X-Loop: [email protected] Subject: bug#260: gufw: segfault gufw-pkexec Reply-To: Boruch Baum <[email protected]>, [email protected] Resent-From: Boruch Baum <[email protected]> Resent-To: [email protected] Resent-CC: [email protected] Resent-Date: Thu, 15 Nov 2018 05:33:01 UTC Resent-Message-ID: <[email protected]> Resent-Sender: [email protected] X-Devuan-PR-Message: report 260 X-Devuan-PR-Package: gufw X-Devuan-PR-Keywords: Received: via spool by [email protected] id=B.154225920232377 (code B ref -1); Thu, 15 Nov 2018 05:33:01 UTC Received: (at submit) by bugs.devuan.org; 15 Nov 2018 05:20:02 +0000 Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by fulcanelli with IMAP (fetchmail-6.3.26) for <debbugs@localhost> (single-drop); Thu, 15 Nov 2018 06:20:02 +0100 (CET) Received: from mout.gmx.net (mout.gmx.net [212.227.17.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 21633F608F6 for <[email protected]>; Thu, 15 Nov 2018 06:18:56 +0100 (CET) Received: from E15-2016.optimum.net ([108.6.168.221]) by mail.gmx.com (mrgmx101 [212.227.17.174]) with ESMTPSA (Nemesis) id 0Lbi2Z-1fdQ6E0OYF-00lFEj for <[email protected]>; Thu, 15 Nov 2018 06:18:01 +0100 Date: Thu, 15 Nov 2018 00:17:58 -0500 From: Boruch Baum <[email protected]> To: Devuan Bug Tracking System <[email protected]> Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: NeoMutt/20180716 X-Provags-ID: V03:K1:1WajRs4JF5qVmTh+wW8A7XnX5keoh9FmvTRVGSl2wxD3RZrH3xT OQVDBCh+9zkWws/ETI7AoE92jTlyOG77HeUfV4Q2G1/kRzQN/ObnQbwL0vZR2cmC+Wqf6QI 63sUEIF0zTcp3u6Z9tFpzEAsvtA1TVSloZya9UJvnPGBhPVy5own55d3ShG7reBWFZzu3Wz i6jLKtAp0v6uD8xbW4j3w== X-UI-Out-Filterresults: notjunk:1;V01:K0:kU674OTrvdc=:mH2rIE/+WzMFb6VY2azwb2 guw6rNqzYbrymnjlvrSirmzKXTCAQHWrkv5mL6nDcgCPjg9t7WDck8QRMlB0ASU7R1Og9lHga EF4+atj5+ZOtnxUEmvr4I6cnvsDxzo2JB/iTHHp9AVvqnt35gGyA370q/3IhXCv9GWp87VOKo Xe7Ho2+Z9mpkOeGDLovCZCY9Tz/XZE4l1eAO+OAPL4Sv6wHHCxp69KNY2UeIP4/SKB5Y4ujyH 2Jyr233qkuJI03tYwCgXFQooBF6nkMoFxHtLg5CxxwhIl1yMwDBE8ckwSj5Z4Nx4/TXB30ElK x+D73MyfYNls4+QPtcrTM+HjFPY+BkyjEUvbZylwSJow4dxIUrmCYyhyYArUjuCdKfpk3CZRo uUKfd6XygAm1DQ4aXJWCza6hvTZW5Sf/ocpRog42iQo188Daj/NLe3M6Y0TQIImuBha0ABtZD 8bR7ARTb/O6duOUJH9aUcY2MocjgVhTEErT7sxj5G0WdZKwo0ZQVXsh6S8er5Zh5xkDv97EFv 0NEsE4wlSKg4QqqDD1jnvYAllGTHq/MLrh5CKcd5jJdYcZzb6RjpAWx2u6wN8zoF+yiCkAmHC eWmycJJ+ppWhpv7Deec0BqWUBBcF6WoRRh6w2rcsn+5xMeFNpkyDaqDdD6gR+LKGB5dZK7RfG nZTiWaml0Sjms6FbFQncIuIRul1tVQo+xzKsKD5ob9KeEVc5VhzZOPA7y3G6DUJqiGffNHeu5 biWxqMXsIiBeF3h5Ye+vTHhupleOYoipxPwdk41Q3FAUapIjlj/iNF8b+vByzO2yJWV9YD506 Lv2QYWp69ZqDdd30FNFOWjrF5KlPjkOT3/uUSJ7IgfG14dbr8xc+ozAgx3aI6R5rhzKrlxvWN /F2JLNaPbSQD9KXEiRUpctKBN3eMR/aW3U0ycubDz2OKHzQiVqM9x/dWP3Pl1v Package: gufw + On a fresh ascii install conducted less than 24 hours ago, gufw was installed, but it segfaults with the following details: /usr/bin/gufw-pkexec: line 13: 18344 Segmentation fault python3 ${LOCATIONS[${i}]} $1 + The underlying ufw firewall does function correctly, as tested from the command line. -- hkp://keys.gnupg.net CA45 09B5 5351 7C11 A9D1 7286 0036 9E45 1595 8BC0
