 The following builds have been pushed to Fedora EPEL 8 updates-testing nsnake-3.0.1-17.el8

[Bug 2255872] TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [epel-all]

2023-12-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2255872 --- Comment #6 from Fedora Update System --- FEDORA-EPEL-2023-60e0cc89b7 has been pushed to the Fedora EPEL 7 testing repository. You can provide feedback for this update here:

[EPEL-devel] Fedora EPEL 7 updates-testing report

2023-12-31 Thread updates
The following builds have been pushed to Fedora EPEL 7 updates-testing nsnake-3.0.1-17.el7 perl-Spreadsheet-ParseExcel-0.6600-1.el7 xrdp-0.9.24-1.el7 Details about builds: nsnake-3.0.1-17.el7

[Bug 2255872] TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [epel-all]

2023-12-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2255872 Fedora Update System changed: What|Removed |Added Status|MODIFIED|ON_QA --- Comment #5 from

[Bug 2256089] please enable builds for EPEL8 and EPEL9

2023-12-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2256089 Fedora Update System changed: What|Removed |Added Status|MODIFIED|ON_QA --- Comment #3 from

Re: F40 Change Proposal: Optimized Binaries for the AMD64 Architecture (System-Wide)

2023-12-31 Thread John Reiser
Additional paths will be inserted into the search path used for executables on systems which have a compatible CPU. Searching $PATH is a slow operation. It is so slow that a shell script which typically processes many files using utilities from packages coreutils and/or binutils often

Re: Troubleshooting MD RAID assembly not working after upgrade to F39

2023-12-31 Thread Sandro
On 12/27/23 23:41, Sandro wrote: Thanks for sparring! Whatever the outcome, I'll report here and on discussion. As promised, here is the outcome of a lengthy investigation. While I was on the right track right from the start, I failed to recognize (something about moving parts, some trees

Re: mockbuild fails locally: dnf v dnf5

2023-12-31 Thread Mark E. Fuller
ok, so perhaps I needed to use `sudo` previously - I ended up manually wiping the `/var/lib/mock/ directory contents and that fixed me up Mark E. Fuller, Ph.D. ful...@fedoraproject.org ful...@mefuller.dev @fuller:fedora.im @fuller:one.ems.host https://mefuller.dev PGP Fingerprint: 73F1 A30C

Re: mockbuild fails locally: dnf v dnf5

2023-12-31 Thread Mark E. Fuller
Unfortunately, this doesn't seem to do the trick - the `mock --scrub=all` runs, but then the same error keeps occurring on both systems Any other thoughts as to how to more aggressively/manually force an update? Mark E. Fuller, Ph.D. ful...@fedoraproject.org ful...@mefuller.dev

Re: Orphaned plenty of packages

2023-12-31 Thread Daniel Milnes via devel
Hey Robin, Thanks for getting all these packaged! I've taken nsnake and nudoku, and will push the 3.0.0 update the latter soon. On Sun, 2023-12-31 at 20:06 +0800, Robin Lee wrote: > Sorry, since changes in day-job and lack of time for working on > Fedora, I orphaned plenty of packages: > > *

Re: Orphaned plenty of packages

2023-12-31 Thread Christiano Anderson
Hi Robin, Thanks for your contribution so far. I've adopted the buildstream package. Best, Christiano On Sunday, 31 December 2023 at 13:06, Robin Lee wrote: > > > Sorry, since changes in day-job and lack of time for working on > Fedora, I orphaned plenty of packages: > > * buildstream

Orphaned python-compressed-rtf and python-red-black-tree-mod

2023-12-31 Thread Sandro
Hi, I orphaned python-compressed-rtf and python-red-black-tree-mod. These were brought into Fedora as dependencies of extract-msg. However, I've decided to not pursue this any further. Instead, I will maintain extract-msg and its dependencies in Copr [1]. [1]

[Bug 2255872] TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [epel-all]

2023-12-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2255872 --- Comment #4 from Fedora Update System --- FEDORA-EPEL-2023-60e0cc89b7 has been submitted as an update to Fedora EPEL 7. https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-60e0cc89b7 -- You are receiving this mail because: You are

[Bug 2255872] TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [epel-all]

2023-12-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2255872 Fedora Update System changed: What|Removed |Added Status|NEW |MODIFIED --- Comment #2 from

[Bug 2255872] TRIAGE CVE-2023-7101 perl-Spreadsheet-ParseExcel: unvalidated input can lead to arbitrary code execution vulnerability [epel-all]

2023-12-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2255872 Fedora Update System changed: What|Removed |Added Status|NEW |MODIFIED --- Comment #2 from

[Bug 2256089] please enable builds for EPEL8 and EPEL9

2023-12-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2256089 Fedora Update System changed: What|Removed |Added Status|NEW |MODIFIED --- Comment #1 from

[Bug 2256089] please enable builds for EPEL8 and EPEL9

2023-12-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2256089 Fedora Update System changed: What|Removed |Added Status|NEW |MODIFIED --- Comment #1 from

Orphaned plenty of packages

2023-12-31 Thread Robin Lee
Sorry, since changes in day-job and lack of time for working on Fedora, I orphaned plenty of packages: * buildstream * csmith * drumstick * drumstick0 * kmetronome * nsnake * nudoku * qstardict * qterm * sonivox * texworks * vmpk -robin -- ___ devel

[Bug 2256327] New: perl-CPAN-Perl-Releases-5.20231230 is available

2023-12-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2256327 Bug ID: 2256327 Summary: perl-CPAN-Perl-Releases-5.20231230 is available Product: Fedora Version: rawhide Status: NEW Component: perl-CPAN-Perl-Releases Keywords:

Re: Broken %pyproject_buildrequires parser

2023-12-31 Thread Miro HronĨok
On 29. 12. 23 20:41, Mattia Verga wrote: I think I would just do something like this in %prep: sed -r -i 's/^file:/# &/' tests/requirements.in Thanks, that did it. Is this something broken in upstream code, or is it our parser that needs to be adjusted? Our thing wants to generate

Fedora rawhide compose report: 20231231.n.0 changes

2023-12-31 Thread Fedora Rawhide Report
OLD: Fedora-Rawhide-20231230.n.0 NEW: Fedora-Rawhide-20231231.n.0 = SUMMARY = Added images:3 Dropped images: 4 Added packages: 4 Dropped packages:0 Upgraded packages: 26 Downgraded packages: 0 Size of added packages: 656.47 KiB Size of dropped packages:0

[Bug 2256323] New: perl-Module-CoreList-5.20231230 is available

2023-12-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2256323 Bug ID: 2256323 Summary: perl-Module-CoreList-5.20231230 is available Product: Fedora Version: rawhide Status: NEW Component: perl-Module-CoreList Keywords: