Devuan bug report logs - #260
gufw: segfault gufw-pkexec

Package: gufw; Reported by: Boruch Baum <[email protected]>; Keywords: moreinfo; Done: Mark Hindley <[email protected]>; Maintainer for gufw is (unknown).

Message received at [email protected]:


Received: (at 260-done) by bugs.devuan.org; 8 Feb 2023 18:31:33 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Wed, 08 Feb 2023 18:31:33 +0000 (UTC)
Received: from email.devuan.org
	by email.devuan.org with LMTP
	id 8HjpIy3q42NHPgAAmSBk0A
	(envelope-from <[email protected]>)
	for <[email protected]>; Wed, 08 Feb 2023 18:30:05 +0000
Received: by email.devuan.org (Postfix, from userid 109)
	id 8907FB14; Wed,  8 Feb 2023 18:30:05 +0000 (UTC)
X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org
X-Spam-Level: 
X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS
	autolearn=no autolearn_force=no version=3.4.6
Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; [email protected]; receiver=<UNKNOWN> 
Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86])
	by email.devuan.org (Postfix) with ESMTPS id 1E34A84
	for <[email protected]>; Wed,  8 Feb 2023 18:30:03 +0000 (UTC)
Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk)
	by mx.hindley.org.uk with smtp (Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1pPpCj-0005Sy-TW; Wed, 08 Feb 2023 18:30:01 +0000
Received: (nullmailer pid 19315 invoked by uid 1000);
	Wed, 08 Feb 2023 18:30:01 -0000
Date: Wed, 8 Feb 2023 18:30:01 +0000
From: Mark Hindley <[email protected]>
To: Boruch Baum <[email protected]>
Cc: [email protected]
Subject: Re: bug#260: gufw: segfault gufw-pkexec
Message-ID: <[email protected]>
References: <[email protected]>
 <Y+PEaBr8iWaNj9Q/@hindley.org.uk>
 <20230208180100.hd7g3peilbs6phyq@debian-BULLSEYE-live-builder-AMD64>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20230208180100.hd7g3peilbs6phyq@debian-BULLSEYE-live-builder-AMD64>

On Wed, Feb 08, 2023 at 01:01:00PM -0500, Boruch Baum wrote:
> I filed the bug report in year 2016. At this point, in year 2023, I'm
> not able to help. Sorry.

OK, thanks for your reply.

Closing.

Mark

Notification sent to Boruch Baum <[email protected]>:
bug acknowledged by developer. Full text available.
Reply sent to Mark Hindley <[email protected]>:
You have taken responsibility. Full text available.

Message received at [email protected]:


Received: (at 260) by bugs.devuan.org; 8 Feb 2023 18:01:31 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Wed, 08 Feb 2023 18:01:31 +0000 (UTC)
Received: from email.devuan.org
	by email.devuan.org with LMTP
	id qMxKCWbj42MbPQAAmSBk0A
	(envelope-from <[email protected]>)
	for <[email protected]>; Wed, 08 Feb 2023 18:01:10 +0000
Received: by email.devuan.org (Postfix, from userid 109)
	id 198DAB14; Wed,  8 Feb 2023 18:01:10 +0000 (UTC)
X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org
X-Spam-Level: 
X-Spam-Status: No, score=-1.7 required=5.0 tests=FREEMAIL_FROM,
	RCVD_IN_DNSWL_LOW,RCVD_IN_MSPIKE_H2,SPF_PASS autolearn=ham
	autolearn_force=no version=3.4.6
Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=212.227.15.18; helo=mout.gmx.net; [email protected]; receiver=<UNKNOWN> 
Received: from mout.gmx.net (mout.gmx.net [212.227.15.18])
	by email.devuan.org (Postfix) with ESMTPS id AE2E584
	for <[email protected]>; Wed,  8 Feb 2023 18:01:05 +0000 (UTC)
Received: from debian-BULLSEYE-live-builder-AMD64 ([151.205.99.250]) by
 mail.gmx.net (mrgmx005 [212.227.17.184]) with ESMTPSA (Nemesis) id
 1M4b1o-1pQMyv08SU-001lQ2; Wed, 08 Feb 2023 19:01:03 +0100
Date: Wed, 8 Feb 2023 13:01:00 -0500
From: Boruch Baum <[email protected]>
To: Mark Hindley <[email protected]>
Cc: [email protected]
Subject: Re: bug#260: gufw: segfault gufw-pkexec
Message-ID: <20230208180100.hd7g3peilbs6phyq@debian-BULLSEYE-live-builder-AMD64>
References: <[email protected]>
 <Y+PEaBr8iWaNj9Q/@hindley.org.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <Y+PEaBr8iWaNj9Q/@hindley.org.uk>
X-Provags-ID: V03:K1:NTxNtSn7vqWtUJOrskUjMkJc+L0GQfm7p+qYxfBcJnKGnazi0ym
 JauvBQPHNwrCr1lCO1No6xDd739LaLHXib5DFj/Pu+dO4nGT5dbaIZ1H5J+XhSGaZRfYYOh
 /cWN/fpMVwem8PIT1O0pq7Xm8uwq1B8Uf8wnuaTmvpielAHNwvoftS8ydeqv9pnIEQ5PXnw
 MCThvP2ldq/HSlVFTtoKg==
UI-OutboundReport: notjunk:1;M01:P0:AOgVfcClkWg=;plvyLZTSnCFjW87hyOO47latirI
 OypuQbw/DJBrcncxWDd6x1vVsGHjyWthpIOkBzZtI6xsPy0iAsicD/EjMQIOKborFnjxtb5fv
 Amt0q7//hIlfcub/mD2HO2zCr0jySR6aDUe30eR2qORYscaxoVjuM4CsI/hpEdyTtqoeml1qu
 qO3DJBGdmedR3ikayFn/K11bLh73Jw+opOJGLHyiQmaZ0sDuaDXrkUqqvLvfR0TGKOb+9K3ve
 Q7r39sW0ScOQA7TPUCN93EJCf0ijp0fDWfQSQ/QV/sed3J9CebmcA8S7iM7xRdVryT/C+rnCB
 pdZrQ4CBOuo/YdmbkGbJ+TjmSPlV0/nx305NlzlOp8Muhi0lMEYVpXP0HggdC0clG3Peunhok
 kgSdhaDECHtSRWoXjepDctG1y1mbumhbgao/vZK3CSr2mkoax2SqyYqwP2NhHPLPgZ2wAXgz2
 grZHRydM+DWUmLBWP2aE1MxJIJn/2rauxhMSaVGkBmnwYDj1Xff01Wxh3BH+AR55iZDEygtaz
 +/RqEk+JmTZgkqvmHLqW44oKC6/YokmRdnPRrznDmLeVn2HLQXxpazB94H2WZtMCL9FmQn5VZ
 eFsdgZhLoso30MrUDRjZHLQNE+ff3MsxdkHUBRskaFq7+Ey5KbIGvQtNEw6TudVaQLJsKA4V5
 6n+ZVTE28LQM8ykz03AYYii0E399U+LuZYBSYOGc4wsIv77g0gyCREOaGM5moVz3f9cC3jroz
 KjExTShPPR9Rorjh5dbDdXMjtsuko1DMgBlavW9GCogQz+S62jlXjsU10V9AQ/o+k4gDQfh4o
 GBM0fXUvxAuBRgtDzY65KuMQ5VZdiAOXTwDqpJDYOWe133R+e57mVtmwPREwWjKVDS2/KYGPs
 G2n+mN5GfA39gt82rUJp3/LiUkeTvhpdZkE3rPlnaOV1COKNPo2qNjRkcjk3pWI7DV6HzP1FS
 VNawwA==

I filed the bug report in year 2016. At this point, in year 2023, I'm
not able to help. Sorry.

On 2023-02-08 15:48, Mark Hindley wrote:
> Control: tags -1 moreinfo
>
> Boruch.
>
> Are you using Wayland? If so, I think this is the same as
>
>  https://bugs.launchpad.net/ubuntu/+source/gui-ufw/+bug/1592380
>
> The fix[1] is to run
>
> xhost si:localuser:root
>
> Mark
>
> [1]  https://bugs.launchpad.net/ubuntu/+source/gui-ufw/+bug/1592380/comments/6
>

-- 
hkp://keys.gnupg.net
CA45 09B5 5351 7C11 A9D1  7286 0036 9E45 1595 8BC0

Acknowledgement sent to Boruch Baum <[email protected]>:
Extra info received and forwarded to list. Copy sent to [email protected]. Full text available.
Information forwarded to [email protected], [email protected]:
bug#260; Package gufw. Full text available.
Added tag(s) moreinfo. Request was from Mark Hindley <[email protected]> to [email protected]. Full text available.