X-Loop: [email protected] From: [email protected] (Devuan bug Tracking System) To: Boruch Baum <[email protected]> Subject: bug#260: Acknowledgement (gufw: segfault gufw-pkexec) Message-ID: <[email protected]> In-Reply-To: <[email protected]> References: <[email protected]> Precedence: bulk X-Devuan-PR-Message: ack 260 X-Devuan-PR-Package: gufw X-Devuan-PR-Keywords: Reply-To: [email protected] Thank you for the problem report you have sent regarding Devuan. This is an automatically generated reply, to let you know your message has been received. It is being forwarded to the developers mailing list for their attention; they will reply in due course. Your message has been sent to the package maintainer(s): [email protected] If you wish to submit further information on your problem, please send it to [email protected] (and *not* to [email protected]). Please do not reply to the address at the top of this message, unless you wish to report a problem with the bug-tracking system. Devuan Bugs Owner (administrator, Devuan bugs database)
X-Loop: [email protected] Subject: bug#260: Please forward upstream Reply-To: KatolaZ <[email protected]>, [email protected] Resent-From: KatolaZ <[email protected]> Resent-To: [email protected] Resent-CC: [email protected] Resent-Date: Thu, 15 Nov 2018 11:33:02 UTC Resent-Message-ID: <[email protected]> Resent-Sender: [email protected] X-Devuan-PR-Message: report 260 X-Devuan-PR-Package: gufw X-Devuan-PR-Keywords: Received: via spool by [email protected] id=B260.154228140513233 (code B ref 260); Thu, 15 Nov 2018 11:33:02 UTC Received: (at 260) by bugs.devuan.org; 15 Nov 2018 11:30:05 +0000 Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by fulcanelli with IMAP (fetchmail-6.3.26) for <debbugs@localhost> (single-drop); Thu, 15 Nov 2018 12:30:05 +0100 (CET) Received: from [127.0.0.1] (localhost [127.0.0.1]) (Authenticated sender: [email protected]) with ESMTPSA id 0C2DEF606E9 Date: Thu, 15 Nov 2018 12:24:45 +0100 From: KatolaZ <[email protected]> To: [email protected] Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="jxjchozzrd53nzcq" Content-Disposition: inline User-Agent: NeoMutt/20170113 (1.7.2) --jxjchozzrd53nzcq Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Hi, gufw in Devuan comes directly from Debian. Hence, this bug should be forwarded to bugs.debian.org Regards --jxjchozzrd53nzcq Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iF0EABECAB0WIQSOWdaqRF79tKFTPVpfILOuC18GLwUCW+1XfQAKCRBfILOuC18G L3T1AJ4rVpEJfqdxSV+QV+obH+ULvvL3VwCgjsN/gKnofarNaBlp+RHpcA/3JF8= =lYWi -----END PGP SIGNATURE----- --jxjchozzrd53nzcq--
X-Loop: [email protected] From: [email protected] (Devuan bug Tracking System) To: KatolaZ <[email protected]> Subject: bug#260: Info received (was Please forward upstream) Message-ID: <[email protected]> In-Reply-To: <[email protected]> References: <[email protected]> Precedence: bulk X-Devuan-PR-Message: ack-info 260 X-Devuan-PR-Package: gufw X-Devuan-PR-Keywords: Disabled-Doogie-Reply-To: [email protected] Thank you for the additional information you have supplied regarding this problem report. It has been forwarded to the developer(s) and to the developers mailing list to accompany the original report. Your message has been sent to the package maintainer(s): [email protected] If you wish to continue to submit further information on your problem, please send it to [email protected], as before. Please do not reply to the address at the top of this message, unless you wish to report a problem with the bug-tracking system. Devuan Bugs Owner (administrator, Devuan bugs database)
