Your message dated Wed, 24 Dec 2025 13:19:06 +0000
with message-id <[email protected]>
and subject line Bug#1123876: fixed in dbus-broker 37-4
has caused the Debian Bug report #1123876,
regarding dbus-broker: Crashes when trying to mount encrypted USB from Plasma
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1123876: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1123876
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: dbus-broker
Version: 37-3
Severity: important

Hi,

This seems to be a strlen() on a NULL-pointer...

To reporoduce (hopefully):
1. Insert drive with LUKS-encrypted data (I use no partition table on my
drives, not sure if relevant)
2. Click the mount button on the Drives Plasmoid
3. Enter passphrase
4. Click ok
5. dbus-broker crashes and pulls other dbus-connected applications with
   it
6. Despair in front of your unusable desktop (Logout/reboot in Plasma
   doesn't work anymore, probably because those are dbus actions?)
7. Desktop "disappears" some minutes later (Some watchdog kills kwin?)


Backtrace:

Using host libthread_db library "/usr/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/bin/dbus-broker --log 11 --controller 10 
--machine-id 185526166e484f06bc3b47fbfa9dd92a --max-bytes 100000000000000 
--max-fds 25000000000000 --max-matches 5000000000'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  __strlen_avx2 () at ../sysdeps/x86_64/multiarch/strlen-avx2.S:76

(gdb) bt
#0  __strlen_avx2 () at ../sysdeps/x86_64/multiarch/strlen-avx2.S:76
#1  0x0000558757e05deb in build_message_query_name (queryp=<synthetic pointer>, 
n_queryp=<synthetic pointer>, security_label=0x55878f319200 "plasmashell", 
security_label@entry=0x0, bustype=0x55878f1c36e0 "session",
    name=0x55878f3a1020 "unconfined", receiver_context=0x55878f1c7290 
"org.freedesktop.Notifications", path=0x55878f4049e0 
"/org/kde/solid/UDisks2StorageAccess_1", interface=0x0, method=0x55878f404a20 
"passphraseReply")
    at ../src/util/apparmor.c:246
#2  apparmor_message_query_name (check_send=check_send@entry=false, 
security_label=security_label@entry=0x55878f319200 "plasmashell", 
bustype=bustype@entry=0x55878f1c36e0 "session",
    receiver_context=receiver_context@entry=0x55878f3a1020 "unconfined", 
name=0x55878f1c7290 "org.freedesktop.Notifications", 
path=path@entry=0x55878f4049e0 "/org/kde/solid/UDisks2StorageAccess_1", 
interface=0x0,
    method=0x55878f404a20 "passphraseReply", allow=0x7ffce482ab50, 
audit=0x7ffce482aa6c) at ../src/util/apparmor.c:318
#3  0x0000558757e06101 in apparmor_message_query 
(check_send=check_send@entry=false, 
security_label=security_label@entry=0x55878f319200 "plasmashell", 
bustype=0x55878f1c36e0 "session",
    receiver_context=receiver_context@entry=0x55878f3a1020 "unconfined", 
nameset=nameset@entry=0x7ffce482ac90, subject_id=subject_id@entry=36, 
path=0x55878f4049e0 "/org/kde/solid/UDisks2StorageAccess_1", interface=0x0,
    method=0x55878f404a20 "passphraseReply", allow=0x7ffce482ab50, 
audit=0x7ffce482ab54) at ../src/util/apparmor.c:388
#4  0x0000558757e06d58 in bus_apparmor_check_send (registry=0x55878f1c3c70, 
sender_context=<optimized out>, 
receiver_context=receiver_context@entry=0x55878f1e1ae0 "plasmashell (complain)",
    subject=subject@entry=0x7ffce482ac90, subject_id=36, 
path=path@entry=0x55878f4049e0 "/org/kde/solid/UDisks2StorageAccess_1", 
interface=0x0, method=0x55878f404a20 "passphraseReply") at 
../src/util/apparmor.c:559
#5  0x0000558757dfdd71 in policy_snapshot_check_send 
(snapshot=snapshot@entry=0x55878f1f2970, subject_seclabel=0x55878f1e1ae0 
"plasmashell (complain)", subject=subject@entry=0x7ffce482ac90, 
subject_id=<optimized out>,
    interface=0x0, method=0x55878f404a20 "passphraseReply", path=0x55878f4049e0 
"/org/kde/solid/UDisks2StorageAccess_1", type=1, broadcast=false, n_fds=0) at 
../src/bus/policy.c:1067
#6  0x0000558757dfafd1 in peer_queue_unicast (sender_policy=0x55878f1f2970, 
sender_names=sender_names@entry=0x7ffce482ad40, 
sender_replies=sender_replies@entry=0x55878f22c6f0, sender_user=0x55878f1c2570, 
sender_id=33,
    receiver=0x55878f235ff0, message=0x55878f4044a0) at ../src/bus/peer.c:811
#7  0x0000558757df4ff4 in driver_forward_unicast (sender=0x55878f22bc70, 
destination=<optimized out>, message=0x55878f4044a0) at ../src/bus/driver.c:2595
#8  driver_dispatch_internal (peer=<optimized out>, message=0x55878f4044a0) at 
../src/bus/driver.c:2754
#9  driver_dispatch (peer=peer@entry=0x55878f22bc70, message=0x55878f4044a0) at 
../src/bus/driver.c:2778
#10 0x0000558757df9b4d in peer_dispatch_connection (peer=<optimized out>, 
events=<optimized out>) at ../src/bus/peer.c:129
#11 peer_dispatch (file=0x55878f22c620) at ../src/bus/peer.c:201
#12 0x0000558757e02d05 in dispatch_context_dispatch 
(ctx=ctx@entry=0x55878f1c1af0) at ../src/util/dispatch.c:343
#13 0x0000558757de9bf0 in broker_run (broker=0x55878f1c1980) at 
../src/broker/broker.c:203
#14 0x0000558757de8fc3 in run (log=0x7ffce482afe0) at ../src/broker/main.c:280
#15 main (argc=<optimized out>, argv=0x7ffce482b148) at ../src/broker/main.c:311

