Received: (at 260-done) by bugs.devuan.org; 8 Feb 2023 18:31:33 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612] by doc.devuan.org with IMAP (fetchmail-6.4.16) for <debbugs@localhost> (single-drop); Wed, 08 Feb 2023 18:31:33 +0000 (UTC) Received: from email.devuan.org by email.devuan.org with LMTP id 8HjpIy3q42NHPgAAmSBk0A (envelope-from <[email protected]>) for <[email protected]>; Wed, 08 Feb 2023 18:30:05 +0000 Received: by email.devuan.org (Postfix, from userid 109) id 8907FB14; Wed, 8 Feb 2023 18:30:05 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org X-Spam-Level: X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; [email protected]; receiver=<UNKNOWN> Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86]) by email.devuan.org (Postfix) with ESMTPS id 1E34A84 for <[email protected]>; Wed, 8 Feb 2023 18:30:03 +0000 (UTC) Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk) by mx.hindley.org.uk with smtp (Exim 4.84_2) (envelope-from <[email protected]>) id 1pPpCj-0005Sy-TW; Wed, 08 Feb 2023 18:30:01 +0000 Received: (nullmailer pid 19315 invoked by uid 1000); Wed, 08 Feb 2023 18:30:01 -0000 Date: Wed, 8 Feb 2023 18:30:01 +0000 From: Mark Hindley <[email protected]> To: Boruch Baum <[email protected]> Cc: [email protected] Subject: Re: bug#260: gufw: segfault gufw-pkexec Message-ID: <[email protected]> References: <[email protected]> <Y+PEaBr8iWaNj9Q/@hindley.org.uk> <20230208180100.hd7g3peilbs6phyq@debian-BULLSEYE-live-builder-AMD64> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230208180100.hd7g3peilbs6phyq@debian-BULLSEYE-live-builder-AMD64> On Wed, Feb 08, 2023 at 01:01:00PM -0500, Boruch Baum wrote: > I filed the bug report in year 2016. At this point, in year 2023, I'm > not able to help. Sorry. OK, thanks for your reply. Closing. Mark
Boruch Baum <[email protected]>
:Mark Hindley <[email protected]>
:Received: (at 260) by bugs.devuan.org; 8 Feb 2023 18:01:31 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612] by doc.devuan.org with IMAP (fetchmail-6.4.16) for <debbugs@localhost> (single-drop); Wed, 08 Feb 2023 18:01:31 +0000 (UTC) Received: from email.devuan.org by email.devuan.org with LMTP id qMxKCWbj42MbPQAAmSBk0A (envelope-from <[email protected]>) for <[email protected]>; Wed, 08 Feb 2023 18:01:10 +0000 Received: by email.devuan.org (Postfix, from userid 109) id 198DAB14; Wed, 8 Feb 2023 18:01:10 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org X-Spam-Level: X-Spam-Status: No, score=-1.7 required=5.0 tests=FREEMAIL_FROM, RCVD_IN_DNSWL_LOW,RCVD_IN_MSPIKE_H2,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=212.227.15.18; helo=mout.gmx.net; [email protected]; receiver=<UNKNOWN> Received: from mout.gmx.net (mout.gmx.net [212.227.15.18]) by