X-Loop: [email protected] Subject: bug#260: gufw: segfault gufw-pkexec Reply-To: Mark Hindley <[email protected]>, [email protected] Resent-From: Mark Hindley <[email protected]> Resent-To: [email protected] Resent-CC: [email protected] X-Loop: [email protected] Resent-Date: Wed, 08 Feb 2023 15:50:01 +0000 Resent-Message-ID: <[email protected]> Resent-Sender: [email protected] X-Devuan-PR-Message: followup 260 X-Devuan-PR-Package: gufw X-Devuan-PR-Keywords: References: <[email protected]> <[email protected]> Received: via spool by [email protected] id=B260.167587138517483 (code B ref 260); Wed, 08 Feb 2023 15:50:01 +0000 Received: (at 260) by bugs.devuan.org; 8 Feb 2023 15:49:45 +0000 Delivered-To: [email protected] Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612] by doc.devuan.org with IMAP (fetchmail-6.4.16) for <debbugs@localhost> (single-drop); Wed, 08 Feb 2023 15:49:45 +0000 (UTC) Received: from email.devuan.org by email.devuan.org with LMTP id H5H5HGvE42NMNAAAmSBk0A (envelope-from <[email protected]>) for <[email protected]>; Wed, 08 Feb 2023 15:48:59 +0000 Received: by email.devuan.org (Postfix, from userid 109) id 623C2B14; Wed, 8 Feb 2023 15:48:59 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org X-Spam-Level: X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; [email protected]; receiver=<UNKNOWN> Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86]) by email.devuan.org (Postfix) with ESMTPS id 3293C84 for <[email protected]>; Wed, 8 Feb 2023 15:48:58 +0000 (UTC) Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk) by mx.hindley.org.uk with smtp (Exim 4.84_2) (envelope-from <[email protected]>) id 1pPmgr-0004V2-25; Wed, 08 Feb 2023 15:48:57 +0000 Received: (nullmailer pid 3502 invoked by uid 1000); Wed, 08 Feb 2023 15:48:56 -0000 Date: Wed, 8 Feb 2023 15:48:56 +0000 From: Mark Hindley <[email protected]> To: Boruch Baum <[email protected]>, [email protected] Message-ID: <Y+PEaBr8iWaNj9Q/@hindley.org.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <[email protected]> Control: tags -1 moreinfo Boruch. Are you using Wayland? If so, I think this is the same as https://bugs.launchpad.net/ubuntu/+source/gui-ufw/+bug/1592380 The fix[1] is to run xhost si:localuser:root Mark [1] https://bugs.launchpad.net/ubuntu/+source/gui-ufw/+bug/1592380/comments/6
Received: (at 260) by bugs.devuan.org; 8 Feb 2023 15:49:45 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612] by doc.devuan.org with IMAP (fetchmail-6.4.16) for <debbugs@localhost> (single-drop); Wed, 08 Feb 2023 15:49:45 +0000 (UTC) Received: from email.devuan.org by email.devuan.org with LMTP id H5H5HGvE42NMNAAAmSBk0A (envelope-from <[email protected]>) for <[email protected]>; Wed, 08 Feb 2023 15:48:59 +0000 Received: by email.devuan.org (Postfix, from userid 109) id 623C2B14; Wed, 8 Feb 2023 15:48:59 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org X-Spam-Level: X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; [email protected]; receiver=<UNKNOWN> Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86]) by email.devuan.org (Postfix) with ESMTPS id 3293C84 for <[email protected]>; Wed, 8 Feb 2023 15:48:58 +0000 (UTC) Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk) by mx.hindley.org.uk with smtp (Exim 4.84_2) (envelope-from <[email protected]>) id 1pPmgr-0004V2-25; Wed, 08 Feb 2023 15:48:57 +0000 Received: (nullmailer pid 3502 invoked by uid 1000); Wed, 08 Feb 2023 15:48:56 -0000 Date: Wed, 8 Feb 2023 15:48:56 +0000 From: Mark Hindley <[email protected]> To: Boruch Baum <[email protected]>, [email protected] Subject: Re: bug#260: gufw: segfault gufw-pkexec Message-ID: <Y+PEaBr8iWaNj9Q/@hindley.org.uk> References: <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <[email protected]> X-Debbugs-No-Ack: No Thanks Control: tags -1 moreinfo Boruch. Are you using Wayland? If so, I think this is the same as https://bugs.launchpad.net/ubuntu/+source/gui-ufw/+bug/1592380 The fix[1] is to run xhost si:localuser:root Mark [1] https://bugs.launchpad.net/ubuntu/+source/gui-ufw/+bug/1592380/comments/6
