Devuan bug report logs - #260
gufw: segfault gufw-pkexec

Package: gufw; Reported by: Boruch Baum <boruch_baum@gmx.com>; dated Thu, 15 Nov 2018 05:33:01 UTC; Maintainer for gufw is (unknown).

Message received at 260@bugs.devuan.org:


Received: (at 260) by bugs.devuan.org; 15 Nov 2018 11:30:05 +0000
Return-Path: <katolaz@freaknet.org>
Delivered-To: devuanbugs@dyne.org
Received: from tupac3.dyne.org [195.169.149.119]
	by fulcanelli with IMAP (fetchmail-6.3.26)
	for <debbugs@localhost> (single-drop); Thu, 15 Nov 2018 12:30:05 +0100 (CET)
Received: from [127.0.0.1] (localhost [127.0.0.1])
	(Authenticated sender: katolaz@freaknet.org)
	with ESMTPSA id 0C2DEF606E9
Date: Thu, 15 Nov 2018 12:24:45 +0100
From: KatolaZ <katolaz@freaknet.org>
To: 260@bugs.devuan.org
Subject: Please forward upstream
Message-ID: <20181115112445.h2i6b2zb6yzhavai@katolaz.homeunix.net>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
	protocol="application/pgp-signature"; boundary="jxjchozzrd53nzcq"
Content-Disposition: inline
User-Agent: NeoMutt/20170113 (1.7.2)


--jxjchozzrd53nzcq
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

Hi,

gufw in Devuan comes directly from Debian. Hence, this bug should be
forwarded to bugs.debian.org

Regards

--jxjchozzrd53nzcq
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iF0EABECAB0WIQSOWdaqRF79tKFTPVpfILOuC18GLwUCW+1XfQAKCRBfILOuC18G
L3T1AJ4rVpEJfqdxSV+QV+obH+ULvvL3VwCgjsN/gKnofarNaBlp+RHpcA/3JF8=
=lYWi
-----END PGP SIGNATURE-----

--jxjchozzrd53nzcq--


Acknowledgement sent to KatolaZ <katolaz@freaknet.org>:
Extra info received and forwarded to list. Copy sent to owner@bugs.devuan.org. Full text available.
Information forwarded to devuan-bugs@lists.dyne.org, owner@bugs.devuan.org:
bug#260; Package gufw. Full text available.

Message received at submit@bugs.devuan.org:


Received: (at submit) by bugs.devuan.org; 15 Nov 2018 05:20:02 +0000
Return-Path: <boruch_baum@gmx.com>
Delivered-To: devuanbugs@dyne.org
Received: from tupac3.dyne.org [195.169.149.119]
	by fulcanelli with IMAP (fetchmail-6.3.26)
	for <debbugs@localhost> (single-drop); Thu, 15 Nov 2018 06:20:02 +0100 (CET)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.22])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 21633F608F6
	for <submit@bugs.devuan.org>; Thu, 15 Nov 2018 06:18:56 +0100 (CET)
Received: from E15-2016.optimum.net ([108.6.168.221]) by mail.gmx.com
 (mrgmx101 [212.227.17.174]) with ESMTPSA (Nemesis) id
 0Lbi2Z-1fdQ6E0OYF-00lFEj for <submit@bugs.devuan.org>; Thu, 15 Nov 2018
 06:18:01 +0100
Date: Thu, 15 Nov 2018 00:17:58 -0500
From: Boruch Baum <boruch_baum@gmx.com>
To: Devuan Bug Tracking System <submit@bugs.devuan.org>
Subject: gufw: segfault gufw-pkexec
Message-ID: <20181115051758.acjalt7cn2odmijl@E15-2016.optimum.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: NeoMutt/20180716
X-Provags-ID: V03:K1:1WajRs4JF5qVmTh+wW8A7XnX5keoh9FmvTRVGSl2wxD3RZrH3xT
 OQVDBCh+9zkWws/ETI7AoE92jTlyOG77HeUfV4Q2G1/kRzQN/ObnQbwL0vZR2cmC+Wqf6QI
 63sUEIF0zTcp3u6Z9tFpzEAsvtA1TVSloZya9UJvnPGBhPVy5own55d3ShG7reBWFZzu3Wz
 i6jLKtAp0v6uD8xbW4j3w==
X-UI-Out-Filterresults: notjunk:1;V01:K0:kU674OTrvdc=:mH2rIE/+WzMFb6VY2azwb2
 guw6rNqzYbrymnjlvrSirmzKXTCAQHWrkv5mL6nDcgCPjg9t7WDck8QRMlB0ASU7R1Og9lHga
 EF4+atj5+ZOtnxUEmvr4I6cnvsDxzo2JB/iTHHp9AVvqnt35gGyA370q/3IhXCv9GWp87VOKo
 Xe7Ho2+Z9mpkOeGDLovCZCY9Tz/XZE4l1eAO+OAPL4Sv6wHHCxp69KNY2UeIP4/SKB5Y4ujyH
 2Jyr233qkuJI03tYwCgXFQooBF6nkMoFxHtLg5CxxwhIl1yMwDBE8ckwSj5Z4Nx4/TXB30ElK
 x+D73MyfYNls4+QPtcrTM+HjFPY+BkyjEUvbZylwSJow4dxIUrmCYyhyYArUjuCdKfpk3CZRo
 uUKfd6XygAm1DQ4aXJWCza6hvTZW5Sf/ocpRog42iQo188Daj/NLe3M6Y0TQIImuBha0ABtZD
 8bR7ARTb/O6duOUJH9aUcY2MocjgVhTEErT7sxj5G0WdZKwo0ZQVXsh6S8er5Zh5xkDv97EFv
 0NEsE4wlSKg4QqqDD1jnvYAllGTHq/MLrh5CKcd5jJdYcZzb6RjpAWx2u6wN8zoF+yiCkAmHC
 eWmycJJ+ppWhpv7Deec0BqWUBBcF6WoRRh6w2rcsn+5xMeFNpkyDaqDdD6gR+LKGB5dZK7RfG
 nZTiWaml0Sjms6FbFQncIuIRul1tVQo+xzKsKD5ob9KeEVc5VhzZOPA7y3G6DUJqiGffNHeu5
 biWxqMXsIiBeF3h5Ye+vTHhupleOYoipxPwdk41Q3FAUapIjlj/iNF8b+vByzO2yJWV9YD506
 Lv2QYWp69ZqDdd30FNFOWjrF5KlPjkOT3/uUSJ7IgfG14dbr8xc+ozAgx3aI6R5rhzKrlxvWN
 /F2JLNaPbSQD9KXEiRUpctKBN3eMR/aW3U0ycubDz2OKHzQiVqM9x/dWP3Pl1v

Package: gufw

+ On a fresh ascii install conducted less than 24 hours ago,
  gufw was installed, but it segfaults with the following details:

  /usr/bin/gufw-pkexec: line 13: 18344 Segmentation fault
  python3 ${LOCATIONS[${i}]} $1

+ The underlying ufw firewall does function correctly, as
  tested from the command line.

-- 
hkp://keys.gnupg.net
CA45 09B5 5351 7C11 A9D1  7286 0036 9E45 1595 8BC0


Acknowledgement sent to Boruch Baum <boruch_baum@gmx.com>:
New bug report received and forwarded. Copy sent to owner@bugs.devuan.org. Full text available.
Report forwarded to devuan-bugs@lists.dyne.org, owner@bugs.devuan.org:
bug#260; Package gufw. Full text available.

Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997 nCipher Corporation Ltd, 1994-97 Ian Jackson.

Devuan Bugs Owner <owner@bugs.devuan.org>.
Last modified: Sat, 11 Jul 2020 20:39:01 UTC