Bug 11508 - ufraw error while opening raw files
Summary: ufraw error while opening raw files
Status: CONFIRMED
Alias: None
Product: ROSA Fresh
Classification: ROSA-based products
Component: Packages from Main (show other bugs)
Version: All
Hardware: All Linux
: Normal normal
Target Milestone: ---
Assignee: ROSA Linux Bugs
URL:
Whiteboard:
Depends on:
Blocks:
 
Reported: 2021-09-14 10:36 MSK by e.malashin@rosalinux.ru
Modified: 2021-09-14 12:39 MSK (History)
1 user (show)

See Also:
Platform: 2021.1
ROSA Vulnerability identifier:
RPM Package:
Upstream:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description e.malashin@rosalinux.ru 2021-09-14 10:36:18 MSK
ufraw вылетает при попытке открыть файлы .nef .cr2 .orf .arw


Ошибка сегментирования (стек памяти сброшен на диск)
сен 13 17:49:12 rosa2021 systemd-coredump[10676]: [🡕] Process 10657 (ufraw) of user 500 dumped core.

                                                     Stack trace of thread 10657:
                                                     #0  0x00007f5a27c45059 _ZN6lfLensaSERKS_ (liblensfun.so.2 + 0x21059)
                                                     #1  0x0000000000437205 _ZN5UFRaw7Lensfun20SetLensInterpolationEv (ufraw + 0x37205)
                                                     #2  0x0000000000437dc8 _ZN5UFRaw7Lensfun4InitEb (ufraw + 0x37dc8)
                                                     #3  0x000000000041ed5e ufraw_config (ufraw + 0x1ed5e)
                                                     #4  0x000000000046a6f4 ufraw_chooser (ufraw + 0x6a6f4)
                                                     #5  0x00000000004124e1 main (ufraw + 0x124e1)
                                                     #6  0x00007f5a2664652d __libc_start_main (libc.so.6 + 0x2852d)
                                                     #7  0x00000000004147aa _start (ufraw + 0x147aa)

                                                     Stack trace of thread 10659:
                                                     #0  0x00007f5a2672468f __poll (libc.so.6 + 0x10668f)
                                                     #1  0x00007f5a27d2971e g_main_context_iterate.constprop.0 (libglib-2.0.so.0 + 0x5371e)
                                                     #2  0x00007f5a27d29a73 g_main_loop_run (libglib-2.0.so.0 + 0x53a73)
                                                     #3  0x00007f5a270791c6 gdbus_shared_thread_func (libgio-2.0.so.0 + 0x11c1c6)
                                                     #4  0x00007f5a27d530cd g_thread_proxy (libglib-2.0.so.0 + 0x7d0cd)
                                                     #5  0x00007f5a26809e48 start_thread (libpthread.so.0 + 0x8e48)
                                                     #6  0x00007f5a2672feff __clone (libc.so.6 + 0x111eff)

                                                     Stack trace of thread 10661:
                                                     #0  0x00007f5a2672a189 syscall (libc.so.6 + 0x10c189)
                                                     #1  0x00007f5a27d7c522 g_cond_wait_until (libglib-2.0.so.0 + 0xa6522)
                                                     #2  0x00007f5a27cf8601 g_async_queue_pop_intern_unlocked (libglib-2.0.so.0 + 0x22601)
                                                     #3  0x00007f5a27d53b1a g_thread_pool_thread_proxy (libglib-2.0.so.0 + 0x7db1a)
                                                     #4  0x00007f5a27d530cd g_thread_proxy (libglib-2.0.so.0 + 0x7d0cd)
                                                     #5  0x00007f5a26809e48 start_thread (libpthread.so.0 + 0x8e48)
                                                     #6  0x00007f5a2672feff __clone (libc.so.6 + 0x111eff)

                                                     Stack trace of thread 10658:
                                                     #0  0x00007f5a2672468f __poll (libc.so.6 + 0x10668f)
                                                     #1  0x00007f5a27d2971e g_main_context_iterate.constprop.0 (libglib-2.0.so.0 + 0x5371e)
                                                     #2  0x00007f5a27d2983f g_main_context_iteration (libglib-2.0.so.0 + 0x5383f)
                                                     #3  0x00007f5a27d29891 glib_worker_main (libglib-2.0.so.0 + 0x53891)
                                                     #4  0x00007f5a27d530cd g_thread_proxy (libglib-2.0.so.0 + 0x7d0cd)
                                                     #5  0x00007f5a26809e48 start_thread (libpthread.so.0 + 0x8e48)
                                                     #6  0x00007f5a2672feff __clone (libc.so.6 + 0x111eff)
Comment 1 Mikhail Novosyolov 2021-09-14 12:39:03 MSK
ufraw не входит же в поставку образа XFCE, поэтому привязку к мета-багу убираю