Your message dated Sun, 20 Sep 2015 17:48:48 +0000 with message-id <[email protected]> and subject line Bug#763522: fixed in mutt 1.5.24-1 has caused the Debian Bug report #763522, regarding mutt: SEGV when choosing pgp keyID from list (mutt/mutt-patched) to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 763522: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=763522 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: mutt Version: 1.5.23-1.1 Severity: important Dear Maintainer, mutt segfaults when selecting keyID from the list. Reproduce: compose email, choose encrypt/sign from PGP menu, be asked for the key (because for example you're writing to someone whole email is different than anything in your pubring). Press [Enter] without entering keyID, a list of keys in pubring shows up. Choose any key, segfaut appears, mutt dies. gdb output (just after segfault): Program received signal SIGSEGV, Segmentation fault. 0x000000000048caf2 in pgp_getkeybystr (p=<optimized out>, abilities=2, keyring=<optimized out> at ../pgpkey.c:997 997 ../pgpkey.c: No such file or directory. Seeems similar to: http://bugs.mutt.org/trac/ticket/1665 and http://permalink.gmane.org/gmane.mail.mutt.devel/21584 but I don't see here in debian lists. Mark duplicate if I missed it. regards WA -- Package-specific info: Mutt 1.5.23 (2014-03-12) Copyright (C) 1996-2009 Michael R. Elkins and others. Mutt comes with ABSOLUTELY NO WARRANTY; for details type `mutt -vv'. Mutt is free software, and you are welcome to redistribute it under certain conditions; type `mutt -vv' for details. System: Linux 3.16-2-amd64 (x86_64) ncurses: ncurses 5.9.20140913 (compiled with 5.9) libidn: 1.29 (compiled with 1.29) hcache backend: tokyocabinet 1.4.48 Compiler: Using built-in specs. COLLECT_GCC=gcc COLLECT_LTO_WRAPPER=/usr/lib/gcc/x86_64-linux-gnu/4.9/lto-wrapper Target: x86_64-linux-gnu Configured with: ../src/configure -v --with-pkgversion='Debian 4.9.1-6' --with-bugurl=file:///usr/share/doc/gcc-4.9/README.Bugs --enable-languages=c,c++,java,go,d,fortran,objc,obj-c++ --prefix=/usr --program-suffix=-4.9 --enable-shared --enable-linker-build-id --libexecdir=/usr/lib --without-included-gettext --enable-threads=posix --with-gxx-include-dir=/usr/include/c++/4.9 --libdir=/usr/lib --enable-nls --with-sysroot=/ --enable-clocale=gnu --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-gnu-unique-object --disable-vtable-verify --enable-plugin --with-system-zlib --disable-browser-plugin --enable-java-awt=gtk --enable-gtk-cairo --with-java-home=/usr/lib/jvm/java-1.5.0-gcj-4.9-amd64/jre --enable-java-home --with-jvm-root-dir=/usr/lib/jvm/java-1.5.0-gcj-4.9-amd64 --with-jvm-jar-dir=/usr/lib/jvm-exports/java-1.5.0-gcj-4.9-amd64 --with-arch-directory=amd64 --with-ecj-jar=/usr/share/java/eclipse-ecj.jar --enable-objc-gc --enable-multiarch --with-arch-32=i586 --with-abi=m64 --with-multilib-list=m32,m64,mx32 --enable-multilib --with-tune=generic --enable-checking=release --build=x86_64-linux-gnu --host=x86_64-linux-gnu --target=x86_64-linux-gnu Thread model: posix gcc version 4.9.1 (Debian 4.9.1-6) Configure options: '--prefix=/usr' '--sysconfdir=/etc' '--mandir=/usr/share/man' '--with-docdir=/usr/share/doc' '--with-mailpath=/var/mail' '--disable-dependency-tracking' '--enable-compressed' '--enable-debug' '--enable-fcntl' '--enable-hcache' '--enable-gpgme' '--enable-imap' '--enable-smtp' '--enable-pop' '--with-curses' '--with-gnutls' '--with-gss' '--with-idn' '--with-mixmaster' '--with-sasl' '--without-gdbm' '--without-bdb' '--without-qdbm' '--build' 