Monday, September 30, 2019
[USN-4145-1] Linux kernel vulnerabilities
Ubuntu Security Notice USN-4145-1
October 01, 2019
linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-kvm: Linux kernel for cloud environments
- linux-raspi2: Linux kernel for Raspberry Pi 2
- linux-snapdragon: Linux kernel for Snapdragon processors
Details:
It was discovered that a race condition existed in the GFS2 file system in
the Linux kernel. A local attacker could possibly use this to cause a
denial of service (system crash). (CVE-2016-10905)
It was discovered that the IPv6 implementation in the Linux kernel did not
properly validate socket options in some situations. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-18509)
It was discovered that the USB gadget Midi driver in the Linux kernel
contained a double-free vulnerability when handling certain error
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2018-20961)
It was discovered that the XFS file system in the Linux kernel did not
properly handle mount failures in some situations. A local attacker could
possibly use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2018-20976)
It was discovered that the Intel Wi-Fi device driver in the Linux kernel
did not properly validate certain Tunneled Direct Link Setup (TDLS). A
physically proximate attacker could use this to cause a denial of service
(Wi-Fi disconnect). (CVE-2019-0136)
It was discovered that the Bluetooth UART implementation in the Linux
kernel did not properly check for missing tty operations. A local attacker
could use this to cause a denial of service. (CVE-2019-10207)
It was discovered that an integer overflow existed in the Linux kernel when
reference counting pages, leading to potential use-after-free issues. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2019-11487)
It was discovered that the GTCO tablet input driver in the Linux kernel did
not properly bounds check the initial HID report sent by the device. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2019-13631)
It was discovered that the Raremono AM/FM/SW radio device driver in the
Linux kernel did not properly allocate memory, leading to a use-after-free.
A physically proximate attacker could use this to cause a denial of service
or possibly execute arbitrary code. (CVE-2019-15211)
It was discovered that a race condition existed in the CPiA2 video4linux
device driver for the Linux kernel, leading to a use-after-free. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2019-15215)
It was discovered that the Atheros mobile chipset driver in the Linux
kernel did not properly validate data in some situations. An attacker could
use this to cause a denial of service (system crash). (CVE-2019-15926)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS:
linux-image-4.4.0-1059-kvm 4.4.0-1059.66
linux-image-4.4.0-1095-aws 4.4.0-1095.106
linux-image-4.4.0-1123-raspi2 4.4.0-1123.132
linux-image-4.4.0-1127-snapdragon 4.4.0-1127.135
linux-image-4.4.0-165-generic 4.4.0-165.193
linux-image-4.4.0-165-generic-lpae 4.4.0-165.193
linux-image-4.4.0-165-lowlatency 4.4.0-165.193
linux-image-4.4.0-165-powerpc-e500mc 4.4.0-165.193
linux-image-4.4.0-165-powerpc-smp 4.4.0-165.193
linux-image-4.4.0-165-powerpc64-emb 4.4.0-165.193
linux-image-4.4.0-165-powerpc64-smp 4.4.0-165.193
linux-image-aws 4.4.0.1095.99
linux-image-generic 4.4.0.165.173
linux-image-generic-lpae 4.4.0.165.173
linux-image-kvm 4.4.0.1059.59
linux-image-lowlatency 4.4.0.165.173
linux-image-powerpc-e500mc 4.4.0.165.173
linux-image-powerpc-smp 4.4.0.165.173
linux-image-powerpc64-emb 4.4.0.165.173
linux-image-powerpc64-smp 4.4.0.165.173
linux-image-raspi2 4.4.0.1123.123
linux-image-snapdragon 4.4.0.1127.119
linux-image-virtual 4.4.0.165.173
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://usn.ubuntu.com/4145-1
CVE-2016-10905, CVE-2017-18509, CVE-2018-20961, CVE-2018-20976,
CVE-2019-0136, CVE-2019-10207, CVE-2019-11487, CVE-2019-13631,
CVE-2019-15211, CVE-2019-15215, CVE-2019-15926
Package Information:
https://launchpad.net/ubuntu/+source/linux/4.4.0-165.193
https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1095.106
https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1059.66
https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1123.132
https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1127.135
[USN-4144-1] Linux kernel vulnerabilities
Ubuntu Security Notice USN-4144-1
October 01, 2019
linux, linux-aws, linux-aws-hwe, linux-azure, linux-hwe, linux-kvm,
linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-kvm: Linux kernel for cloud environments
- linux-oem: Linux kernel for OEM processors
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi2: Linux kernel for Raspberry Pi 2
- linux-snapdragon: Linux kernel for Snapdragon processors
- linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-hwe: Linux hardware enablement (HWE) kernel
Details:
It was discovered that the XFS file system in the Linux kernel did not
properly handle mount failures in some situations. A local attacker could
possibly use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2018-20976)
Benjamin Moody discovered that the XFS file system in the Linux kernel did
not properly handle an error condition when out of disk quota. A local
attacker could possibly use this to cause a denial of service.
(CVE-2019-15538)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS:
linux-image-4.15.0-1026-oracle 4.15.0-1026.29
linux-image-4.15.0-1047-kvm 4.15.0-1047.47
linux-image-4.15.0-1048-raspi2 4.15.0-1048.52
linux-image-4.15.0-1051-aws 4.15.0-1051.53
linux-image-4.15.0-1057-oem 4.15.0-1057.66
linux-image-4.15.0-1065-snapdragon 4.15.0-1065.72
linux-image-4.15.0-65-generic 4.15.0-65.74
linux-image-4.15.0-65-generic-lpae 4.15.0-65.74
linux-image-4.15.0-65-lowlatency 4.15.0-65.74
linux-image-aws 4.15.0.1051.50
linux-image-generic 4.15.0.65.67
linux-image-generic-lpae 4.15.0.65.67
linux-image-kvm 4.15.0.1047.47
linux-image-lowlatency 4.15.0.65.67
linux-image-oem 4.15.0.1057.61
linux-image-oracle 4.15.0.1026.29
linux-image-powerpc-e500mc 4.15.0.65.67
linux-image-powerpc-smp 4.15.0.65.67
linux-image-powerpc64-emb 4.15.0.65.67
linux-image-powerpc64-smp 4.15.0.65.67
linux-image-raspi2 4.15.0.1048.46
linux-image-snapdragon 4.15.0.1065.68
linux-image-virtual 4.15.0.65.67
Ubuntu 16.04 LTS:
linux-image-4.15.0-1026-oracle 4.15.0-1026.29~16.04.1
linux-image-4.15.0-1051-aws 4.15.0-1051.53~16.04.1
linux-image-4.15.0-1060-azure 4.15.0-1060.65
linux-image-4.15.0-65-generic 4.15.0-65.74~16.04.1
linux-image-4.15.0-65-generic-lpae 4.15.0-65.74~16.04.1
linux-image-4.15.0-65-lowlatency 4.15.0-65.74~16.04.1
linux-image-aws-hwe 4.15.0.1051.51
linux-image-azure 4.15.0.1060.63
linux-image-generic-hwe-16.04 4.15.0.65.85
linux-image-generic-lpae-hwe-16.04 4.15.0.65.85
linux-image-lowlatency-hwe-16.04 4.15.0.65.85
linux-image-oem 4.15.0.65.85
linux-image-oracle 4.15.0.1026.19
linux-image-virtual-hwe-16.04 4.15.0.65.85
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://usn.ubuntu.com/4144-1
CVE-2018-20976, CVE-2019-15538
Package Information:
https://launchpad.net/ubuntu/+source/linux/4.15.0-65.74
https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1051.53
https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1047.47
https://launchpad.net/ubuntu/+source/linux-oem/4.15.0-1057.66
https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1026.29
https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1048.52
https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1065.72
https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1051.53~16.04.1
https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1060.65
https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-65.74~16.04.1
https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1026.29~16.04.1
LibreSSL 3.0.1 Released
LibreSSL directory of your local OpenBSD mirror soon.
This is the second development release from the 3.0 series, which will
eventually be part of OpenBSD 6.6. It includes the following changes:
* Ported Billy Brumley's fix for CVE-2019-1547 in OpenSSL 1.1.1. If a NULL
or zero cofactor is passed to EC_GROUP_set_generator(), try to compute
it using Hasse's bound. This works as long as the cofactor is small
enough.
* Fixed a memory leak in error paths for eckey_type2param().
* Initial work on supporting Cryptographic Message Syntax (CMS) in
libcrypto (not enabled).
* Various manual page improvements and additions.
* Added a CMake check for an existing uninstall target, facilitating
embedding LibreSSL in larger CMake projects, from Matthew Albrecht.
The LibreSSL project continues improvement of the codebase to reflect modern,
safe programming practices. We welcome feedback and improvements from the
broader community. Thanks to all of the contributors who helped make this
release possible.
[USN-4143-1] SDL 2.0 vulnerabilities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=hg//
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-4143-1
September 30, 2019
SDL 2.0 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.04
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
SDL 2.0 could be made to crash or run programs as your login if it
opened a specially crafted file.
Software Description:
- libsdl2: Simple DirectMedia Layer: cross-platform development library
providing access to low level media interfaces
Details:
It was discovered that SDL 2.0 mishandled crafted image files resulting in an
integer overflow. If a user were tricked into opening a malicious file, SDL
2.0 could be caused to crash or potentially run arbitrary code.
(CVE-2017-2888)
It was discovered that SDL 2.0 mishandled crafted image files. If a user were
tricked into opening a malicious file, SDL 2.0 could be caused to crash or
potentially run arbitrary code.
