Devuan bug report logs - #260
gufw: segfault gufw-pkexec

Package: gufw; Maintainer for gufw is (unknown); Source for gufw is src:gui-ufw.

Reported by: Boruch Baum <boruch_baum@gmx.com>

Date: Thu, 15 Nov 2018 05:33:01 UTC

Severity: normal

Tags: moreinfo

Done: Mark Hindley <mark@hindley.org.uk>

Full log


🔗 View this message in rfc822 format

X-Loop: owner@bugs.devuan.org
Subject: bug#260: gufw: segfault gufw-pkexec
Reply-To: Boruch Baum <boruch_baum@gmx.com>, 260@bugs.devuan.org
Resent-From: Boruch Baum <boruch_baum@gmx.com>
Resent-To: devuan-bugs@lists.dyne.org
Resent-CC: owner@bugs.devuan.org
Resent-Date: Thu, 15 Nov 2018 05:33:01 UTC
Resent-Message-ID: <handler.260.B.154225920232377@bugs.devuan.org>
Resent-Sender: owner@bugs.devuan.org
X-Devuan-PR-Message: report 260
X-Devuan-PR-Package: gufw
X-Devuan-PR-Keywords: 
Received: via spool by submit@bugs.devuan.org id=B.154225920232377
          (code B ref -1); Thu, 15 Nov 2018 05:33:01 UTC
Received: (at submit) by bugs.devuan.org; 15 Nov 2018 05:20:02 +0000
Delivered-To: devuanbugs@dyne.org
Received: from tupac3.dyne.org [195.169.149.119]
	by fulcanelli with IMAP (fetchmail-6.3.26)
	for <debbugs@localhost> (single-drop); Thu, 15 Nov 2018 06:20:02 +0100 (CET)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.22])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 21633F608F6
	for <submit@bugs.devuan.org>; Thu, 15 Nov 2018 06:18:56 +0100 (CET)
Received: from E15-2016.optimum.net ([108.6.168.221]) by mail.gmx.com
 (mrgmx101 [212.227.17.174]) with ESMTPSA (Nemesis) id
 0Lbi2Z-1fdQ6E0OYF-00lFEj for <submit@bugs.devuan.org>; Thu, 15 Nov 2018
 06:18:01 +0100
Date: Thu, 15 Nov 2018 00:17:58 -0500
From: Boruch Baum <boruch_baum@gmx.com>
To: Devuan Bug Tracking System <submit@bugs.devuan.org>
Message-ID: <20181115051758.acjalt7cn2odmijl@E15-2016.optimum.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: NeoMutt/20180716
X-Provags-ID: V03:K1:1WajRs4JF5qVmTh+wW8A7XnX5keoh9FmvTRVGSl2wxD3RZrH3xT
 OQVDBCh+9zkWws/ETI7AoE92jTlyOG77HeUfV4Q2G1/kRzQN/ObnQbwL0vZR2cmC+Wqf6QI
 63sUEIF0zTcp3u6Z9tFpzEAsvtA1TVSloZya9UJvnPGBhPVy5own55d3ShG7reBWFZzu3Wz
 i6jLKtAp0v6uD8xbW4j3w==
X-UI-Out-Filterresults: notjunk:1;V01:K0:kU674OTrvdc=:mH2rIE/+WzMFb6VY2azwb2
 guw6rNqzYbrymnjlvrSirmzKXTCAQHWrkv5mL6nDcgCPjg9t7WDck8QRMlB0ASU7R1Og9lHga
 EF4+atj5+ZOtnxUEmvr4I6cnvsDxzo2JB/iTHHp9AVvqnt35gGyA370q/3IhXCv9GWp87VOKo
 Xe7Ho2+Z9mpkOeGDLovCZCY9Tz/XZE4l1eAO+OAPL4Sv6wHHCxp69KNY2UeIP4/SKB5Y4ujyH
 2Jyr233qkuJI03tYwCgXFQooBF6nkMoFxHtLg5CxxwhIl1yMwDBE8ckwSj5Z4Nx4/TXB30ElK
 x+D73MyfYNls4+QPtcrTM+HjFPY+BkyjEUvbZylwSJow4dxIUrmCYyhyYArUjuCdKfpk3CZRo
 uUKfd6XygAm1DQ4aXJWCza6hvTZW5Sf/ocpRog42iQo188Daj/NLe3M6Y0TQIImuBha0ABtZD
 8bR7ARTb/O6duOUJH9aUcY2MocjgVhTEErT7sxj5G0WdZKwo0ZQVXsh6S8er5Zh5xkDv97EFv
 0NEsE4wlSKg4QqqDD1jnvYAllGTHq/MLrh5CKcd5jJdYcZzb6RjpAWx2u6wN8zoF+yiCkAmHC
 eWmycJJ+ppWhpv7Deec0BqWUBBcF6WoRRh6w2rcsn+5xMeFNpkyDaqDdD6gR+LKGB5dZK7RfG
 nZTiWaml0Sjms6FbFQncIuIRul1tVQo+xzKsKD5ob9KeEVc5VhzZOPA7y3G6DUJqiGffNHeu5
 biWxqMXsIiBeF3h5Ye+vTHhupleOYoipxPwdk41Q3FAUapIjlj/iNF8b+vByzO2yJWV9YD506
 Lv2QYWp69ZqDdd30FNFOWjrF5KlPjkOT3/uUSJ7IgfG14dbr8xc+ozAgx3aI6R5rhzKrlxvWN
 /F2JLNaPbSQD9KXEiRUpctKBN3eMR/aW3U0ycubDz2OKHzQiVqM9x/dWP3Pl1v
Package: gufw

+ On a fresh ascii install conducted less than 24 hours ago,
  gufw was installed, but it segfaults with the following details:

  /usr/bin/gufw-pkexec: line 13: 18344 Segmentation fault
  python3 ${LOCATIONS[${i}]} $1

+ The underlying ufw firewall does function correctly, as
  tested from the command line.

-- 
hkp://keys.gnupg.net
CA45 09B5 5351 7C11 A9D1  7286 0036 9E45 1595 8BC0


Send a report that this bug log contains spam.


Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.

Devuan Bugs Owner <owner@bugs.devuan.org>.
Last modified: Fri Apr 19 02:19:07 2024;