Message received at [email protected]:


Received: (at 260) by bugs.devuan.org; 8 Feb 2023 15:49:45 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Wed, 08 Feb 2023 15:49:45 +0000 (UTC)
Received: from email.devuan.org
	by email.devuan.org with LMTP
	id H5H5HGvE42NMNAAAmSBk0A
	(envelope-from <[email protected]>)
	for <[email protected]>; Wed, 08 Feb 2023 15:48:59 +0000
Received: by email.devuan.org (Postfix, from userid 109)
	id 623C2B14; Wed,  8 Feb 2023 15:48:59 +0000 (UTC)
X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org
X-Spam-Level: 
X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS
	autolearn=no autolearn_force=no version=3.4.6
Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; [email protected]; receiver=<UNKNOWN> 
Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86])
	by email.devuan.org (Postfix) with ESMTPS id 3293C84
	for <[email protected]>; Wed,  8 Feb 2023 15:48:58 +0000 (UTC)
Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk)
	by mx.hindley.org.uk with smtp (Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1pPmgr-0004V2-25; Wed, 08 Feb 2023 15:48:57 +0000
Received: (nullmailer pid 3502 invoked by uid 1000);
	Wed, 08 Feb 2023 15:48:56 -0000
Date: Wed, 8 Feb 2023 15:48:56 +0000
From: Mark Hindley <[email protected]>
To: Boruch Baum <[email protected]>, [email protected]
Subject: Re: bug#260: gufw: segfault gufw-pkexec
Message-ID: <Y+PEaBr8iWaNj9Q/@hindley.org.uk>
References: <[email protected]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <[email protected]>
X-Debbugs-No-Ack: No Thanks

Control: tags -1 moreinfo

Boruch.

Are you using Wayland? If so, I think this is the same as

 https://bugs.launchpad.net/ubuntu/+source/gui-ufw/+bug/1592380

The fix[1] is to run

xhost si:localuser:root

Mark

[1]  https://bugs.launchpad.net/ubuntu/+source/gui-ufw/+bug/1592380/comments/6


Information forwarded to [email protected], [email protected]:
bug#260; Package gufw. Full text available.

Message received at [email protected]:


Received: (at 260) by bugs.devuan.org; 15 Nov 2018 11:30:05 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by fulcanelli with IMAP (fetchmail-6.3.26)
	for <debbugs@localhost> (single-drop); Thu, 15 Nov 2018 12:30:05 +0100 (CET)
Received: from [127.0.0.1] (localhost [127.0.0.1])
	(Authenticated sender: [email protected])
	with ESMTPSA id 0C2DEF606E9
Date: Thu, 15 Nov 2018 12:24:45 +0100
From: KatolaZ <[email protected]>
To: [email protected]
Subject: Please forward upstream
Message-ID: <[email protected]>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
	protocol="application/pgp-signature"; boundary="jxjchozzrd53nzcq"
Content-Disposition: inline
User-Agent: NeoMutt/20170113 (1.7.2)


--jxjchozzrd53nzcq
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

Hi,

gufw in Devuan comes directly from Debian. Hence, this bug should be
forwarded to bugs.debian.org

Regards

--jxjchozzrd53nzcq
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iF0EABECAB0WIQSOWdaqRF79tKFTPVpfILOuC18GLwUCW+1XfQAKCRBfILOuC18G
L3T1AJ4rVpEJfqdxSV+QV+obH+ULvvL3VwCgjsN/gKnofarNaBlp+RHpcA/3JF8=
=lYWi
-----END PGP SIGNATURE-----

--jxjchozzrd53nzcq--


Acknowledgement sent to KatolaZ <[email protected]>:
Extra info received and forwarded to list. Copy sent to [email protected]. Full text available.
Information forwarded to [email protected], [email protected]:
bug#260; Package gufw. Full text available.