(CVE-2019-7635, CVE-2019-7636, CVE-2019-7637, CVE-2019-7638)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 19.04:
libsdl2-2.0-0 2.0.9+dfsg1-1ubuntu1.19.04.1
Ubuntu 18.04 LTS:
libsdl2-2.0-0 2.0.8+dfsg1-1ubuntu1.18.04.4
Ubuntu 16.04 LTS:
libsdl2-2.0-0 2.0.4+dfsg1-2ubuntu2.16.04.2
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4143-1
CVE-2017-2888, CVE-2019-7635, CVE-2019-7636, CVE-2019-7637,
CVE-2019-7638
Package Information:
https://launchpad.net/ubuntu/+source/libsdl2/2.0.9+dfsg1-1ubuntu1.19.04.1
https://launchpad.net/ubuntu/+source/libsdl2/2.0.8+dfsg1-1ubuntu1.18.04.4
https://launchpad.net/ubuntu/+source/libsdl2/2.0.4+dfsg1-2ubuntu2.16.04.2
[USN-4142-2] e2fsprogs vulnerability
Ubuntu Security Notice USN-4142-2
September 30, 2019
e2fsprogs vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 ESM
- Ubuntu 12.04 ESM
Summary:
e2fsprogs could be made to execute arbitrary code if it is
running in a crafted ext4 partition.
Software Description:
- e2fsprogs: ext2/ext3/ext4 file system utilities
Details:
USN-4142-1 fixed a vulnerability in e2fsprogs. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
Original advisory details:
It was discovered that e2fsprogs incorrectly handled certain ext4 partitions.
An attacker could possibly use this issue to execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 ESM:
e2fsprogs 1.42.9-3ubuntu1.3+esm1
Ubuntu 12.04 ESM:
e2fsprogs 1.42-1ubuntu2.4
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4142-2
https://usn.ubuntu.com/4142-1
CVE-2019-5094
[USN-4142-1] e2fsprogs vulnerability
Ubuntu Security Notice USN-4142-1
September 30, 2019
e2fsprogs vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.04
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
e2fsprogs could be made to execute arbitrary code if it is running in
a crafted ext4 partition.
Software Description:
- e2fsprogs: ext2/ext3/ext4 file system utilities
Details:
It was discovered that e2fsprogs incorrectly handled certain ext4 partitions.
An attacker could possibly use this issue to execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 19.04:
e2fsprogs 1.44.6-1ubuntu0.1
Ubuntu 18.04 LTS:
e2fsprogs 1.44.1-1ubuntu1.2
Ubuntu 16.04 LTS:
e2fsprogs 1.42.13-1ubuntu1.1
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4142-1
CVE-2019-5094
Package Information:
https://launchpad.net/ubuntu/+source/e2fsprogs/1.44.6-1ubuntu0.1
https://launchpad.net/ubuntu/+source/e2fsprogs/1.44.1-1ubuntu1.2
https://launchpad.net/ubuntu/+source/e2fsprogs/1.42.13-1ubuntu1.1
Orphaned packages looking for new maintainers
are orphaned for six weeks, unless someone adopts them. If you know for sure
that the package should be retired, please do so now with a proper reason:
https://fedoraproject.org/wiki/How_to_remove_a_package_at_end_of_life
Note: If you received this mail directly you (co)maintain one of the affected
packages or a package that depends on one. Please adopt the affected package or
retire your depending package to avoid broken dependencies, otherwise your
package will be retired when the affected package gets retired.
Request package ownership via releng issues:
https://pagure.io/releng/issues
Full report available at:
https://churchyard.fedorapeople.org/orphans-2019-09-30.txt
grep it for your FAS username and follow the dependency chain.
Package (co)maintainers Status Change
================================================================================
PyRTF orphan 3 weeks ago
R-ALL orphan 5 weeks ago
R-AnnotationDbi orphan 5 weeks ago
R-BSgenome orphan 5 weeks ago
R-BSgenome.Celegans.UCSC.ce2 orphan 5 weeks ago
R-Biobase orphan 5 weeks ago
R-BiocGenerics orphan 5 weeks ago
R-Biostrings orphan 5 weeks ago
R-BufferedMatrix orphan 5 weeks ago
R-BufferedMatrixMethods orphan 5 weeks ago
R-DynDoc orphan 5 weeks ago
R-GenomicFeatures orphan 5 weeks ago
R-GenomicRanges orphan 5 weeks ago
R-IRanges orphan 5 weeks ago
R-ROC orphan 5 weeks ago
R-affy orphan 5 weeks ago
R-affydata orphan 5 weeks ago
R-affyio orphan 5 weeks ago
R-fibroEset orphan 5 weeks ago
R-hgu133acdf orphan 5 weeks ago
R-hgu95av2cdf orphan 5 weeks ago
R-hgu95av2probe orphan 5 weeks ago
R-maanova orphan 5 weeks ago
R-multtest alexlan, orphan 5 weeks ago
R-pls orphan 5 weeks ago
R-preprocessCore orphan 5 weeks ago
R-statmod orphan 5 weeks ago
R-tkWidgets orphan 5 weeks ago
R-widgetTools orphan 5 weeks ago
RackTables orphan 3 weeks ago
TeXamator orphan 3 weeks ago
XmlSchema msimacek, orphan 3 weeks ago
Xnee orphan 6 weeks ago
access-modifier-annotation mizdebsk, orphan 4 weeks ago
accumulo ctubbsii, milleruntime, 6 weeks ago
mizdebsk, orphan
acegisecurity mizdebsk, orphan 4 weeks ago
adevs orphan 6 weeks ago
akuma orphan 4 weeks ago
alacarte alexl, caillon, caolanm, 2 weeks ago
johnp, mbarnes, orphan,
rhughes, ssp
annotation-indexer mizdebsk, orphan 4 weeks ago
anyremote orphan 3 weeks ago
apache-commons-csv mizdebsk, orphan, spike 4 weeks ago
apache-commons-discovery lkundrak, mizdebsk, orphan, 4 weeks ago
spike
apache-commons-el fnasser, mizdebsk, orphan, 4 weeks ago
spike
apache-commons-launcher orphan 3 weeks ago
apache-mina orphan 4 weeks ago
apache-sshd gil, orphan 4 weeks ago
arptools jhrozek, orphan 4 weeks ago
asterisk-gui orphan 6 weeks ago
audio-convert-mod orphan 2 weeks ago
batti orphan 2 weeks ago
belier orphan 5 weeks ago
bios_extract orphan 3 weeks ago
bridge-method-injector mizdebsk, orphan 4 weeks ago
bundling-detection-java mizdebsk, orphan 4 weeks ago
bytecode-compatibility- mizdebsk, orphan 4 weeks ago
transformer
c3p0 orphan 4 weeks ago
captcp orphan 3 weeks ago
cassandra acaringi, hhorak, jjanco, 1 weeks ago
orphan, rimolive
castor-maven-plugin orphan 0 weeks ago
cbi-plugins eclipse-sig, kdaniel, orphan, 0 weeks ago
rgrunber
certmaster alikins, orphan, robert, 3 weeks ago
wakko666
cfv dfateyev, orphan 4 weeks ago
check-mk orphan 3 weeks ago
checkdns orphan 6 weeks ago
chm2pdf orphan 2 weeks ago
comedilib orphan 3 weeks ago
concurrentunit orphan 3 weeks ago
constant-pool-scanner mizdebsk, orphan 4 weeks ago
curator ctubbsii, milleruntime, 6 weeks ago
orphan, tstclair
dfish orphan 6 weeks ago
disper orphan 5 weeks ago
drobo-utils imntreal, orphan 3 weeks ago
dwdiff jhrozek, orphan 4 weeks ago
easybashgui orphan 6 weeks ago
eclipse-dtp eclipse-sig, galileo, kdaniel, 0 weeks ago
mbooth, orphan
eclipse-ecf eclipse-sig, kdaniel, orphan, 0 weeks ago
rgrunber
eclipse-eclemma eclipse-sig, jerboaa, kdaniel, 0 weeks ago
orphan, rgrunber
eclipse-egit-github eclipse-sig, orphan 0 weeks ago
eclipse-linuxtools eclipse-sig, jjohnstn, orphan, 0 weeks ago
rgrunber
eclipse-moreunit jerboaa, orphan 0 weeks ago
eclipse-mpc eclipse-sig, kdaniel, orphan, 0 weeks ago
rgrunber
eclipse-mylyn arobinso, eclipse-sig, 0 weeks ago
jjohnstn, kdaniel, orphan,
rgrunber
eclipse-packagekit eclipse-sig, jerboaa, kdaniel, 0 weeks ago
orphan, rgrunber
eclipse-pydev eclipse-sig, jjohnstn, orphan 0 weeks ago
eclipse-swtbot eclipse-sig, orphan 0 weeks ago
eclipse-tm-terminal eclipse-sig, orphan 0 weeks ago
emma orphan 4 weeks ago
epydoc orphan, thias 3 weeks ago
euca2ools orphan 2 weeks ago
felix-main orphan 3 weeks ago
fishpoll marionline, orphan 3 weeks ago
freemedforms nobrakal, orphan 0 weeks ago