email.devuan.org (Postfix) with ESMTPS id AE2E584 for <[email protected]>; Wed, 8 Feb 2023 18:01:05 +0000 (UTC) Received: from debian-BULLSEYE-live-builder-AMD64 ([151.205.99.250]) by mail.gmx.net (mrgmx005 [212.227.17.184]) with ESMTPSA (Nemesis) id 1M4b1o-1pQMyv08SU-001lQ2; Wed, 08 Feb 2023 19:01:03 +0100 Date: Wed, 8 Feb 2023 13:01:00 -0500 From: Boruch Baum <[email protected]> To: Mark Hindley <[email protected]> Cc: [email protected] Subject: Re: bug#260: gufw: segfault gufw-pkexec Message-ID: <20230208180100.hd7g3peilbs6phyq@debian-BULLSEYE-live-builder-AMD64> References: <[email protected]> <Y+PEaBr8iWaNj9Q/@hindley.org.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <Y+PEaBr8iWaNj9Q/@hindley.org.uk> X-Provags-ID: V03:K1:NTxNtSn7vqWtUJOrskUjMkJc+L0GQfm7p+qYxfBcJnKGnazi0ym JauvBQPHNwrCr1lCO1No6xDd739LaLHXib5DFj/Pu+dO4nGT5dbaIZ1H5J+XhSGaZRfYYOh /cWN/fpMVwem8PIT1O0pq7Xm8uwq1B8Uf8wnuaTmvpielAHNwvoftS8ydeqv9pnIEQ5PXnw MCThvP2ldq/HSlVFTtoKg== UI-OutboundReport: notjunk:1;M01:P0:AOgVfcClkWg=;plvyLZTSnCFjW87hyOO47latirI OypuQbw/DJBrcncxWDd6x1vVsGHjyWthpIOkBzZtI6xsPy0iAsicD/EjMQIOKborFnjxtb5fv Amt0q7//hIlfcub/mD2HO2zCr0jySR6aDUe30eR2qORYscaxoVjuM4CsI/hpEdyTtqoeml1qu qO3DJBGdmedR3ikayFn/K11bLh73Jw+opOJGLHyiQmaZ0sDuaDXrkUqqvLvfR0TGKOb+9K3ve Q7r39sW0ScOQA7TPUCN93EJCf0ijp0fDWfQSQ/QV/sed3J9CebmcA8S7iM7xRdVryT/C+rnCB pdZrQ4CBOuo/YdmbkGbJ+TjmSPlV0/nx305NlzlOp8Muhi0lMEYVpXP0HggdC0clG3Peunhok kgSdhaDECHtSRWoXjepDctG1y1mbumhbgao/vZK3CSr2mkoax2SqyYqwP2NhHPLPgZ2wAXgz2 grZHRydM+DWUmLBWP2aE1MxJIJn/2rauxhMSaVGkBmnwYDj1Xff01Wxh3BH+AR55iZDEygtaz +/RqEk+JmTZgkqvmHLqW44oKC6/YokmRdnPRrznDmLeVn2HLQXxpazB94H2WZtMCL9FmQn5VZ eFsdgZhLoso30MrUDRjZHLQNE+ff3MsxdkHUBRskaFq7+Ey5KbIGvQtNEw6TudVaQLJsKA4V5 6n+ZVTE28LQM8ykz03AYYii0E399U+LuZYBSYOGc4wsIv77g0gyCREOaGM5moVz3f9cC3jroz KjExTShPPR9Rorjh5dbDdXMjtsuko1DMgBlavW9GCogQz+S62jlXjsU10V9AQ/o+k4gDQfh4o GBM0fXUvxAuBRgtDzY65KuMQ5VZdiAOXTwDqpJDYOWe133R+e57mVtmwPREwWjKVDS2/KYGPs G2n+mN5GfA39gt82rUJp3/LiUkeTvhpdZkE3rPlnaOV1COKNPo2qNjRkcjk3pWI7DV6HzP1FS VNawwA== I filed the bug report in year 2016. At this point, in year 2023, I'm not able to help. Sorry. On 2023-02-08 15:48, Mark Hindley wrote: > Control: tags -1 moreinfo > > Boruch. > > Are you using Wayland? If so, I think this is the same as > > https://bugs.launchpad.net/ubuntu/+source/gui-ufw/+bug/1592380 > > The fix[1] is to run > > xhost si:localuser:root > > Mark > > [1] https://bugs.launchpad.net/ubuntu/+source/gui-ufw/+bug/1592380/comments/6 > -- hkp://keys.gnupg.net CA45 09B5 5351 7C11 A9D1 7286 0036 9E45 1595 8BC0
Boruch Baum <[email protected]>
:[email protected]
.
Full text available.[email protected], [email protected]
:bug#260
; Package gufw
.
Full text available.Mark Hindley <[email protected]>
to [email protected]
.
