On 6/1/23 10:12, Steve Grubb wrote:
Hello,
I want to add some missing information...
On Thursday, January 5, 2023 8:43:34 PM EST Ian Kent wrote:
On 6/1/23 09:17, Steve Grubb wrote:
I work on RHEL security problems. I have been looking into a number of
exploits and I think we have a problem t
Hello,
I want to add some missing information...
On Thursday, January 5, 2023 8:43:34 PM EST Ian Kent wrote:
> On 6/1/23 09:17, Steve Grubb wrote:
> > I work on RHEL security problems. I have been looking into a number of
> > exploits and I think we have a problem that has an easy fix.
Here's s
On 6/1/23 09:17, Steve Grubb wrote:
Hello,
I work on RHEL security problems. I have been looking into a number of
exploits and I think we have a problem that has an easy fix. We are not using
the CONFIG_STATIC_USERMODEHELPER_PATH kernel config option. There are a number
of exploits that overwrit
Hello,
I work on RHEL security problems. I have been looking into a number of
exploits and I think we have a problem that has an easy fix. We are not using
the CONFIG_STATIC_USERMODEHELPER_PATH kernel config option. There are a number
of exploits that overwrite the path to modprobe and then pas
On Thu, Jan 05, 2023 at 08:24:21AM -0500, Stephen Smoogen wrote:
> On Thu, 5 Jan 2023 at 08:20, David Cantrell wrote:
>
> > On Thu, Jan 05, 2023 at 11:10:20AM +1000, Peter Hutterer wrote:
> > > On Wed, Jan 04, 2023 at 03:19:57PM -0500, David Cantrell wrote:
> > > [...]
> > > > > So I guess this m
Indeed, makes sense. It is not reported atm in bugzilla, but I just had
a few minutes time. I filed it against gnupg2 and referred to this
mailing list topic and to the upstream link Todd provided:
https://bugzilla.redhat.com/show_bug.cgi?id=2158627
On 05/01/2023 04:05, Peter Robinson wrote:
On 5/01/2023 01:52, Tom Callaway wrote:
Hi Fedora,
TeXLive 2022 (composed of texlive-base and texlive SRPMs) is landing in
rawhide today. I've done extensive local testing in mock to try to make
sure it doesn't break anything obvious... but the size and scope of TL
means that there are probably
That should have been python-fpylll, not python-fplll.
On 1/5/23 14:29, Ben Beasley wrote:
In one week (2023-01-12), or slightly later, I plan to build libfplll
5.4.4[1] in a side tag for Rawhide. This release is API-compatible
with 5.4.2, but there is an ABI-breaking change[2], so the .so vers
In one week (2023-01-12), or slightly later, I plan to build libfplll
5.4.4[1] in a side tag for Rawhide. This release is API-compatible with
5.4.2, but there is an ABI-breaking change[2], so the .so version
increases from 7 to 8.
I have verified compatibility with dependent packages in COPR[3
https://fedoraproject.org/wiki/Changes/TeXLive2022
This document represents a proposed Change. As part of the Changes
process, proposals are publicly announced in order to receive
community feedback. This proposal will only be implemented if approved
by the Fedora Engineering Steering Committee.
On 1/5/23 11:08, Frank Ch. Eigler wrote:
>
>> Of course, but the benefit is to fix performance bugs in applications
>> or maybe the desktop itself. [...]
>
>>> Let's be firm in testing this empirically rather than aspirationally.
>> I really don't know how. Suggestions welcome.
>
> I'd put the o
On 04. 01. 23 17:29, Jonathan Wakely wrote:
On Tue, 3 Jan 2023 at 09:39, Miro Hrončok wrote:
= New business =
#2923 Re-vote for Change proposal: Add -fno-omit-frame-pointer to default
compilation flags
https://pagure.io/fesco/issue/2923
Given the controversial nature of this one, why was it
> Of course, but the benefit is to fix performance bugs in applications
> or maybe the desktop itself. [...]