freenx-server orphan 3 weeks ago
fsniper jhrozek, orphan 4 weeks ago
func alikins, orphan, robert, 2 weeks ago
wakko666
fuse-python moezroy, orphan 3 weeks ago
gadget orphan 3 weeks ago
gcc-python-plugin jakub, orphan 2 weeks ago
geronimo-jaspic-spec mizdebsk, orphan 4 weeks ago
ginfo orphan, stevetraylen 2 weeks ago
git-bz orphan 3 weeks ago
git-remote-bzr orphan 1 weeks ago
gitosis orphan, slankes 5 weeks ago
glassfish-jsp mizdebsk, orphan 4 weeks ago
gmavenplus-plugin orphan 4 weeks ago
gnome-python2-extras alexl, caillon, caolanm, 2 weeks ago
gnome-sig, johnp, mikedep333,
orphan, rhughes, rstrode, ssp
gnu-regexp dbhole, mizdebsk, orphan 0 weeks ago
gob2 orphan 6 weeks ago
googlecl orphan 5 weeks ago
gpars mizdebsk, orphan 4 weeks ago
groovy mizdebsk, orphan 4 weeks ago
groovy-sandbox mizdebsk, orphan 4 weeks ago
gstreamer-python company, orphan, tomspur 2 weeks ago
gtkparasite ivazquez, orphan 3 weeks ago
halberd orphan 5 weeks ago
hntool orphan 5 weeks ago
htrace ctubbsii, milleruntime, orphan 6 weeks ago
httpdtap orphan 5 weeks ago
isorelax mizdebsk, orphan 0 weeks ago
jBCrypt orphan, sdz 4 weeks ago
jarjar mizdebsk, orphan 3 weeks ago
java-base64 orphan 0 weeks ago
java-uuid-generator orphan 3 weeks ago
jboss-connector-1.7-api orphan 4 weeks ago
jboss-jstl-1.2-api mmraka, orphan 0 weeks ago
jboss-websocket-1.0-api orphan 4 weeks ago
jenkins mizdebsk, orphan 4 weeks ago
jenkins-executable-war mizdebsk, orphan 4 weeks ago
jenkins-task-reactor mizdebsk, orphan 4 weeks ago
jenkins-version-number mizdebsk, orphan 4 weeks ago
jenkins-winstone mizdebsk, orphan 4 weeks ago
jenkins-xstream orphan 4 weeks ago
jetty-alpn mizdebsk, orphan 4 weeks ago
jetty-distribution-remote- mizdebsk, orphan 4 weeks ago
resources
jetty-schemas mizdebsk, orphan 4 weeks ago
jetty-test-helper mizdebsk, orphan 4 weeks ago
jetty-version-maven-plugin mizdebsk, orphan 0 weeks ago
jetty8 eclipse-sig, mizdebsk, orphan, 4 weeks ago
pmackinn
jline1 orphan 4 weeks ago
jmdns mizdebsk, orphan 4 weeks ago
jruby-maven-plugins mizdebsk, orphan 4 weeks ago
js-CodeMirror mizdebsk, orphan 4 weeks ago
jsch-agent-proxy mizdebsk, orphan 4 weeks ago
jthread orphan 3 weeks ago
key-mon orphan 5 weeks ago
kig jreznik, kde-sig, orphan, 3 weeks ago
rdieter
kohsuke-pom mizdebsk, orphan 4 weeks ago
kross-interpreters jreznik, kde-sig, orphan, 3 weeks ago
rdieter
kryo-serializers orphan 6 weeks ago
laditools orphan 2 weeks ago
libcommuni orphan 6 weeks ago
libdasm orphan 3 weeks ago
libdivecomputer orphan 5 weeks ago
libeio mrunge, orion, orphan 6 weeks ago
libexif-gtk3 orphan 6 weeks ago
libopensync orphan 3 weeks ago
libpam4j mizdebsk, orphan 4 weeks ago
localizer mizdebsk, orphan 4 weeks ago
logback java-sig, orion, orphan 4 weeks ago
mach orphan 3 weeks ago
marave orphan 3 weeks ago
maven-mapping mizdebsk, orphan 4 weeks ago
mchange-commons mmraka, orphan 4 weeks ago
metainf-services lef, mizdebsk, orphan 4 weeks ago
mined orphan 6 weeks ago
mirrorbrain orphan 3 weeks ago
mkelfimage orphan 1 weeks ago
moin ivazquez, mmcgrath, orphan 3 weeks ago
nfft lupinix, orphan 3 weeks ago
notify-python orphan 0 weeks ago
nwsclient orphan 5 weeks ago
openstv orphan 3 weeks ago
openxcap orphan 2 weeks ago
patcher orphan, tomspur 3 weeks ago
pdf-renderer orphan 2 weeks ago
pegdown mizdebsk, orphan 0 weeks ago
percona-xtrabackup orphan 2 weeks ago
pilas martinlanghoff, orphan 3 weeks ago
pipestat orphan 3 weeks ago
pius amitshah, fale, orphan 3 weeks ago
powerpc-utils-python orphan 3 weeks ago
pycdio orphan 3 weeks ago
pycscope orphan 3 weeks ago
pyftpdlib orphan 2 weeks ago
python-APScheduler orphan 4 weeks ago
python-Lektor orphan 3 weeks ago
python-application orphan, salimma 3 weeks ago
python-backports- ianweller, infra-sig, orphan, 2 weeks ago
ssl_match_hostname ralph
python-cassandra-driver filabrazilska, lkundrak, 1 weeks ago
orphan, praiskup
python-chm lbazan, narasim, orphan, 2 weeks ago
pertusus
python-epdb arg, orphan, pjones 2 weeks ago
python-flup orphan, sgallagh 6 weeks ago
python-gnutls gnat, orphan 3 weeks ago
python-grafyaml orphan 4 weeks ago
python-inifile orphan, python-sig 3 weeks ago
python-ipaddress orphan, pwouters 3 weeks ago
python-jenkinsapi cottsay, orphan 2 weeks ago
python-kiwi-gtk orphan 3 weeks ago
python-krbV orphan 2 weeks ago
python-ngram orphan 2 weeks ago
python-nitrate leospol, mfrodl, orphan 3 weeks ago
python-oauth orphan, sdz 2 weeks ago
python-openid orphan 2 weeks ago
python-pp orphan 3 weeks ago
python-progressbar cdamian, orphan, pviktori 2 weeks ago
python-pybloomfiltermmap orphan 2 weeks ago
python-pysmell orphan, patches 3 weeks ago
python-qpid orphan 2 weeks ago
python-requestbuilder orphan 3 weeks ago
python-restauth orphan 6 weeks ago
python-restauth-common orphan 6 weeks ago
python-sexy orphan 3 weeks ago
python-sippy orphan 3 weeks ago
python-sparklines orphan, ralph 3 weeks ago
python-speedtest-cli orphan 2 weeks ago
python-sudsds orphan 3 weeks ago
python-tbgrep infra-sig, orphan, ralph 2 weeks ago
python-tpg orphan 2 weeks ago
python-tw2-jquery orphan, ralph 4 weeks ago
python2-typing chandankumar, orphan 2 weeks ago
q-text-as-data orphan 3 weeks ago
qpid-cpp nsantos, orphan 2 weeks ago
qtermwidget-qt4 lupinix, lxqt-sig, orphan, 3 weeks ago
tieugene
qtools orphan 3 weeks ago
radiotray orphan 2 weeks ago
rawdog orphan 3 weeks ago
relaxngDatatype dbhole, mizdebsk, orphan 0 weeks ago
relaxngcc orphan 0 weeks ago
rinetd orphan 6 weeks ago
rkward orphan 5 weeks ago
robust-http-client mizdebsk, orphan 4 weeks ago
rootfs-resize orphan, robert 3 weeks ago
rubygem-audited orphan 5 weeks ago
rubygem-hike orphan 5 weeks ago
rubygem-journey orphan 5 weeks ago
rubygem-rbovirt jstribny, orphan, tdawson 5 weeks ago
sezpoz mizdebsk, orphan 4 weeks ago
sidc-gui orphan 3 weeks ago
soscleaner orphan 3 weeks ago
sparcy orphan 3 weeks ago
spymemcached orphan 4 weeks ago
sqlcli orphan 3 weeks ago
sshj orphan 4 weeks ago
stapler-adjunct-timeline mizdebsk, orphan 4 weeks ago
stringtemplate4 mizdebsk, mjakubicek, orphan 0 weeks ago
subdownloader orphan 2 weeks ago
svnmailer orphan 5 weeks ago
system-config-keyboard itamarjp, nphilipp, orphan, 3 weeks ago
raveit65, twoerner
system-switch-displaymanager orphan 3 weeks ago
system-switch-java jvanek, omajid, orphan 3 weeks ago
tagsoup mizdebsk, orphan 0 weeks ago
tellico alexlan, orphan 3 weeks ago
thunderbird-enigmail orphan 3 weeks ago
trac-mastertickets-plugin orphan 5 weeks ago
trilead-putty-extension mizdebsk, orphan 4 weeks ago
trilead-ssh2 orphan 4 weeks ago
umit fab, orphan 3 weeks ago
vte alexl, caillon, caolanm, 0 weeks ago
gnome-sig, johnp, kevin,
mbarnes, orphan, rhughes,
rnorwood, rstrode, ssp
wammu orphan 1 weeks ago
winswitch orphan 2 weeks ago
wraplinux orphan 1 weeks ago
wtop orphan 3 weeks ago
xhotkeys orphan 3 weeks ago
xinput_calibrator orphan 6 weeks ago
xmlrpc kdaniel, mizdebsk, orphan 4 weeks ago
xom dbhole, mizdebsk, orphan 4 weeks ago
xtuple-csvimp orphan 5 weeks ago
xxdiff orphan 3 weeks ago
zinc mizdebsk, orphan 4 weeks ago
zynjacku orphan 2 weeks ago
The following packages require above mentioned packages:
See https://churchyard.fedorapeople.org/orphans-2019-09-30.txt
Grep for your username and follow the dependencies.