X-Loop: [email protected] Subject: bug#260: gufw: segfault gufw-pkexec Reply-To: Boruch Baum <[email protected]>, [email protected] Resent-From: Boruch Baum <[email protected]> Resent-To: [email protected] Resent-CC: [email protected] X-Loop: [email protected] Resent-Date: Wed, 08 Feb 2023 18:02:01 +0000 Resent-Message-ID: <[email protected]> Resent-Sender: [email protected] X-Devuan-PR-Message: followup 260 X-Devuan-PR-Package: gufw X-Devuan-PR-Keywords: moreinfo References: <[email protected]> <Y+PEaBr8iWaNj9Q/@hindley.org.uk> <[email protected]> Received: via spool by [email protected] id=B260.16758792913506 (code B ref 260); Wed, 08 Feb 2023 18:02:01 +0000 Received: (at 260) by bugs.devuan.org; 8 Feb 2023 18:01:31 +0000 Delivered-To: [email protected] Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612] by doc.devuan.org with IMAP (fetchmail-6.4.16) for <debbugs@localhost> (single-drop); Wed, 08 Feb 2023 18:01:31 +0000 (UTC) Received: from email.devuan.org by email.devuan.org with LMTP id qMxKCWbj42MbPQAAmSBk0A (envelope-from <[email protected]>) for <[email protected]>; Wed, 08 Feb 2023 18:01:10 +0000 Received: by email.devuan.org (Postfix, from userid 109) id 198DAB14; Wed, 8 Feb 2023 18:01:10 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org X-Spam-Level: X-Spam-Status: No, score=-1.7 required=5.0 tests=FREEMAIL_FROM, RCVD_IN_DNSWL_LOW,RCVD_IN_MSPIKE_H2,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=212.227.15.18; helo=mout.gmx.net; [email protected]; receiver=<UNKNOWN> Received: from mout.gmx.net (mout.gmx.net [212.227.15.18]) by email.devuan.org (Postfix) with ESMTPS id AE2E584 for <[email protected]>; Wed, 8 Feb 2023 18:01:05 +0000 (UTC) Received: from debian-BULLSEYE-live-builder-AMD64 ([151.205.99.250]) by mail.gmx.net (mrgmx005 [212.227.17.184]) with ESMTPSA (Nemesis) id 1M4b1o-1pQMyv08SU-001lQ2; Wed, 08 Feb 2023 19:01:03 +0100 Date: Wed, 8 Feb 2023 13:01:00 -0500 From: Boruch Baum <[email protected]> To: Mark Hindley <[email protected]> Cc: [email protected] Message-ID: <20230208180100.hd7g3peilbs6phyq@debian-BULLSEYE-live-builder-AMD64> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <Y+PEaBr8iWaNj9Q/@hindley.org.uk> X-Provags-ID: V03:K1:NTxNtSn7vqWtUJOrskUjMkJc+L0GQfm7p+qYxfBcJnKGnazi0ym JauvBQPHNwrCr1lCO1No6xDd739LaLHXib5DFj/Pu+dO4nGT5dbaIZ1H5J+XhSGaZRfYYOh /cWN/fpMVwem8PIT1O0pq7Xm8uwq1B8Uf8wnuaTmvpielAHNwvoftS8ydeqv9pnIEQ5PXnw MCThvP2ldq/HSlVFTtoKg== UI-OutboundReport: notjunk:1;M01:P0:AOgVfcClkWg=;plvyLZTSnCFjW87hyOO47latirI OypuQbw/DJBrcncxWDd6x1vVsGHjyWthpIOkBzZtI6xsPy0iAsicD/EjMQIOKborFnjxtb5fv Amt0q7//hIlfcub/mD2HO2zCr0jySR6aDUe30eR2qORYscaxoVjuM4CsI/hpEdyTtqoeml1qu qO3DJBGdmedR3ikayFn/K11bLh73Jw+opOJGLHyiQmaZ0sDuaDXrkUqqvLvfR0TGKOb+9K3ve Q7r39sW0ScOQA7TPUCN93EJCf0ijp0fDWfQSQ/QV/sed3J9CebmcA8S7iM7xRdVryT/C+rnCB pdZrQ4CBOuo/YdmbkGbJ+TjmSPlV0/nx305NlzlOp8Muhi0lMEYVpXP0HggdC0clG3Peunhok kgSdhaDECHtSRWoXjepDctG1y1mbumhbgao/vZK3CSr2mkoax2SqyYqwP2NhHPLPgZ2wAXgz2 grZHRydM+DWUmLBWP2aE1MxJIJn/2rauxhMSaVGkBmnwYDj1Xff01Wxh3BH+AR55iZDEygtaz +/RqEk+JmTZgkqvmHLqW44oKC6/YokmRdnPRrznDmLeVn2HLQXxpazB94H2WZtMCL9FmQn5VZ eFsdgZhLoso30MrUDRjZHLQNE+ff3MsxdkHUBRskaFq7+Ey5KbIGvQtNEw6TudVaQLJsKA4V5 