Full text available.Received: (at 260) by bugs.devuan.org; 8 Feb 2023 15:49:45 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612] by doc.devuan.org with IMAP (fetchmail-6.4.16) for <debbugs@localhost> (single-drop); Wed, 08 Feb 2023 15:49:45 +0000 (UTC) Received: from email.devuan.org by email.devuan.org with LMTP id H5H5HGvE42NMNAAAmSBk0A (envelope-from <[email protected]>) for <[email protected]>; Wed, 08 Feb 2023 15:48:59 +0000 Received: by email.devuan.org (Postfix, from userid 109) id 623C2B14; Wed, 8 Feb 2023 15:48:59 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org X-Spam-Level: X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; [email protected]; receiver=<UNKNOWN> Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86]) by email.devuan.org (Postfix) with ESMTPS id 3293C84 for <[email protected]>; Wed, 8 Feb 2023 15:48:58 +0000 (UTC) Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk) by mx.hindley.org.uk with smtp (Exim 4.84_2) (envelope-from <[email protected]>) id 1pPmgr-0004V2-25; Wed, 08 Feb 2023 15:48:57 +0000 Received: (nullmailer pid 3502 invoked by uid 1000); Wed, 08 Feb 2023 15:48:56 -0000 Date: Wed, 8 Feb 2023 15:48:56 +0000 From: Mark Hindley <[email protected]> To: Boruch Baum <[email protected]>, [email protected] Subject: Re: bug#260: gufw: segfault gufw-pkexec Message-ID: <Y+PEaBr8iWaNj9Q/@hindley.org.uk> References: <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <[email protected]> X-Debbugs-No-Ack: No Thanks Control: tags -1 moreinfo Boruch. Are you using Wayland? If so, I think this is the same as https://bugs.launchpad.net/ubuntu/+source/gui-ufw/+bug/1592380 The fix[1] is to run xhost si:localuser:root Mark [1] https://bugs.launchpad.net/ubuntu/+source/gui-ufw/+bug/1592380/comments/6
[email protected], [email protected]
:bug#260
; Package gufw
.
Full text available.Received: (at 260) by bugs.devuan.org; 15 Nov 2018 11:30:05 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by fulcanelli with IMAP (fetchmail-6.3.26) for <debbugs@localhost> (single-drop); Thu, 15 Nov 2018 12:30:05 +0100 (CET) Received: from [127.0.0.1] (localhost [127.0.0.1]) (Authenticated sender: [email protected]) with ESMTPSA id 0C2DEF606E9 Date: Thu, 15 Nov 2018 12:24:45 +0100 From: KatolaZ <[email protected]> To: [email protected] Subject: Please forward upstream Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="jxjchozzrd53nzcq" Content-Disposition: inline User-Agent: NeoMutt/20170113 (1.7.2) --jxjchozzrd53nzcq Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Hi, gufw in Devuan comes directly from Debian. Hence, this bug should be forwarded to bugs.debian.org Regards --jxjchozzrd53nzcq Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iF0EABECAB0WIQSOWdaqRF79tKFTPVpfILOuC18GLwUCW+1XfQAKCRBfILOuC18G L3T1AJ4rVpEJfqdxSV+QV+obH+ULvvL3VwCgjsN/gKnofarNaBlp+RHpcA/3JF8= =lYWi -----END PGP SIGNATURE----- --jxjchozzrd53nzcq--
KatolaZ <[email protected]>
:[email protected]
.
Full text available.[email protected], [email protected]
:bug#260
; Package gufw
.