I'm reluctant to provide core dump, because passphrases/secrets...

There seems to be a Debian-specific patch around the AppArmor-stuff, so
I haven't reported this upstream yet.

Regards, Tobias

-- System Information:
Debian Release: forky/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.17.12+deb14-amd64 (SMP w/12 CPU threads; PREEMPT)
Kernel taint flags: TAINT_CPU_OUT_OF_SPEC
Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8), 
LANGUAGE=de:en_GB:en_US
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages dbus-broker depends on:
ii  dbus-system-bus-common  1.16.2-2
ii  init-system-helpers     1.69
ii  libapparmor1            4.1.0-1+b1
ii  libaudit1               1:4.1.2-1+b1
ii  libc6                   2.42-6
ii  libcap-ng0              0.8.5-4+b2
ii  libexpat1               2.7.3-1
ii  libselinux1             3.9-4+b1
ii  libsystemd0             259-1
ii  systemd-sysv            259-1

Versions of packages dbus-broker recommends:
ii  dbus-bin  1.16.2-2

dbus-broker suggests no packages.

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: dbus-broker
Source-Version: 37-4
Done: Luca Boccassi <[email protected]>

We believe that the bug you reported is fixed in the latest version of
dbus-broker, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Luca Boccassi <[email protected]> (supplier of updated dbus-broker package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 24 Dec 2025 12:32:17 +0000
Source: dbus-broker
Architecture: source
Version: 37-4
Distribution: unstable
Urgency: medium
Maintainer: Utopia Maintenance Team 
<[email protected]>
Changed-By: Luca Boccassi <[email protected]>
Closes: 1123876
Changes:
 dbus-broker (37-4) unstable; urgency=medium
 .
   * Drop priority from d/control, now defaults to optional
   * Bump Standards-version to 4.7.3
   * Refresh apparmor enablement backports based on latest upstream PR
   * Backport patch to avoid crash when querying apparmor (Closes:
     #1123876)
Checksums-Sha1:
 7b569040224ba096bcef3a176a72071a3d4a049d 2491 dbus-broker_37-4.dsc
 7e454f183cd13299d6000cb7fca26b58310a863f 15008 dbus-broker_37-4.debian.tar.xz
 22163b79cacdb7c7324df47037bb190fd02c6312 7950 dbus-broker_37-4_source.buildinfo
Checksums-Sha256:
 60cc9c791b1139c7e21fe54d0ebbe3ac886118d247a8449143b2d992e6c63fd2 2491 
dbus-broker_37-4.dsc
 81ec77bea8149d87930a29a490c287b369a1ad6d79437839ecd136a366008ca2 15008 
dbus-broker_37-4.debian.tar.xz
 d7431aa00e6dc8d66213a6411c4e00215a8818314d614c6a21e5cc6188e460e5 7950 
dbus-broker_37-4_source.buildinfo
Files:
 da351f472d10c399a4fb6c2218eae2f7 2491 admin optional dbus-broker_37-4.dsc
 e538ac39c83fbd38eefcf8e59b8489df 15008 admin optional 
dbus-broker_37-4.debian.tar.xz
 3a906b94a4693ccc596ea801d379e447 7950 admin optional 
dbus-broker_37-4_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=whfm
-----END PGP SIGNATURE-----

Attachment: pgpYTZJohniNh.pgp
Description: PGP signature


--- End Message ---

Reply via email to