6n+ZVTE28LQM8ykz03AYYii0E399U+LuZYBSYOGc4wsIv77g0gyCREOaGM5moVz3f9cC3jroz KjExTShPPR9Rorjh5dbDdXMjtsuko1DMgBlavW9GCogQz+S62jlXjsU10V9AQ/o+k4gDQfh4o GBM0fXUvxAuBRgtDzY65KuMQ5VZdiAOXTwDqpJDYOWe133R+e57mVtmwPREwWjKVDS2/KYGPs G2n+mN5GfA39gt82rUJp3/LiUkeTvhpdZkE3rPlnaOV1COKNPo2qNjRkcjk3pWI7DV6HzP1FS VNawwA== I filed the bug report in year 2016. At this point, in year 2023, I'm not able to help. Sorry. On 2023-02-08 15:48, Mark Hindley wrote: > Control: tags -1 moreinfo > > Boruch. > > Are you using Wayland? If so, I think this is the same as > > https://bugs.launchpad.net/ubuntu/+source/gui-ufw/+bug/1592380 > > The fix[1] is to run > > xhost si:localuser:root > > Mark > > [1] https://bugs.launchpad.net/ubuntu/+source/gui-ufw/+bug/1592380/comments/6 > -- hkp://keys.gnupg.net CA45 09B5 5351 7C11 A9D1 7286 0036 9E45 1595 8BC0
Content-Disposition: inline Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Mailer: MIME-tools 5.509 (Entity 5.509) Content-Type: text/plain; charset=utf-8 X-Loop: [email protected] From: "Devuan bug Tracking System" <[email protected]> To: Boruch Baum <[email protected]> Subject: bug#260: Info received (bug#260: gufw: segfault gufw-pkexec) Message-ID: <[email protected]> References: <20230208180100.hd7g3peilbs6phyq@debian-BULLSEYE-live-builder-AMD64> X-Devuan-PR-Message: ack-info 260 X-Devuan-PR-Package: gufw X-Devuan-PR-Keywords: moreinfo Reply-To: [email protected] Date: Wed, 08 Feb 2023 18:02:02 +0000 Thank you for the additional information you have supplied regarding this bug report. This is an automatically generated reply to let you know your message has been received. Your message is being forwarded to the package maintainers and other interested parties for their attention; they will reply in due course. Your message has been sent to the package maintainer(s): [email protected] If you wish to submit further information on this problem, please send it to [email protected]. Please do not send mail to [email protected] unless you wish to report a problem with the Bug-tracking system. --=20 260: https://bugs.devuan.org/cgi/bugreport.cgi?bug=3D260 Devuan Bug Tracking System Contact [email protected] with problems
MIME-Version: 1.0 X-Mailer: MIME-tools 5.509 (Entity 5.509) X-Loop: [email protected] From: "Devuan bug Tracking System" <[email protected]> To: Mark Hindley <[email protected]> Subject: bug#260: marked as done (gufw: segfault gufw-pkexec) Message-ID: <[email protected]> References: <[email protected]> <[email protected]> X-Devuan-PR-Message: closed 260 X-Devuan-PR-Package: gufw X-Devuan-PR-Keywords: moreinfo Reply-To: [email protected] Date: Wed, 08 Feb 2023 18:32:02 +0000 Content-Type: multipart/mixed; boundary="----------=_1675881122-7262-0" This is a multi-part message in MIME format... ------------=_1675881122-7262-0 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Your message dated Wed, 8 Feb 2023 18:30:01 +0000 with message-id <[email protected]> and subject line Re: bug#260: gufw: segfault gufw-pkexec has caused the Devuan bug report #260, regarding gufw: segfault gufw-pkexec to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) --=20 260: https://bugs.devuan.org/cgi/bugreport.cgi?bug=3D260 Devuan Bug Tracking System Contact [email protected] with problems ------------=_1675881122-7262-0 Content-Type: message/rfc822 Content-Disposition: inline Content-Transfer-Encoding: 7bit Received: (at submit) by bugs.devuan.org; 15 Nov 2018 05:20:02 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by fulcanelli with IMAP (fetchmail-6.3.26) for <debbugs@localhost> (single-drop); Thu, 15 Nov 2018 06:20:02 +0100 (CET) Received: from mout.gmx.net (mout.gmx.net [212.227.17.