The singularity-ce incompatible upgrade has now been pushed to stable.
This is the final announcement prescribed by the EPEL Incompatible Upgrades
Policy:
https://docs.fedoraproject.org/en-US/epel/epel-policy-incompatible-upgrades/
Cheers,
DT
On 9 Feb 2024, at 10:45, David Trudgian wrote
llow-up notification here.
Cheers,
David Trudgian
[1] https://pagure.io/epel/issue/265#comment-894790
--
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedo
Dear all,
Following advice from Neal elsewhere on this list [1], I’m requesting that the
singularity-ce EPEL packages may be updated to 4.1.0 following the incompatible
upgrade procedure. The justification for the upgrade is that 3.x singularity-ce
is no longer maintained upstream. Note that
Thanks for your comments.
>> I’ve had some discussion with Jonathan Wright elsewhere about the topic of
>> this message, but wanted to verify my understanding is correct before I
>> embark on it, and thought I’d do so on list.
>>
>> singularity-ce is currently packaged at v4.0.3 in Fedora
Hi all,
I’ve had some discussion with Jonathan Wright elsewhere about the topic of this
message, but wanted to verify my understanding is correct before I embark on
it, and thought I’d do so on list.
singularity-ce is currently packaged at v4.0.3 in Fedora Rawhide, and v.3.11.5
elsewhere
Many thanks for clarifying the bundling of 3rd party binaries.
> On 23 Jan 2024, at 21:18, Stephen Gallagher wrote:
>
> If you are bundling any software, you need to `Provides:
> bundled(software)`. This is so we can easily locate affected packages
> when e.g. a security issue necessitates
Hi all,
I currently package singularity-ce for Fedora and EPEL.
Upstream, we bundle current versions of squashfuse and conmon with our source
and own binary packages… because many distros package versions that are too old
to work with SingularityCE, and users installing our upstream binary
On Wed, May 3, 2023, at 10:38 PM, Dave Dykstra via epel-devel wrote:
> On Wed, May 03, 2023 at 02:48:05PM -0500, Carl George wrote:
> > On Thu, Apr 27, 2023 at 9:42 AM Dave Dykstra via epel-devel
> > wrote:
> > >
> > > We believe that it is important to apply this change to all EPEL releases,
> >
Dave,
On Wed, May 3, 2023, at 10:31 PM, Dave Dykstra via epel-devel wrote:
> On Wed, May 03, 2023 at 02:59:42PM -0500, Carl George wrote:
> > On Thu, Apr 27, 2023 at 10:20 AM Dave Dykstra via epel-devel
> > wrote:
> > >
> > > On Thu, Apr 27, 2023 at 02:11:46AM -0500, Carl George wrote:
> ...
> >
On Thu, Apr 27, 2023, at 8:11 AM, Carl George wrote:
> The Red Hat CVSS score for CVE-2022-1184 has the same breakdown as the
> NVD CVSS score. Both rate the "privileges required" property as low.
> From what I can tell that property would be rated high if they
> considered root privileges to be
h this update
>> from testing, or may I leave it there and send an announcement to
>> epel-announce that it is there and pending approval by the committee?
>> The bodhi settings are set so they won't get auto-updated by karma or
>> time.
>>
>> A
Hello,
The maintainer of the apptainer package has submitted updates to version
1.1.8-1 against epel-testing:
https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-18a0e3fa23
https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-44ff2475c4
12 matches
Mail list logo