Message received at [email protected]:


Received: (at submit) by bugs.devuan.org; 15 Nov 2018 05:20:02 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by fulcanelli with IMAP (fetchmail-6.3.26)
	for <debbugs@localhost> (single-drop); Thu, 15 Nov 2018 06:20:02 +0100 (CET)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.22])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 21633F608F6
	for <[email protected]>; Thu, 15 Nov 2018 06:18:56 +0100 (CET)
Received: from E15-2016.optimum.net ([108.6.168.221]) by mail.gmx.com
 (mrgmx101 [212.227.17.174]) with ESMTPSA (Nemesis) id
 0Lbi2Z-1fdQ6E0OYF-00lFEj for <[email protected]>; Thu, 15 Nov 2018
 06:18:01 +0100
Date: Thu, 15 Nov 2018 00:17:58 -0500
From: Boruch Baum <[email protected]>
To: Devuan Bug Tracking System <[email protected]>
Subject: gufw: segfault gufw-pkexec
Message-ID: <[email protected]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: NeoMutt/20180716
X-Provags-ID: V03:K1:1WajRs4JF5qVmTh+wW8A7XnX5keoh9FmvTRVGSl2wxD3RZrH3xT
 OQVDBCh+9zkWws/ETI7AoE92jTlyOG77HeUfV4Q2G1/kRzQN/ObnQbwL0vZR2cmC+Wqf6QI
 63sUEIF0zTcp3u6Z9tFpzEAsvtA1TVSloZya9UJvnPGBhPVy5own55d3ShG7reBWFZzu3Wz
 i6jLKtAp0v6uD8xbW4j3w==
X-UI-Out-Filterresults: notjunk:1;V01:K0:kU674OTrvdc=:mH2rIE/+WzMFb6VY2azwb2
 guw6rNqzYbrymnjlvrSirmzKXTCAQHWrkv5mL6nDcgCPjg9t7WDck8QRMlB0ASU7R1Og9lHga
 EF4+atj5+ZOtnxUEmvr4I6cnvsDxzo2JB/iTHHp9AVvqnt35gGyA370q/3IhXCv9GWp87VOKo
 Xe7Ho2+Z9mpkOeGDLovCZCY9Tz/XZE4l1eAO+OAPL4Sv6wHHCxp69KNY2UeIP4/SKB5Y4ujyH
 2Jyr233qkuJI03tYwCgXFQooBF6nkMoFxHtLg5CxxwhIl1yMwDBE8ckwSj5Z4Nx4/TXB30ElK
 x+D73MyfYNls4+QPtcrTM+HjFPY+BkyjEUvbZylwSJow4dxIUrmCYyhyYArUjuCdKfpk3CZRo
 uUKfd6XygAm1DQ4aXJWCza6hvTZW5Sf/ocpRog42iQo188Daj/NLe3M6Y0TQIImuBha0ABtZD
 8bR7ARTb/O6duOUJH9aUcY2MocjgVhTEErT7sxj5G0WdZKwo0ZQVXsh6S8er5Zh5xkDv97EFv
 0NEsE4wlSKg4QqqDD1jnvYAllGTHq/MLrh5CKcd5jJdYcZzb6RjpAWx2u6wN8zoF+yiCkAmHC
 eWmycJJ+ppWhpv7Deec0BqWUBBcF6WoRRh6w2rcsn+5xMeFNpkyDaqDdD6gR+LKGB5dZK7RfG
 nZTiWaml0Sjms6FbFQncIuIRul1tVQo+xzKsKD5ob9KeEVc5VhzZOPA7y3G6DUJqiGffNHeu5
 biWxqMXsIiBeF3h5Ye+vTHhupleOYoipxPwdk41Q3FAUapIjlj/iNF8b+vByzO2yJWV9YD506
 Lv2QYWp69ZqDdd30FNFOWjrF5KlPjkOT3/uUSJ7IgfG14dbr8xc+ozAgx3aI6R5rhzKrlxvWN
 /F2JLNaPbSQD9KXEiRUpctKBN3eMR/aW3U0ycubDz2OKHzQiVqM9x/dWP3Pl1v

Package: gufw

+ On a fresh ascii install conducted less than 24 hours ago,
  gufw was installed, but it segfaults with the following details:

  /usr/bin/gufw-pkexec: line 13: 18344 Segmentation fault
  python3 ${LOCATIONS[${i}]} $1

+ The underlying ufw firewall does function correctly, as
  tested from the command line.

-- 
hkp://keys.gnupg.net
CA45 09B5 5351 7C11 A9D1  7286 0036 9E45 1595 8BC0


Acknowledgement sent to Boruch Baum <[email protected]>:
New bug report received and forwarded. Copy sent to [email protected]. Full text available.
Report forwarded to [email protected], [email protected]:
bug#260; Package gufw. Full text available.

Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997 nCipher Corporation Ltd, 1994-97 Ian Jackson.

Devuan Bugs Owner <[email protected]>.
Last modified: Thu, 28 Nov 2024 06:39:01 UTC