>> Let's be firm in testing this empirically rather than aspirationally.
> I really don't know how. Suggestions welcome.
I'd put the onus on the proponents of the Change, who made predict
On Wed, Jan 04, 2023 at 02:30:07PM +0100, Vitaly Zaitsev via devel wrote:
> On 03/01/2023 18:42, Miro Hrončok wrote:
> > * AGREED: APPROVED (+6,1,-1) This Change is implemented for Fedora
> > Linux 38 and we evaluate whether to retain it by Fedora Linux 40.
> > This Change must be impleme
On Thu, Dec 22, 2022 at 12:35:54PM -0500, Ben Cotton wrote:
> The most common service to cause this issue is PackageKit, but there
> are others.
NFSv4 unmounts too. I think there's some ordering issue. I use NFS
everywhere and this delay is frustrating, so a shorter delay would be
welcome.
Rich
On Wed, Dec 21, 2022 at 04:49:17PM -0500, Ben Cotton wrote:
> The use-case for clients with different endianess is ''very'' niche.
> It was common in the 1980s when X was originally developed but at this
> point a vanishingly small number of users run clients and X servers on
> different machines,
The following change proposal has been shipped in redhat-rpm-config-238-1.fc38.
If you need to opt-out, you can %undefine clamp_mtime_to_source_date_epoch or
define it to 0.
If you encounter problems, report them in Bugzilla and preferably make it block
the change tracking https://bugzilla.re
On Fri, Dec 23, 2022 at 08:13:49AM +, Zbigniew Jędrzejewski-Szmek wrote:
> Quoting Daniel Berrange from the other part of the thread:
> > This is the same situation we already have in Fedora with
> > libguestfs, where we're building a disk image inside Koji bundling
> > various binaries.
FWIW
On Wed, Jan 4 2023 at 11:46:26 PM -0500, Tom Callaway
wrote:
Despite the size, I don't think TL updates have ever gone through
that process before. Not opposed to doing it though, do we need to
revert those builds from rawhide?
Seems excessive to use the change process for "Update component t
On Wed, Jan 4 2023 at 11:10:54 PM -0500, Frank Ch. Eigler
wrote:
If I understood it correctly, the claim was that enabling this
distro-user-penalizing option would make it back in terms of
performance
optimizations.
Of course, but the benefit is to fix performance bugs in applications
or ma
On Thu, Jan 05, 2023 at 12:56:31AM -0800, Luya Tshimbalanga wrote:
> An issue with the testing method from the proposal: secure boot prevents the
> resulting unsigned unified kernel to boot.
It is signed, but with the test key.
You can get the x509 ca cert for that using:
certutil -L -d /etc/p
On Thu, 5 Jan 2023 at 08:20, David Cantrell wrote:
> On Thu, Jan 05, 2023 at 11:10:20AM +1000, Peter Hutterer wrote:
> > On Wed, Jan 04, 2023 at 03:19:57PM -0500, David Cantrell wrote:
> > [...]
> > > > So I guess this means no remoting into ppc64 or s390x machines from
> > > > x86_64 or ppc64le
On Thu, Jan 05, 2023 at 11:10:20AM +1000, Peter Hutterer wrote:
> On Wed, Jan 04, 2023 at 03:19:57PM -0500, David Cantrell wrote:
> [...]
> > > So I guess this means no remoting into ppc64 or s390x machines from
> > > x86_64 or ppc64le machines without a configuration tweak?
> >
> > We don't have
Hi all,
Hopefully most people are back from vacations now so I think we can go on
with organizing the first Flatpak SIG meeting.
I have created a whenisgood poll for the next week:
https://whenisgood.net/s3rzh5h
Please put your name in there and what times would work for you.
I am thinking that
An issue with the testing method from the proposal: secure boot prevents
the resulting unsigned unified kernel to boot. It will be great to
obtain a scratch-build from koji for users running with enabled secured
boot. My laptop currently uses systemd-boot as default following this
instruction[
25 matches
Mail list logo