Affected (co)maintainers
abompard: python-backports-ssl_match_hostname, python-ipaddress
acaringi: cassandra, groovy, python-cassandra-driver, gmavenplus-plugin,
jBCrypt, jarjar, felix-main, logback, gpars
adrian: gob2, vte
akurtakov: eclipse-linuxtools, eclipse-mylyn, eclipse-ecf, eclipse-swtbot,
isorelax, xmlrpc, apache-sshd, eclipse-tm-terminal, cbi-plugins, glassfish-jsp,
apache-commons-el
alexl: gnome-python2-extras, alacarte, vte
alexlan: R-DynDoc, R-multtest, R-Biobase, R-BiocGenerics, tellico, R-tkWidgets,
R-widgetTools
alikins: certmaster, func
amerey: jarjar
amitshah: pius
antiaircraft: vte
anyremote: anyremote
arg: python-epdb
arobinso: eclipse-linuxtools, eclipse-mylyn, eclipse-ecf, eclipse-swtbot,
isorelax, xmlrpc, apache-sshd, eclipse-tm-terminal, cbi-plugins, glassfish-jsp,
castor-maven-plugin, apache-commons-el
aviso: python2-typing
awjb: libopensync
awood: groovy, gmavenplus-plugin, felix-main, logback, gpars
ayrx: python-ipaddress
blackfile: vte
bowlofeggs: python-ipaddress
bressers: comedilib
brouhaha: comedilib
bsjones: vte
buc: gob2
caillon: gnome-python2-extras, alacarte, vte
caniszczyk: apache-sshd
caolanm: gnome-python2-extras, alacarte, vte
carlwgeorge: percona-xtrabackup
cdamian: python-progressbar
chandankumar: python2-typing
cheese: libopensync
cheimes: python-ipaddress
churchyard: relaxngDatatype, isorelax
cipherboy: relaxngDatatype, isorelax, relaxngcc
clime: python-progressbar, epydoc, euca2ools, python-requestbuilder
company: gstreamer-python
cottsay: python-jenkinsapi, comedilib
cquad: relaxngcc, jboss-jstl-1.2-api
ctubbsii: curator, htrace, jline1, accumulo, jarjar
cwickert: vte
daveo: comedilib
davidcl: xom, tagsoup
dbhole: xom, felix-main, xmlrpc, logback, eclipse-mylyn, isorelax, apache-sshd,
eclipse-tm-terminal, sshj, trilead-ssh2, java-base64, gpars, eclipse-linuxtools,
jsch-agent-proxy, cbi-plugins, gmavenplus-plugin, relaxngDatatype,
apache-commons-el, eclipse-ecf, eclipse-swtbot, gnu-regexp, groovy,
glassfish-jsp, tagsoup, jarjar
dcallagh: python-krbV
dchen: isorelax, relaxngcc, xom, stringtemplate4, tagsoup, relaxngDatatype, jarjar
decathorpe: relaxngDatatype, isorelax
dfateyev: cfv
dgoodwin: groovy, gmavenplus-plugin, felix-main, logback, gpars
dmoluguw: relaxngDatatype, isorelax, relaxngcc
drsmith2: jarjar
dturecek: python-progressbar, epydoc, euca2ools, python-requestbuilder
dwalluck: apache-commons-discovery
ebaron: eclipse-linuxtools, eclipse-mylyn, eclipse-ecf, eclipse-swtbot, xmlrpc,
apache-sshd, eclipse-tm-terminal, cbi-plugins, glassfish-jsp, apache-commons-el
echevemaster: vte
eclipse-sig: jetty-distribution-remote-resources, jetty8, eclipse-egit-github,
xmlrpc, eclipse-mylyn, isorelax, geronimo-jaspic-spec, eclipse-mpc,
eclipse-tm-terminal, apache-sshd, jetty-alpn, jboss-websocket-1.0-api,
jetty-schemas, eclipse-linuxtools, apache-commons-discovery, jetty-test-helper,
eclipse-pydev, cbi-plugins, eclipse-eclemma, apache-commons-el, maven-mapping,
jetty-version-maven-plugin, eclipse-ecf, eclipse-swtbot, eclipse-dtp,
gnu-regexp, eclipse-packagekit, glassfish-jsp
edewata: relaxngDatatype, isorelax, relaxngcc
elanthis: vte
elsupergomez: vte
epienbro: gob2
fab: umit, fuse-python
fale: pius
fche: jarjar
filabrazilska: python-cassandra-driver
fnasser: apache-commons-el, apache-commons-discovery, isorelax
frostyx: python-progressbar, epydoc, euca2ools, python-requestbuilder
fujiwara: gob2
galileo: eclipse-dtp, apache-commons-discovery
gemi: vte
giallu: jmdns
gil: isorelax, relaxngcc, apache-sshd, stringtemplate4, relaxngDatatype, xmlrpc
gnat: python-gnutls
gnome-sig: gnome-python2-extras, vte
greghellings: python-krbV, jline1
grenier: fuse-python
grover: epydoc
guidograzioli: apache-sshd
herlo: python-krbV
hguemar: vte
hhorak: c3p0, cassandra, groovy, python-cassandra-driver, gmavenplus-plugin,
jBCrypt, jarjar, mchange-commons, felix-main, logback, gpars
hubbitus: jarjar, groovy, java-base64, gpars
ianweller: python-backports-ssl_match_hostname
ignatenkobrain: epydoc
imcleod: python-progressbar, euca2ools, python-requestbuilder
immanetize: percona-xtrabackup
imntreal: drobo-utils
infra-sig: python-backports-ssl_match_hostname, python-ipaddress, python-tbgrep
irina: python-qpid, epydoc, qpid-cpp
itamarjp: system-config-keyboard, python-ipaddress, vte
ivazquez: gtkparasite, moin
jakub: gcc-python-plugin
jamielinux: jarjar
java-sig: c3p0, groovy, gmavenplus-plugin, jarjar, mchange-commons, felix-main,
logback, gpars
jcapik: apache-sshd, relaxngDatatype, isorelax
jcline: python-backports-ssl_match_hostname, python-ipaddress
jeffreyness: percona-xtrabackup
jerboaa: eclipse-linuxtools, eclipse-mylyn, eclipse-ecf, eclipse-swtbot,
isorelax, xmlrpc, apache-sshd, eclipse-tm-terminal, eclipse-packagekit,
cbi-plugins, glassfish-jsp, eclipse-eclemma, relaxngDatatype, apache-commons-el,
eclipse-moreunit, jarjar
jfilak: jsch-agent-proxy, groovy, gmavenplus-plugin, sshj, trilead-ssh2,
felix-main, java-base64, logback, gpars
jgu: java-base64
jhrozek: dwdiff, fsniper, arptools
jistone: jarjar
jjames: epydoc, stringtemplate4
jjanco: c3p0, cassandra, groovy, python-cassandra-driver, gmavenplus-plugin,
jBCrypt, jarjar, mchange-commons, felix-main, logback, gpars
jjelen: relaxngDatatype, relaxngcc, jboss-jstl-1.2-api
jjohnstn: eclipse-linuxtools, eclipse-mylyn, eclipse-ecf, eclipse-swtbot,
isorelax, xmlrpc, apache-sshd, eclipse-tm-terminal, xom, eclipse-pydev, tagsoup,
cbi-plugins, glassfish-jsp, apache-commons-el, jarjar
jkastner: stringtemplate4
johnp: gnome-python2-extras, alacarte, vte
jonny: groovy, gmavenplus-plugin, felix-main, java-base64, logback, gpars
jpokorny: relaxngDatatype, isorelax
jraber: gnome-python2-extras, PyRTF
jreznik: kig, kross-interpreters
jskarvad: python-sudsds, comedilib
jspaleta: gnome-python2-extras, PyRTF
jstribny: rubygem-rbovirt
juergh: python-progressbar, euca2ools, python-requestbuilder
jussilehtola: tagsoup
jvanek: gpars, system-switch-java, groovy, tagsoup, java-base64, jarjar
kdaniel: jetty-distribution-remote-resources, xmlrpc, eclipse-mylyn, isorelax,
geronimo-jaspic-spec, eclipse-mpc, apache-sshd, eclipse-tm-terminal, jetty-alpn,
jboss-websocket-1.0-api, jetty-schemas, eclipse-linuxtools, jetty-test-helper,
cbi-plugins, eclipse-eclemma, apache-commons-el, maven-mapping, eclipse-ecf,
eclipse-swtbot, eclipse-dtp, eclipse-packagekit, glassfish-jsp
kde-sig: kig, kross-interpreters
kevin: python-openid, vte
krnowak: vte
kwizart: fuse-python
laxathom: vte
lbazan: gpars, groovy, vte, python-chm, java-base64, jarjar
lberk: jarjar
leamas: relaxngDatatype
lef: metainf-services, kohsuke-pom, xmlrpc, eclipse-mylyn, isorelax, c3p0,
relaxngcc, apache-sshd, eclipse-tm-terminal, mchange-commons,
eclipse-linuxtools, stringtemplate4, cbi-plugins, relaxngDatatype,
jboss-jstl-1.2-api, apache-commons-el, eclipse-ecf, eclipse-swtbot,
glassfish-jsp, castor-maven-plugin, jarjar
leospol: python-nitrate
limb: vte
lkf: vte
lkundrak: apache-commons-discovery, python-cassandra-driver
louizatakk: python2-typing
lupinix: qtermwidget-qt4, nfft
luya: epydoc
lxqt-sig: qtermwidget-qt4
marionline: fishpoll
martinlanghoff: pilas
mbarnes: alacarte, vte
mbooth: xom, jetty-distribution-remote-resources, felix-main, xmlrpc, logback,
eclipse-mylyn, isorelax, geronimo-jaspic-spec, jetty-alpn, apache-sshd,
eclipse-tm-terminal, jboss-websocket-1.0-api, sshj, trilead-ssh2, java-base64,
jetty-schemas, gpars, eclipse-linuxtools, jsch-agent-proxy,
apache-commons-discovery, jetty-test-helper, cbi-plugins, gmavenplus-plugin,
apache-commons-el, maven-mapping, eclipse-ecf, eclipse-swtbot, eclipse-dtp,
gnu-regexp, groovy, glassfish-jsp, tagsoup, jarjar
mcrha: gob2, libopensync