Full text available.Received: (at submit) by bugs.devuan.org; 15 Nov 2018 05:20:02 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by fulcanelli with IMAP (fetchmail-6.3.26) for <debbugs@localhost> (single-drop); Thu, 15 Nov 2018 06:20:02 +0100 (CET) Received: from mout.gmx.net (mout.gmx.net [212.227.17.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 21633F608F6 for <[email protected]>; Thu, 15 Nov 2018 06:18:56 +0100 (CET) Received: from E15-2016.optimum.net ([108.6.168.221]) by mail.gmx.com (mrgmx101 [212.227.17.174]) with ESMTPSA (Nemesis) id 0Lbi2Z-1fdQ6E0OYF-00lFEj for <[email protected]>; Thu, 15 Nov 2018 06:18:01 +0100 Date: Thu, 15 Nov 2018 00:17:58 -0500 From: Boruch Baum <[email protected]> To: Devuan Bug Tracking System <[email protected]> Subject: gufw: segfault gufw-pkexec Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: NeoMutt/20180716 X-Provags-ID: V03:K1:1WajRs4JF5qVmTh+wW8A7XnX5keoh9FmvTRVGSl2wxD3RZrH3xT OQVDBCh+9zkWws/ETI7AoE92jTlyOG77HeUfV4Q2G1/kRzQN/ObnQbwL0vZR2cmC+Wqf6QI 63sUEIF0zTcp3u6Z9tFpzEAsvtA1TVSloZya9UJvnPGBhPVy5own55d3ShG7reBWFZzu3Wz i6jLKtAp0v6uD8xbW4j3w== X-UI-Out-Filterresults: notjunk:1;V01:K0:kU674OTrvdc=:mH2rIE/+WzMFb6VY2azwb2 guw6rNqzYbrymnjlvrSirmzKXTCAQHWrkv5mL6nDcgCPjg9t7WDck8QRMlB0ASU7R1Og9lHga EF4+atj5+ZOtnxUEmvr4I6cnvsDxzo2JB/iTHHp9AVvqnt35gGyA370q/3IhXCv9GWp87VOKo Xe7Ho2+Z9mpkOeGDLovCZCY9Tz/XZE4l1eAO+OAPL4Sv6wHHCxp69KNY2UeIP4/SKB5Y4ujyH 2Jyr233qkuJI03tYwCgXFQooBF6nkMoFxHtLg5CxxwhIl1yMwDBE8ckwSj5Z4Nx4/TXB30ElK x+D73MyfYNls4+QPtcrTM+HjFPY+BkyjEUvbZylwSJow4dxIUrmCYyhyYArUjuCdKfpk3CZRo uUKfd6XygAm1DQ4aXJWCza6hvTZW5Sf/ocpRog42iQo188Daj/NLe3M6Y0TQIImuBha0ABtZD 8bR7ARTb/O6duOUJH9aUcY2MocjgVhTEErT7sxj5G0WdZKwo0ZQVXsh6S8er5Zh5xkDv97EFv 0NEsE4wlSKg4QqqDD1jnvYAllGTHq/MLrh5CKcd5jJdYcZzb6RjpAWx2u6wN8zoF+yiCkAmHC eWmycJJ+ppWhpv7Deec0BqWUBBcF6WoRRh6w2rcsn+5xMeFNpkyDaqDdD6gR+LKGB5dZK7RfG nZTiWaml0Sjms6FbFQncIuIRul1tVQo+xzKsKD5ob9KeEVc5VhzZOPA7y3G6DUJqiGffNHeu5 biWxqMXsIiBeF3h5Ye+vTHhupleOYoipxPwdk41Q3FAUapIjlj/iNF8b+vByzO2yJWV9YD506 Lv2QYWp69ZqDdd30FNFOWjrF5KlPjkOT3/uUSJ7IgfG14dbr8xc+ozAgx3aI6R5rhzKrlxvWN /F2JLNaPbSQD9KXEiRUpctKBN3eMR/aW3U0ycubDz2OKHzQiVqM9x/dWP3Pl1v Package: gufw + On a fresh ascii install conducted less than 24 hours ago, gufw was installed, but it segfaults with the following details: /usr/bin/gufw-pkexec: line 13: 18344 Segmentation fault python3 ${LOCATIONS[${i}]} $1 + The underlying ufw firewall does function correctly, as tested from the command line. -- hkp://keys.gnupg.net CA45 09B5 5351 7C11 A9D1 7286 0036 9E45 1595 8BC0
Boruch Baum <[email protected]>
:[email protected]
.
Full text available.[email protected], [email protected]
:bug#260
; Package gufw
.
Full text available.Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997 nCipher Corporation Ltd,
1994-97 Ian Jackson.
Devuan Bugs Owner <[email protected]>.
Last modified:
Thu, 28 Nov 2024 06:39:01 UTC