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 21633F608F6 for <[email protected]>; Thu, 15 Nov 2018 06:18:56 +0100 (CET) Received: from E15-2016.optimum.net ([108.6.168.221]) by mail.gmx.com (mrgmx101 [212.227.17.174]) with ESMTPSA (Nemesis) id 0Lbi2Z-1fdQ6E0OYF-00lFEj for <[email protected]>; Thu, 15 Nov 2018 06:18:01 +0100 Date: Thu, 15 Nov 2018 00:17:58 -0500 From: Boruch Baum <[email protected]> To: Devuan Bug Tracking System <[email protected]> Subject: gufw: segfault gufw-pkexec Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: NeoMutt/20180716 X-Provags-ID: V03:K1:1WajRs4JF5qVmTh+wW8A7XnX5keoh9FmvTRVGSl2wxD3RZrH3xT OQVDBCh+9zkWws/ETI7AoE92jTlyOG77HeUfV4Q2G1/kRzQN/ObnQbwL0vZR2cmC+Wqf6QI 63sUEIF0zTcp3u6Z9tFpzEAsvtA1TVSloZya9UJvnPGBhPVy5own55d3ShG7reBWFZzu3Wz i6jLKtAp0v6uD8xbW4j3w== X-UI-Out-Filterresults: notjunk:1;V01:K0:kU674OTrvdc=:mH2rIE/+WzMFb6VY2azwb2 guw6rNqzYbrymnjlvrSirmzKXTCAQHWrkv5mL6nDcgCPjg9t7WDck8QRMlB0ASU7R1Og9lHga EF4+atj5+ZOtnxUEmvr4I6cnvsDxzo2JB/iTHHp9AVvqnt35gGyA370q/3IhXCv9GWp87VOKo Xe7Ho2+Z9mpkOeGDLovCZCY9Tz/XZE4l1eAO+OAPL4Sv6wHHCxp69KNY2UeIP4/SKB5Y4ujyH 2Jyr233qkuJI03tYwCgXFQooBF6nkMoFxHtLg5CxxwhIl1yMwDBE8ckwSj5Z4Nx4/TXB30ElK x+D73MyfYNls4+QPtcrTM+HjFPY+BkyjEUvbZylwSJow4dxIUrmCYyhyYArUjuCdKfpk3CZRo uUKfd6XygAm1DQ4aXJWCza6hvTZW5Sf/ocpRog42iQo188Daj/NLe3M6Y0TQIImuBha0ABtZD 8bR7ARTb/O6duOUJH9aUcY2MocjgVhTEErT7sxj5G0WdZKwo0ZQVXsh6S8er5Zh5xkDv97EFv 0NEsE4wlSKg4QqqDD1jnvYAllGTHq/MLrh5CKcd5jJdYcZzb6RjpAWx2u6wN8zoF+yiCkAmHC eWmycJJ+ppWhpv7Deec0BqWUBBcF6WoRRh6w2rcsn+5xMeFNpkyDaqDdD6gR+LKGB5dZK7RfG nZTiWaml0Sjms6FbFQncIuIRul1tVQo+xzKsKD5ob9KeEVc5VhzZOPA7y3G6DUJqiGffNHeu5 biWxqMXsIiBeF3h5Ye+vTHhupleOYoipxPwdk41Q3FAUapIjlj/iNF8b+vByzO2yJWV9YD506 Lv2QYWp69ZqDdd30FNFOWjrF5KlPjkOT3/uUSJ7IgfG14dbr8xc+ozAgx3aI6R5rhzKrlxvWN /F2JLNaPbSQD9KXEiRUpctKBN3eMR/aW3U0ycubDz2OKHzQiVqM9x/dWP3Pl1v Package: gufw + On a fresh ascii install conducted less than 24 hours ago, gufw was installed, but it segfaults with the following details: /usr/bin/gufw-pkexec: line 13: 18344 Segmentation fault python3 ${LOCATIONS[${i}]} $1 + The underlying ufw firewall does function correctly, as tested from the command line. -- hkp://keys.gnupg.net CA45 09B5 5351 7C11 A9D1 7286 0036 9E45 1595 8BC0 ------------=_1675881122-7262-0 Content-Type: message/rfc822 Content-Disposition: inline Content-Transfer-Encoding: 7bit Received: (at 260-done) by bugs.devuan.org; 8 Feb 2023 18:31:33 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612] by doc.devuan.org with IMAP (fetchmail-6.4.16) for <debbugs@localhost> (single-drop); Wed, 08 Feb 2023 18:31:33 +0000 (UTC) Received: from email.devuan.org by email.devuan.org with LMTP id 8HjpIy3q42NHPgAAmSBk0A (envelope-from <[email protected]>) for <[email protected]>; Wed, 08 Feb 2023 18:30:05 +0000 Received: by email.devuan.org (Postfix, from userid 109) id 8907FB14; Wed, 8 Feb 2023 18:30:05 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org X-Spam-Level: X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; [email protected]; receiver=<UNKNOWN> Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86]) by email.devuan.org (Postfix) with ESMTPS id 1E34A84 for <[email protected]>; Wed, 8 Feb 2023 18:30:03 +0000 (UTC) Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk) by mx.hindley.org.uk with smtp (Exim 4.84_2) (envelope-from <[email protected]>) id 1pPpCj-0005Sy-TW; Wed, 08 Feb 2023 18:30:01 +0000 Received: (nullmailer pid 19315 invoked by uid 1000); Wed, 08 Feb 2023 18:30:01 -0000 Date: Wed, 8 Feb 2023 18:30:01 +0000 From: Mark Hindley <[email protected]> To: Boruch Baum <[email protected]> Cc: [email protected] Subject: Re: bug#260: gufw: segfault gufw-pkexec Message-ID: <[email protected]> References: <[email protected]> <Y+PEaBr8iWaNj9Q/@hindley.org.uk> <20230208180100.hd7g3peilbs6phyq@debian-BULLSEYE-live-builder-AMD64> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230208180100.hd7g3peilbs6phyq@debian-BULLSEYE-live-builder-AMD64> On Wed, Feb 08, 2023 at 01:01:00PM -0500, Boruch Baum wrote: > I filed the bug report in year 2016. At this point, in year 2023, I'm > not able to help. Sorry. OK, thanks for your reply. Closing. Mark ------------=_1675881122-7262-0--
MIME-Version: 1.0 X-Mailer: MIME-tools 5.509 (Entity 5.509) X-Loop: [email protected] From: "Devuan bug Tracking System" <[email protected]> To: Boruch Baum <[email protected]> Subject: bug#260 closed by Mark Hindley <[email protected]> (Re: bug#260: gufw: segfault gufw-pkexec) Message-ID: <[email protected]> References: <[email protected]> <[email protected]> X-Devuan-PR-Message: they-closed 260 X-Devuan-PR-Package: gufw X-Devuan-PR-Keywords: moreinfo Reply-To: [email protected] Date: Wed, 08 Feb 2023 18:32:04 +0000 Content-Type: multipart/mixed; boundary="----------=_1675881124-7262-1" This is a multi-part message in MIME format... ------------=_1675881124-7262-1 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" This is an automatic notification regarding your bug report which was filed against the gufw package: #260: gufw: segfault gufw-pkexec It has been closed by Mark Hindley <[email protected]>. Their explanation is attached below along with your original report. If this explanation is unsatisfactory and you have not received a better one in a separate message then please contact Mark Hindley <mark@hin= dley.org.uk> by replying to this email. --=20 260: https://bugs.devuan.org/cgi/bugreport.cgi?bug=3D260 Devuan Bug Tracking System Contact [email protected] with problems ------------=_1675881124-7262-1 Content-Type: message/rfc822 Content-Disposition: inline Content-Transfer-Encoding: 7bit Received: (at 260-done) by bugs.devuan.org; 8 Feb 2023 18:31:33 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612] by doc.devuan.org with IMAP (fetchmail-6.4.16) for <debbugs@localhost> (single-drop); Wed, 08 Feb 2023 18:31:33 +0000 (UTC) Received: from email.devuan.org by email.devuan.org with LMTP id 8HjpIy3q42NHPgAAmSBk0A (envelope-from <[email protected]>) for <[email protected]>; Wed, 08 Feb 2023 18:30:05 +0000 Received: by email.devuan.org (Postfix, from userid 109) id 8907FB14; Wed, 8 Feb 2023 18:30:05 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org X-Spam-Level: X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; [email protected]; receiver=<UNKNOWN> Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86]) by email.devuan.org (Postfix) with ESMTPS id 1E34A84 for <[email protected]>; Wed, 8 Feb 2023 18:30:03 +0000 (UTC) Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk) by mx.hindley.org.uk with smtp (Exim 4.84_2) (envelope-from <[email protected]>) id 1pPpCj-0005Sy-TW; Wed, 08 Feb 2023 18:30:01 +0000 Received: (nullmailer pid 19315 invoked by uid 1000); Wed, 08 Feb 2023 18:30:01 -0000 Date: Wed, 8 Feb 2023 18:30:01 +0000 From: Mark