mdbooth: fuse-python
melmorabity: python-sexy, notify-python
mfrodl: python-nitrate
mikedep333: gnome-python2-extras
milleruntime: jarjar, accumulo, curator, htrace
mitr: python2-typing, python-sexy
mizdebsk: apache-commons-csv, jenkins-version-number, metainf-services,
robust-http-client, xom, kohsuke-pom, jetty-distribution-remote-resources,
jetty8, xmlrpc, felix-main, libpam4j, logback, jenkins, htrace,
stapler-adjunct-timeline, eclipse-mylyn, trilead-putty-extension, zinc,
isorelax, geronimo-jaspic-spec, jetty-alpn, jmdns, apache-sshd, sezpoz,
eclipse-tm-terminal, jboss-websocket-1.0-api, jBCrypt, bridge-method-injector,
sshj, trilead-ssh2, jenkins-xstream, java-base64, jetty-schemas, apache-mina,
gpars, eclipse-linuxtools, jsch-agent-proxy, apache-commons-discovery,
jetty-test-helper, annotation-indexer, stringtemplate4, groovy-sandbox,
gmavenplus-plugin, relaxngDatatype, jline1, acegisecurity, apache-commons-el,
accumulo, jruby-maven-plugins, maven-mapping, access-modifier-annotation,
jetty-version-maven-plugin, jenkins-executable-war, eclipse-ecf, eclipse-swtbot,
js-CodeMirror, gnu-regexp, jenkins-winstone, groovy, glassfish-jsp, pegdown,
tagsoup, bundling-detection-java, constant-pool-scanner, jenkins-task-reactor,
bytecode-compatibility-transformer, akuma, localizer, jarjar
mjakubicek: stringtemplate4, c3p0, mchange-commons
mjw: jarjar
mkrizek: fuse-python
mlombard: epydoc
mluscon: jline1
mmahut: comedilib
mmcgrath: moin
mmraka: mchange-commons, jboss-jstl-1.2-api
moceap: vte
moezroy: fuse-python, vte
mrunge: libeio
mruszczyk: pycdio
mschorm: c3p0, groovy, gmavenplus-plugin, mchange-commons, felix-main, logback,
gpars
msimacek: apache-sshd, relaxngDatatype, isorelax, XmlSchema
msuchy: python-progressbar, epydoc, euca2ools, python-requestbuilder
mtasaka: vte
narasim: python-chm
neugens: relaxngDatatype
ngompa: python2-typing, vte, jarjar
nguzman: eclipse-linuxtools, eclipse-mylyn, eclipse-ecf, eclipse-swtbot,
isorelax, apache-sshd, eclipse-tm-terminal, cbi-plugins, xmlrpc
nobrakal: freemedforms
nodejs-sig: jarjar
noodles: python-ipaddress
nphilipp: system-config-keyboard
npmccallum: python-ipaddress
nsantos: python-qpid, epydoc, qpid-cpp
nushio: vte
odubaj: c3p0, groovy, gmavenplus-plugin, jarjar, mchange-commons, felix-main,
logback, gpars
oliver: eclipse-linuxtools, eclipse-mylyn, eclipse-ecf, eclipse-swtbot, xmlrpc,
apache-sshd, eclipse-tm-terminal, cbi-plugins, glassfish-jsp, apache-commons-el
omajid: metainf-services, kohsuke-pom, tagsoup, system-switch-java, xmlrpc
orion: eclipse-linuxtools, eclipse-mylyn, libeio, eclipse-ecf, eclipse-swtbot,
xmlrpc, apache-sshd, eclipse-tm-terminal, xom, groovy, cbi-plugins, tagsoup,
gmavenplus-plugin, jarjar, felix-main, logback, gpars
patches: jmdns, python-pysmell, jarjar
pcpa: tagsoup
pertusus: python-chm
pgordon: gnome-python2-extras, PyRTF
phuang: gob2
pingou: isorelax
pjones: python-epdb
pmackinn: jetty-version-maven-plugin, apache-commons-discovery, emma, c3p0,
glassfish-jsp, jetty8, mchange-commons
pmikova: jarjar
ppisar: vte
praiskup: python-progressbar, python-requestbuilder, epydoc,
python-cassandra-driver, euca2ools
pspacek: python2-typing
ptoscano: fuse-python
puiterwijk: python-openid
pviktori: python-progressbar
pwouters: python2-typing, python-ipaddress
python-sig: python-inifile, python2-typing, pyftpdlib, jarjar
qa-tools-sig: fuse-python
qulogic: pyftpdlib, jarjar
radekmanak: jarjar
ralph: python-ipaddress, python-tbgrep, python-sparklines,
python-backports-ssl_match_hostname, python-tw2-jquery
rathann: jarjar
raveit65: system-config-keyboard
rdieter: kig, kross-interpreters
rebus: fuse-python
rfenkhuber: jetty-test-helper, geronimo-jaspic-spec, jetty-alpn, curator,
groovy, jetty-distribution-remote-resources, gmavenplus-plugin,
jboss-websocket-1.0-api, felix-main, maven-mapping, logback, jetty-schemas, gpars
rgrunber: eclipse-linuxtools, eclipse-mylyn, eclipse-ecf, eclipse-swtbot,
isorelax, eclipse-mpc, apache-sshd, eclipse-tm-terminal, xmlrpc,
eclipse-packagekit, cbi-plugins, glassfish-jsp, eclipse-eclemma, apache-commons-el
rhughes: gnome-python2-extras, alacarte, vte
rimolive: cassandra, groovy, python-cassandra-driver, gmavenplus-plugin,
jBCrypt, jarjar, felix-main, logback, gpars
rjones: fuse-python
rkennke: relaxngDatatype
rmyers: eclipse-linuxtools, eclipse-mylyn, eclipse-ecf, eclipse-swtbot,
isorelax, apache-sshd, eclipse-tm-terminal, cbi-plugins, xmlrpc
rnorwood: vte
robert: rootfs-resize, certmaster, func
rstrode: gnome-python2-extras, vte
sagarun: python-backports-ssl_match_hostname, python-ipaddress
salimma: python-application
scox: jarjar
sdgathman: stringtemplate4
sdz: jBCrypt, python-oauth
sgallagh: python-flup
sharkcz: vte, comedilib
skottler: jline1
slaanesh: epydoc
slankes: gitosis
smakarov: jarjar
sopotc: eclipse-linuxtools, eclipse-mylyn, eclipse-ecf, eclipse-swtbot,
isorelax, apache-sshd, eclipse-tm-terminal, cbi-plugins, xmlrpc
spike: apache-commons-el, apache-commons-csv, apache-commons-discovery
spot: R-DynDoc, R-Biobase, R-BiocGenerics, R-tkWidgets, R-Biostrings, R-IRanges,
R-GenomicRanges, vte, R-widgetTools
ssp: gnome-python2-extras, alacarte, vte
stevetraylen: ginfo
stewardship-sig: relaxngDatatype, isorelax, relaxngcc
survient: percona-xtrabackup
tc01: relaxngDatatype, isorelax
tdawson: rubygem-rbovirt
tflink: fuse-python
thias: epydoc
thozza: jmdns
tieugene: qtermwidget-qt4
tomspur: gstreamer-python, patcher
tpokorra: vte
trepik: groovy, gmavenplus-plugin, felix-main, logback, gpars
tstclair: jline1, curator
twoerner: system-config-keyboard
vakwetu: relaxngDatatype, relaxngcc
vjancik: jarjar
vladimirk: eclipse-linuxtools, eclipse-mylyn, eclipse-ecf, eclipse-swtbot,
eclipse-tm-terminal, cbi-plugins, xmlrpc
wakko666: certmaster, func
walters: stringtemplate4
wcohen: jarjar
weli: xom, tagsoup, relaxngDatatype, jarjar, maven-mapping
williamjmorenor: jarjar
xenithorb: vte
yaderv: vte
yyang: isorelax
zbyszek: jarjar, groovy, java-base64, gpars
--
The script creating this output is run and developed by Fedora
Release Engineering. Please report issues at its pagure instance:
https://pagure.io/releng/
The sources of this script can be found at:
https://pagure.io/releng/blob/master/f/scripts/find_unblocked_orphans.py
--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org
Saturday, September 28, 2019
[USN-4141-1] Exim vulnerability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=BY/S
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-4141-1
September 28, 2019
exim4 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.04
Summary:
Exim could be made to crash or run programs if it received specially
crafted network traffic.
Software Description:
- exim4: Exim is a mail transport agent
Details:
It was discovered that Exim incorrectly handled certain string operations.
A remote attacker could use this issue to cause Exim to crash, resulting in
a denial of service, or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 19.04:
exim4-daemon-heavy 4.92-4ubuntu1.4
exim4-daemon-light 4.92-4ubuntu1.4
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4141-1
CVE-2019-16928
Package Information:
https://launchpad.net/ubuntu/+source/exim4/4.92-4ubuntu1.4
Friday, September 27, 2019
2020 Datacenter Move: Request for comments
Fedora Infrastructure currently has the majority of its hardware in a
datacenter in Arizona, USA. Red Hat leases this space for use by a number of
teams, including Fedora. However, they've been seeking a more modern and cost
effective location for some time and have decided on one:
So, we will be migrating to a new datacenter located in Ashburn, Virginia
in 2020.
FESCo has approved a 2 week window for the actual move to take place
( https://pagure.io/fesco/issue/2221 ): 2020-06-01 to 2020-06-15.
This window is after Fedora 32 is released, but before any major
Fedora 33 Milestones.
At a high level, our current plan is:
* Setup the new datacenter with networking/storage/management
* Populate the new datacenter with new hardware to replace old hardware that
either wouldn't survive the shipping or is due to be refreshed
* Ship some small shipment of hardware from the old datacenter to the new
that are not easily duplicated like signing hardware,
alternative arch builders, etc.
* Setup and have by the early part of the outage window a
Minimum Viable Fedora Infrastructure (see below) using new hardware
and some old.
* Function in this minimal state as all the rest of the hardware is
shipped to the new datacenter.
* Re-add hardware to return to normal state.
We want to maintain continuity of service as best we can,
so we have defined a Minimal Viable Fedora which will move in advance
of the main hardware. Our intention is to reroute traffic to this setup
before moving the bulk of our hardware.
Our current list of what a Minimum Viable Fedora Infrastructure is:
* Mirroring fully functional. Users get metalinks, mirrors are crawled, etc
* The complete package lifecycle must work.
From commit to update installed on users machines.
We need this to push security and important bugfixes as well as to allow
maintainers to work toward Fedora 33.
* Our production openshift cluster must be up and running normally.
(This cluster has fas, bodhi and other important items in it)
* Builders will likely be constrained.
Ie, less of most arches.
Capacity will be re-added as soon as the hardware for it arrives.
* Rawhide composes take place as normal.
* Nameservers functional
* rabbitmq/fedora-messaging should be up and functional.
* Internal proxies must be functional (used by builders and other internal items)
* Mailing lists must be functional
* Backups must be functional
* OpenQA must be available to test updates/rawhide composes
* Wiki must be available for common bugs / qa
Other services not listed may or may not be up depending on capacity
and issues with more important services.
And explicitly some things will NOT be available during that window:
* Staging. There will be no staging, so no rolling out new services.
* Full capacity/number of builders
* External proxies in the new datacenter
* HA for some services.
We are sending this announcement not only to let you all be aware of this move,
but to help us plan. If you see some service that you think is critical
to Fedora and cannot be down for 2 weeks, and isn't listed above
please let us know so we can adjust our plans.
We want to make sure things that are critical keep running
smoothly for the Fedora community.
Feedback by next friday (2019-10-04) would be welcome.
Thanks,
Kevin for CPE and the Fedora Infrastructure team.
[announce] Next NYC*Bug: October 2nd: Plan 9: Not dead, Just Resting, by Ori Bernstein
2019-10-02 @ 18:45 - Suspenders, 108 Greenwich Street; typically on the
second floor, otherwise on the first
More Info:
https://www.nycbug.org/index?action=view&id=10672
_______________________________________________
announce mailing list
announce@lists.nycbug.org
http://lists.nycbug.org:8080/mailman/listinfo/announce
[CentOS-announce] CESA-2019:2863 Important CentOS 6 kernel Security Update
Upstream details at : https://access.redhat.com/errata/RHSA-2019:2863
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
da0ea6aacfbaf152290ea0f9602252cfb66ee8e60ae1b6b85a343b66abe102cc kernel-2.6.32-754.23.1.el6.i686.rpm
07237614f393eeda189bf84f0e031bc8f0731a0b2a9123a471059c4f826f66cd kernel-abi-whitelists-2.6.32-754.23.1.el6.noarch.rpm
64fc320c914516fcf17221e7262b1e14b4b6edf573d08e59d5d2f0793785734d kernel-debug-2.6.32-754.23.1.el6.i686.rpm
5e57fa83cac44f6e049f8e21158bf1d91c57020067074263764a8ec3c4cdc177 kernel-debug-devel-2.6.32-754.23.1.el6.i686.rpm
42ab970aa97aefe6488c67f25aef7ec62cf7287ac4e0263101afb4b3a99a347e kernel-devel-2.6.32-754.23.1.el6.i686.rpm
a6060f58b294fbd410a6e1153892195b457bd807007d210e832b493b11ab1764 kernel-doc-2.6.32-754.23.1.el6.noarch.rpm
eb601ad82870b53a6378418aee918c26772892d7515a458a3d01f9757fbef31b kernel-firmware-2.6.32-754.23.1.el6.noarch.rpm
ef9ce67b8d9f60b48246d8ea1f0914da25f85ceab7551b254be88385c9133438 kernel-headers-2.6.32-754.23.1.el6.i686.rpm
522a2bb3bc2c37dcc693290079b9bed80acb6b542bbe940a07b43c7750b1fb54 perf-2.6.32-754.23.1.el6.i686.rpm
69506e7fe97845322574786ca738aeb239592a0145dc04cad5c3256e82f3d7bb python-perf-2.6.32-754.23.1.el6.i686.rpm
x86_64:
5eed898537d4bf896d3ab6018e24c769d3c4257194135b0ff45711ca0cb53d6e kernel-2.6.32-754.23.1.el6.x86_64.rpm
07237614f393eeda189bf84f0e031bc8f0731a0b2a9123a471059c4f826f66cd kernel-abi-whitelists-2.6.32-754.23.1.el6.noarch.rpm
ee64d3a619c4fba245629a95de9e9238b50d98b3e941cab5f298b49088679f97 kernel-debug-2.6.32-754.23.1.el6.x86_64.rpm
5e57fa83cac44f6e049f8e21158bf1d91c57020067074263764a8ec3c4cdc177 kernel-debug-devel-2.6.32-754.23.1.el6.i686.rpm
2d3763ac1e3f9af4b030ee23a9a73824ea384b79dcf7d43b2e5c77468d51284d kernel-debug-devel-2.6.32-754.23.1.el6.x86_64.rpm
23b72922e977d99110d665ff830aa6f9e840a49dd237d5bb3ea7d134413b6ca9 kernel-devel-2.6.32-754.23.1.el6.x86_64.rpm
a6060f58b294fbd410a6e1153892195b457bd807007d210e832b493b11ab1764 kernel-doc-2.6.32-754.23.1.el6.noarch.rpm
eb601ad82870b53a6378418aee918c26772892d7515a458a3d01f9757fbef31b kernel-firmware-2.6.32-754.23.1.el6.noarch.rpm
715481375665d80db72dcc4d4d0bd73b4b815a3198319a7f38d277ac5bdca250 kernel-headers-2.6.32-754.23.1.el6.x86_64.rpm
1792828b2540c9674dee51fd337d2673dad1a5c77aea76e4591a4432c646cded perf-2.6.32-754.23.1.el6.x86_64.rpm
02780dcfaaf0d3e17b8a93deb9abae7b295a78b5e83d1e339af64abbe0aeeec5 python-perf-2.6.32-754.23.1.el6.x86_64.rpm
Source:
20c4ca9e64e80208c554c7d48d75e0aa16cdae043b9d5d3fa84398be99993f5b kernel-2.6.32-754.23.1.el6.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CEBA-2019:2891 CentOS 6 java-1.7.0-openjdk BugFix Update
Upstream details at : https://access.redhat.com/errata/RHBA-2019:2891
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
319a90e72a15bd70ddd592a57ca9c5ee3b5eef1497b5ab1693bfb4c023ee3580 java-1.7.0-openjdk-1.7.0.231-2.6.19.2.el6_10.i686.rpm
2bb7bca8ae53a44a8deca9ca57c3518ecf467809505dbd9dfca754f22d9cbfe1 java-1.7.0-openjdk-demo-1.7.0.231-2.6.19.2.el6_10.i686.rpm
06ae389e27ba3491dbe01213fcc51a4e4ac271173f3a28a5fe9d266f593d20c1 java-1.7.0-openjdk-devel-1.7.0.231-2.6.19.2.el6_10.i686.rpm
699989734477a82b447e0f603181acca567a6e605c4943b83884726e401fda17 java-1.7.0-openjdk-javadoc-1.7.0.231-2.6.19.2.el6_10.noarch.rpm
ece468e92a8adab98fe6dbc9a4a3a9c8435890daeec577b0ed1256b70c47b95f java-1.7.0-openjdk-src-1.7.0.231-2.6.19.2.el6_10.i686.rpm
x86_64:
ab7fb8cd5e6f56321976c19bb394034682e1ae8e4ee679d0aca62330e35263d1 java-1.7.0-openjdk-1.7.0.231-2.6.19.2.el6_10.x86_64.rpm
ab744a5befd00a08ed4310b824b0341f039c143b4528bea3afbb03b9c14bc5ff java-1.7.0-openjdk-demo-1.7.0.231-2.6.19.2.el6_10.x86_64.rpm
34ef747b15d3ec9c0e08201b8eb56273d4f254d94cf510f7ac4d8f0441b92640 java-1.7.0-openjdk-devel-1.7.0.231-2.6.19.2.el6_10.x86_64.rpm
699989734477a82b447e0f603181acca567a6e605c4943b83884726e401fda17 java-1.7.0-openjdk-javadoc-1.7.0.231-2.6.19.2.el6_10.noarch.rpm
d239c74cfcbf4716bef5b3934b3b73c86106c25e3f0222827efb520c15373700 java-1.7.0-openjdk-src-1.7.0.231-2.6.19.2.el6_10.x86_64.rpm
Source:
99bb6971da45c467606b7958b31630d2eb7eca32f7de8e45b0773386424bbd35 java-1.7.0-openjdk-1.7.0.231-2.6.19.2.el6_10.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CESA-2019:2892 Important CentOS 6 qemu-kvm Security Update
Upstream details at : https://access.redhat.com/errata/RHSA-2019:2892