Hindley <[email protected]> To: Boruch Baum <[email protected]> Cc: [email protected] Subject: Re: bug#260: gufw: segfault gufw-pkexec Message-ID: <[email protected]> References: <[email protected]> <Y+PEaBr8iWaNj9Q/@hindley.org.uk> <20230208180100.hd7g3peilbs6phyq@debian-BULLSEYE-live-builder-AMD64> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230208180100.hd7g3peilbs6phyq@debian-BULLSEYE-live-builder-AMD64> On Wed, Feb 08, 2023 at 01:01:00PM -0500, Boruch Baum wrote: > I filed the bug report in year 2016. At this point, in year 2023, I'm > not able to help. Sorry. OK, thanks for your reply. Closing. Mark ------------=_1675881124-7262-1 Content-Type: message/rfc822 Content-Disposition: inline Content-Transfer-Encoding: 7bit Received: (at submit) by bugs.devuan.org; 15 Nov 2018 05:20:02 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by fulcanelli with IMAP (fetchmail-6.3.26) for <debbugs@localhost> (single-drop); Thu, 15 Nov 2018 06:20:02 +0100 (CET) Received: from mout.gmx.net (mout.gmx.net [212.227.17.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 21633F608F6 for <[email protected]>; Thu, 15 Nov 2018 06:18:56 +0100 (CET) Received: from E15-2016.optimum.net ([108.6.168.221]) by mail.gmx.com (mrgmx101 [212.227.17.174]) with ESMTPSA (Nemesis) id 0Lbi2Z-1fdQ6E0OYF-00lFEj for <[email protected]>; Thu, 15 Nov 2018 06:18:01 +0100 Date: Thu, 15 Nov 2018 00:17:58 -0500 From: Boruch Baum <[email protected]> To: Devuan Bug Tracking System <[email protected]> Subject: gufw: segfault gufw-pkexec Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: NeoMutt/20180716 X-Provags-ID: V03:K1:1WajRs4JF5qVmTh+wW8A7XnX5keoh9FmvTRVGSl2wxD3RZrH3xT OQVDBCh+9zkWws/ETI7AoE92jTlyOG77HeUfV4Q2G1/kRzQN/ObnQbwL0vZR2cmC+Wqf6QI 63sUEIF0zTcp3u6Z9tFpzEAsvtA1TVSloZya9UJvnPGBhPVy5own55d3ShG7reBWFZzu3Wz i6jLKtAp0v6uD8xbW4j3w== X-UI-Out-Filterresults: notjunk:1;V01:K0:kU674OTrvdc=:mH2rIE/+WzMFb6VY2azwb2 guw6rNqzYbrymnjlvrSirmzKXTCAQHWrkv5mL6nDcgCPjg9t7WDck8QRMlB0ASU7R1Og9lHga EF4+atj5+ZOtnxUEmvr4I6cnvsDxzo2JB/iTHHp9AVvqnt35gGyA370q/3IhXCv9GWp87VOKo Xe7Ho2+Z9mpkOeGDLovCZCY9Tz/XZE4l1eAO+OAPL4Sv6wHHCxp69KNY2UeIP4/SKB5Y4ujyH 2Jyr233qkuJI03tYwCgXFQooBF6nkMoFxHtLg5CxxwhIl1yMwDBE8ckwSj5Z4Nx4/TXB30ElK x+D73MyfYNls4+QPtcrTM+HjFPY+BkyjEUvbZylwSJow4dxIUrmCYyhyYArUjuCdKfpk3CZRo uUKfd6XygAm1DQ4aXJWCza6hvTZW5Sf/ocpRog42iQo188Daj/NLe3M6Y0TQIImuBha0ABtZD 8bR7ARTb/O6duOUJH9aUcY2MocjgVhTEErT7sxj5G0WdZKwo0ZQVXsh6S8er5Zh5xkDv97EFv 0NEsE4wlSKg4QqqDD1jnvYAllGTHq/MLrh5CKcd5jJdYcZzb6RjpAWx2u6wN8zoF+yiCkAmHC eWmycJJ+ppWhpv7Deec0BqWUBBcF6WoRRh6w2rcsn+5xMeFNpkyDaqDdD6gR+LKGB5dZK7RfG nZTiWaml0Sjms6FbFQncIuIRul1tVQo+xzKsKD5ob9KeEVc5VhzZOPA7y3G6DUJqiGffNHeu5 biWxqMXsIiBeF3h5Ye+vTHhupleOYoipxPwdk41Q3FAUapIjlj/iNF8b+vByzO2yJWV9YD506 Lv2QYWp69ZqDdd30FNFOWjrF5KlPjkOT3/uUSJ7IgfG14dbr8xc+ozAgx3aI6R5rhzKrlxvWN /F2JLNaPbSQD9KXEiRUpctKBN3eMR/aW3U0ycubDz2OKHzQiVqM9x/dWP3Pl1v Package: gufw + On a fresh ascii install conducted less than 24 hours ago, gufw was installed, but it segfaults with the following details: /usr/bin/gufw-pkexec: line 13: 18344 Segmentation fault python3 ${LOCATIONS[${i}]} $1 + The underlying ufw firewall does function correctly, as tested from the command line. -- hkp://keys.gnupg.net CA45 09B5 5351 7C11 A9D1 7286 0036 9E45 1595 8BC0 ------------=_1675881124-7262-1--
Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997 nCipher Corporation Ltd,
1994-97 Ian Jackson.
Devuan Bugs Owner <[email protected]>.
Last modified:
Sun, 1 Dec 2024 02:39:01 UTC