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
cbdd0a2b3901cc5811cb496a8fa6b99aff4a9bcbcc8b2b58ea620ed81df15167 qemu-guest-agent-0.12.1.2-2.506.el6_10.5.i686.rpm
x86_64:
7e443452a2fe9ca60857df2bc6a8a550d88ba9720ca661f7cf8282f894cae417 qemu-guest-agent-0.12.1.2-2.506.el6_10.5.x86_64.rpm
b022f30053fe39f1c48befef9dfaac7c2727057d3b893a789a3fc6b22be85255 qemu-img-0.12.1.2-2.506.el6_10.5.x86_64.rpm
8b01a7afaf20df0dde47421724aad19cfbece79f4da48b03843c99a5c6db805c qemu-kvm-0.12.1.2-2.506.el6_10.5.x86_64.rpm
0e75a9c3f7326276bf1b9af4e316d1e647af17d51f7f1c38211efe07fade537e qemu-kvm-tools-0.12.1.2-2.506.el6_10.5.x86_64.rpm
Source:
f6be77746bbe7d72c265f13a94116d9f79db13e70dec622d691dfb455df0fd9b qemu-kvm-0.12.1.2-2.506.el6_10.5.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CESA-2019:2885 Important CentOS 6 dovecot Security Update
Upstream details at : https://access.redhat.com/errata/RHSA-2019:2885
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
cf00b843290dbbe275fb39cef7ceb3b5e6eb7c5454827c41f18fa7b9b553a1ad dovecot-2.0.9-22.el6_10.1.i686.rpm
fd40138f6d1cadc3730347ccd946270322dee6afca12e6ad97918a061a82bccc dovecot-devel-2.0.9-22.el6_10.1.i686.rpm
9df914aba8220f903d677df930379f75e24710d3a4ca0378826c669d31bf7156 dovecot-mysql-2.0.9-22.el6_10.1.i686.rpm
0e4281ce1a4193a3e67657913d56ea029767d2be7d498ee8972274f5f9830cc5 dovecot-pgsql-2.0.9-22.el6_10.1.i686.rpm
e5ce3ee0a0337ce934d5ccaecd4bf5abb9b9a07b9242b6df47770bd26f3ab5fe dovecot-pigeonhole-2.0.9-22.el6_10.1.i686.rpm
x86_64:
cf00b843290dbbe275fb39cef7ceb3b5e6eb7c5454827c41f18fa7b9b553a1ad dovecot-2.0.9-22.el6_10.1.i686.rpm
6aa62e63ef0bc80672b8240b2ce345b37c87b374188bb179c4aa89d29605de7d dovecot-2.0.9-22.el6_10.1.x86_64.rpm
94f348faef304ff4cbb629fcfdf52843a2540ec8ee11865d0b7fab5b8616f404 dovecot-devel-2.0.9-22.el6_10.1.x86_64.rpm
e4f3ed4c5faa21dc687151d005f0ffcf9b5af1d57d1394c46ae681f88e1a9dcf dovecot-mysql-2.0.9-22.el6_10.1.x86_64.rpm
407412e85d2f1d7bf71971097bb0212583b779bc078a48434c0cf23a904b73d5 dovecot-pgsql-2.0.9-22.el6_10.1.x86_64.rpm
d8e32a79ef6cd4aba21e4d14060a1b89f61e0095eb33e644cbe2cbdc268d29f9 dovecot-pigeonhole-2.0.9-22.el6_10.1.x86_64.rpm
Source:
fddf4427327e64735869935ffda5c6c9494d94271969aaa75e2803a559e31ea1 dovecot-2.0.9-22.el6_10.1.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CEBA-2019:2871 CentOS 6 tzdata BugFix Update
Upstream details at : https://access.redhat.com/errata/RHBA-2019:2871
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
b9fba7ce0be0c74ff1cd25b9c879b1c75fb353638ba75043eba27fa0e9f41a6e tzdata-2019c-1.el6.noarch.rpm
b45821a41f553a64b9ba4219395ef382fb3cb6905d838fe38df4c79a2ff2dd60 tzdata-java-2019c-1.el6.noarch.rpm
x86_64:
b9fba7ce0be0c74ff1cd25b9c879b1c75fb353638ba75043eba27fa0e9f41a6e tzdata-2019c-1.el6.noarch.rpm
b45821a41f553a64b9ba4219395ef382fb3cb6905d838fe38df4c79a2ff2dd60 tzdata-java-2019c-1.el6.noarch.rpm
Source:
3de3911c9f219193e331d899c4bede29c16e069073b5a8360eef62efa91b4045 tzdata-2019c-1.el6.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
Ubuntu 19.10 (Eoan Ermine) Beta released
Ubuntu 19.10 Desktop, Server, and Cloud products.
Codenamed "Eoan Ermine", 19.10 continues Ubuntu's proud tradition
of integrating the latest and greatest open source technologies into a
high-quality, easy-to-use Linux distribution. The team has been hard
at work through this cycle, introducing new features and fixing bugs.
This beta release includes images from not only the Ubuntu Desktop,
Server, and Cloud products, but also the Kubuntu, Lubuntu, Ubuntu
Budgie, UbuntuKylin, Ubuntu MATE, Ubuntu Studio, and Xubuntu flavours.
The beta images are known to be reasonably free of showstopper CD
build or installer bugs, while representing a very recent snapshot of
19.10 that should be representative of the features intended to ship
with the final release expected on October 17th, 2019.
Ubuntu, Ubuntu Server, Cloud Images:
Eoan Beta includes updated versions of most of our core set
of packages, including a current 5.3 kernel, and much more.
To upgrade to Ubuntu 19.10 Beta from Ubuntu 19.04, follow these
instructions:
https://help.ubuntu.com/community/EoanUpgrades
The Ubuntu 19.10 Beta images can be downloaded at:
http://releases.ubuntu.com/19.10/ (Ubuntu and Ubuntu Server on x86)
This Ubuntu Server image features the next generation Subiquity server
installer, bringing the comfortable live session and speedy install of the
Ubuntu Desktop to server users at last.
Additional images can be found at the following links:
http://cloud-images.ubuntu.com/daily/server/eoan/current/ (Cloud Images)
http://cdimage.ubuntu.com/releases/19.10/beta/ (Non-x86, and d-i Server)
http://cdimage.ubuntu.com/netboot/19.10/ (Netboot)
As fixes will be included in new images between now and release, any
daily cloud image from today or later (i.e. a serial of 20190927 or
higher) should be considered a beta image. Bugs found should be filed
against the appropriate packages or, failing that, the cloud-images
project in Launchpad.
The full release notes for Ubuntu 19.10 Beta can be found at:
https://wiki.ubuntu.com/EoanErmine/ReleaseNotes
Kubuntu:
Kubuntu is the KDE based flavour of Ubuntu. It uses the Plasma desktop
and includes a wide selection of tools from the KDE project.
The Beta images can be downloaded at:
http://cdimage.ubuntu.com/kubuntu/releases/19.10/beta/
Lubuntu:
Lubuntu is a flavor of Ubuntu which uses the Lightweight Qt Desktop
Environment (LXQt). The project's goal is to provide a lightweight
yet functional Linux distribution based on a rock-solid Ubuntu base.
The Beta images can be downloaded at:
http://cdimage.ubuntu.com/lubuntu/releases/19.10/beta/
Ubuntu Budgie:
Ubuntu Budgie is community developed desktop, integrating Budgie
Desktop Environment with Ubuntu at its core.
The Beta images can be downloaded at:
http://cdimage.ubuntu.com/ubuntu-budgie/releases/19.10/beta/
UbuntuKylin:
UbuntuKylin is a flavor of Ubuntu that is more suitable for Chinese
users.
The Beta images can be downloaded at:
http://cdimage.ubuntu.com/ubuntukylin/releases/19.10/beta/
Ubuntu MATE:
Ubuntu MATE is a flavor of Ubuntu featuring the MATE desktop
environment.
The Beta images can be downloaded at:
http://cdimage.ubuntu.com/ubuntu-mate/releases/19.10/beta/
Ubuntu Studio:
Ubuntu Studio is a flavor of Ubuntu that provides a full range of
multimedia content creation applications for each key workflows:
audio, graphics, video, photography and publishing.
The Beta images can be downloaded at:
http://cdimage.ubuntu.com/ubuntustudio/releases/19.10/beta/
Xubuntu:
Xubuntu is a flavor of Ubuntu that comes with Xfce, which is a stable,
light and configurable desktop environment.
The Beta images can be downloaded at:
http://cdimage.ubuntu.com/xubuntu/releases/19.10/beta/
Regular daily images for Ubuntu, and all flavours, can be found at:
http://cdimage.ubuntu.com
Ubuntu is a full-featured Linux distribution for clients, servers and
clouds, with a fast and easy installation and regular releases. A
tightly-integrated selection of excellent applications is included,
and an incredible variety of add-on software is just a few clicks
away.
Professional technical support is available from Canonical Limited and
hundreds of other companies around the world. For more information
about support, visit http://www.ubuntu.com/support
If you would like to help shape Ubuntu, take a look at the list of
ways you can participate at:
http://www.ubuntu.com/community/participate
Your comments, bug reports, patches and suggestions really help us to
improve this and future releases of Ubuntu. Instructions can be
found at: https://help.ubuntu.com/community/ReportingBugs
You can find out more about Ubuntu and about this beta release on our
website, IRC channel and wiki.
To sign up for future Ubuntu announcements, please subscribe to
Ubuntu's very low volume announcement list at:
http://lists.ubuntu.com/mailman/listinfo/ubuntu-announce
On behalf of the Ubuntu Release Team,
... Adam Conrad
--
ubuntu-announce mailing list
ubuntu-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-announce
Thursday, September 26, 2019
[FreeBSD-Announce] Upcoming Bay Area FreeBSD Vendor and Developer Summit
here. Join us October 11-12, 2019 in Santa Clara, CA. The Summit will
consist of 2 days of talks and working groups including sessions on
- 13.0 planning sessions
- John Baldwin on KTLS
- Mark Johnston on Syzkaller
- RISC-V
- NUMA
- and much more.
Take advantage of the opportunity to have face-to-face conversations with
others working on projects that interest you. Summits like these are the
best place for companies using FreeBSD to interact directly with the
developers to get your questions answered and your needs met.
Find out more and register at
https://www.eventbrite.com/e/2019-bay-area-freebsd-vendor-and-developer-summit-registration-70188472611
Please be sure to add yourself to the wiki once you've registered.
https://wiki.freebsd.org/DevSummit/201910
Questions? Contact devsummit@freebsd.org
We look forward to seeing you in Santa Clara.
On behalf of the October 2019 Bay Area FreeBSD Vendor and Developer Summit
Organizers,
Anne
--
Anne Dickison
Marketing Director
FreeBSD Foundation
510.332.8323
_______________________________________________
freebsd-announce@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-announce
To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"
[CentOS-announce] CESA-2019:2836 Important CentOS 7 dovecot Security Update
Upstream details at : https://access.redhat.com/errata/RHSA-2019:2836
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
11077bf3f1d84c1f6859b8fa47c9392fcd509f8d6bc7b9b988e6ed7577ed04f8 dovecot-2.2.36-3.el7_7.1.i686.rpm
b81be38ea93b76f4842626b0b3e2a1f475a961eca4438675ce1e55617e0ac97f dovecot-2.2.36-3.el7_7.1.x86_64.rpm
f0d0108c698ce4b5dd8b367e06b915582fc48afb1badc122e309786dd38674ed dovecot-devel-2.2.36-3.el7_7.1.x86_64.rpm
2ad9278d2b13cfe896e2d5a0e5b30e1bd5b223f3167c5590fe2005db80d47aa9 dovecot-mysql-2.2.36-3.el7_7.1.x86_64.rpm
4a989a65d5f0f14d8e06683f4d14b374f7b97b4267d44d23f965fec9437264b4 dovecot-pgsql-2.2.36-3.el7_7.1.x86_64.rpm
8563c958aead11645fb2f533b6b5b39360c8dc00fbe95c3819ca674ccabdcc66 dovecot-pigeonhole-2.2.36-3.el7_7.1.x86_64.rpm
Source:
e264fd90d0575f43751eb67b564a5da31dad31b8ad784219340e151fac9d7e52 dovecot-2.2.36-3.el7_7.1.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CEBA-2019:2871 CentOS 7 tzdata BugFix Update
Upstream details at : https://access.redhat.com/errata/RHBA-2019:2871
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
a467bd14a5f0fec9e6227eae6aac92c155947a102e818c2bb62e2339e44a694a tzdata-2019c-1.el7.noarch.rpm
ef0c0ac7183772b70ee519f5b9c4664f37edd34d991abe4bf3c267d88cc4c253 tzdata-java-2019c-1.el7.noarch.rpm
Source:
b42bbcf8f971442bc4d38d31f77a89a73cca3d7b1d5c4367d7c1a9f0d9154447 tzdata-2019c-1.el7.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
new non-responsive maintainer policy
This announcement is a bit late because it took a while to update the
documentation and add all the necessary templates in bugzilla.
The new policy is at [2] (diff [3]).
tl;dr:
When a maintainer is not responding to bug reports,
to start the non-responsive maintainer process,
and either orphan or take over the package, module, or container,
open a bug in bugzilla using one of the templates linked in the policy document,
and send a query to fedora-devel,
and later open a bug in the FESCo issue tracker.
Assuming FESCo approves,
the reporter gets commit access to the package after about a week,
and full reassignment or orphaning happens after 4 weeks.
The process is streamlined to require fewer steps from the reporter
and to provide quicker access to the package.
FESCo takes care of the weekly reminders through the bug on its tracker.
It is possible to start the process without becoming the new maintainer.
[1] https://pagure.io/fesco/issue/2149#comment-581834
[2] https://docs.fedoraproject.org/en-US/fesco/Policy_for_nonresponsive_package_maintainers/
[3] diff: https://pagure.io/fesco/fesco-docs/pull-request/15#request_diff
Please see the document at [2] for all the details.
Zbyszek
(on behalf of FESCo)
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org
Defining the future of the packager workflow in Fedora
At Flock, a few of us met to discuss a future vision of the packager workflow.
This discussion was triggered by the realization that a number of initiatives
are happening around packaging in Fedora but there is no real shared vision on
what we want the packager UX/workflow to be.
The lack of vision on the packager workflow means we could deploy something
today, thinking it is the improvement over the current workflow but would
prevent us from (or make it harder to) doing other changes afterwords that would
be even more beneficial..
So once that concern was raised, we took some time during the Fedora
Infrastructure hackfest to gather the people interested around a white board and
brainstorm on what a future packager workflow could look like.
We tried not to link this process to any tool in particular as well as focus on
the what and why rather than any how.
Here is what the vision we came to and that we would like to discuss:
○ Every changes to dist-git is done via pull-requests
○ Pull-requests are automatically tested
○ Every commit to dist-git (ie: PR merged) is automatically built in koji
○ Every build in koji results automatically in an update in bodhi
○ Every update in bodhi is automatically tested
○ If the tests pass, the update is automatically pushed to the repository
For this workflow to work nicely we need to fix a few things first:
- We need to work on the change logs in the spec files, as otherwise
pull-requests are going to conflict more often than not
- We need to fine a place to insert the end-user information about an update (in
the PR description?)
- When a group of people want to collectively work on a change (involving one or
more packages), they'll need a place to collaborate. This could be someone's
fork or, preferably, a fork of the project collectively maintained by that
group.
For example: the python SIG would have a group with forks of the different
python packages they are working on
- We need to figure out how to enable opening a pull-request again multiple
branches at one.
Why should we agree now on a long term vision?
A concrete example to this, I have been playing with the idea to get ride of git
branches in dist-git for a while now. Basically use git as it is meant to be
used: have one branch for development (most often master) and branch of master
when you need to, not simply because a new version of Fedora happened.
However, if we implemented this, we would break the workflow described above as
suddenly there would be no way to specify that a given PR is meant to land in a
certain version of Fedora or another (Is this PR for rawhide? F31? F30? All of
them? Some of them?).
Having this idea of where we want to go should give us a goal as well as way to
reflect if changes we think are good in isolation would actually help achieving
this vision or not.
This proposal was based on the brainstorming session a few of us had at flock,
but before we can see how to implement it we need more inputs and this is where
you come in :)
Do you like this vision? Would you change some pieces of it? Would you change it
entirely?
In an ideal world, what would packaging software look like to you?
Looking forward to the discussion,
Pierre
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org
Wednesday, September 25, 2019
[USN-4140-1] Firefox vulnerability
iQEzBAEBCgAdFiEERN//5MGgCOgyKeIFYR+97NWUbg8FAl2L5/cACgkQYR+97NWU
bg++DQf/RcBFA9aWHKCaBTn2nD63p4aT9wJcHBTFuDtJcbyCt8K1Hxq+ivAA8mji
Gsbl821yEwnkIqIVCq3xZ6I5tUw8CGcAN/qPF4Ik4KAIzM+pis1bidksQyx/dfeB
kso1uUsRGbdJls2EyLdY6eSpbfszcF81HwsWQbEoxCNNUNFOfqn96k2edkuWzcXh
xVl096ECZFH69IRZYMFSzJabpvcYoBnB3TOlK0H2pB5OlaKeRaQHJynh9iBj4pKH
hJQqrh8O5aZVLNrite8L8zrdah/eGMtmn+SlnEQLCqsNxBPtT7tptDc+dh6OQiRX
igqQh9rcvBFoNUfWi3mmSyv7onla9Q==
=tqYl
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-4140-1
September 25, 2019
firefox vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.04
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Firefox could be made to hijack the mouse pointer it if opened a malicious
website.
Software Description:
- firefox: Mozilla Open Source web browser
Details:
It was discovered that no user notification was given when pointer lock is
enabled. If a user were tricked in to opening a specially crafted website,
an attacker could potentially exploit this to hijack the mouse pointer and
confuse users.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 19.04:
firefox 69.0.1+build1-0ubuntu0.19.04.1
Ubuntu 18.04 LTS:
firefox 69.0.1+build1-0ubuntu0.18.04.1
Ubuntu 16.04 LTS:
firefox 69.0.1+build1-0ubuntu0.16.04.1
After a standard system update you need to restart Firefox to make
all the necessary changes.
References:
https://usn.ubuntu.com/4140-1
CVE-2019-11754
Package Information:
https://launchpad.net/ubuntu/+source/firefox/69.0.1+build1-0ubuntu0.19.04.1
https://launchpad.net/ubuntu/+source/firefox/69.0.1+build1-0ubuntu0.18.04.1
https://launchpad.net/ubuntu/+source/firefox/69.0.1+build1-0ubuntu0.16.04.1