'x86_64-linux-gnu' '--enable-nntp' 'build_alias=x86_64-linux-gnu' 'CFLAGS=-g -O2 -fstack-protector-strong -Wformat -Werror=format-security -Wall' 'LDFLAGS=-Wl,-z,relro' 'CPPFLAGS=-D_FORTIFY_SOURCE=2 -I/usr/include/qdbm' Compilation CFLAGS: -g -O2 -fstack-protector-strong -Wformat -Werror=format-security -Wall Compile options: -DOMAIN +DEBUG -HOMESPOOL +USE_SETGID +USE_DOTLOCK +DL_STANDALONE +USE_FCNTL -USE_FLOCK +USE_POP +USE_NNTP +USE_IMAP +USE_SMTP -USE_SSL_OPENSSL +USE_SSL_GNUTLS +USE_SASL +USE_GSS +HAVE_GETADDRINFO +HAVE_REGCOMP -USE_GNU_REGEX +HAVE_COLOR +HAVE_START_COLOR +HAVE_TYPEAHEAD +HAVE_BKGDSET +HAVE_CURS_SET +HAVE_META +HAVE_RESIZETERM +CRYPT_BACKEND_CLASSIC_PGP +CRYPT_BACKEND_CLASSIC_SMIME +CRYPT_BACKEND_GPGME -EXACT_ADDRESS -SUN_ATTACHMENT +ENABLE_NLS -LOCALES_HACK +COMPRESSED +HAVE_WC_FUNCS +HAVE_LANGINFO_CODESET +HAVE_LANGINFO_YESEXPR +HAVE_ICONV -ICONV_NONTRANS +HAVE_LIBIDN +HAVE_GETSID +USE_HCACHE -ISPELL SENDMAIL="/usr/sbin/sendmail" MAILPATH="/var/mail" PKGDATADIR="/usr/share/mutt" SYSCONFDIR="/etc" EXECSHELL="/bin/sh" MIXMASTER="mixmaster" To contact the developers, please mail to <[email protected]>. To report a bug, please visit http://bugs.mutt.org/. misc/am-maintainer-mode.patch features/ifdef.patch features/xtitles.patch features/trash-folder.patch features/purge-message.patch features/imap_fast_trash.patch features/sensible_browser_position.patch features-old/patch-1.5.4.vk.pgp_verbose_mime.patch features/compressed-folders.patch features/compressed-folders.debian.patch debian-specific/Muttrc.patch debian-specific/Md.etc_mailname_gethostbyname.patch debian-specific/use_usr_bin_editor.patch debian-specific/correct_docdir_in_man_page.patch debian-specific/dont_document_not_present_features.patch debian-specific/document_debian_defaults.patch debian-specific/assumed_charset-compat.patch debian-specific/467432-write_bcc.patch debian-specific/566076-build_doc_adjustments.patch misc/define-pgp_getkeys_command.patch misc/gpg.rc-paths.patch misc/smime.rc.patch misc/fix-configure-test-operator.patch upstream/531430-imapuser.patch upstream/543467-thread-segfault.patch upstream/542817-smimekeys-tmpdir.patch upstream/548577-gpgme-1.2.patch upstream/553321-ansi-escape-segfault.patch upstream/547980-smime_keys-chaining.patch upstream/528233-readonly-open.patch upstream/228671-pipe-mime.patch upstream/383769-score-match.patch upstream/603288-split-fetches.patch upstream/611410-no-implicit_autoview-for-text-html.patch upstream/path_max.patch translations/update_german_translation.patch __separator__mutt.org.patch mutt-patched/sidebar.patch mutt-patched/sidebar-dotpathsep.patch mutt-patched/sidebar-utf8.patch mutt-patched/multiple-fcc.patch mutt-patched/sidebar-newonly.patch mutt-patched/sidebar-delimnullwide.patch mutt-patched/sidebar-compose.patch mutt-patched/nntp.patch -- System Information: Debian Release: jessie/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 3.16-2-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages mutt depends on: ii libassuan0 2.1.2-2 ii libc6 2.19-11 ii libcomerr2 1.42.12-1 ii libgnutls-deb0-28 3.3.8-2 ii libgpg-error0 1.16-1 ii libgpgme11 1.5.1-6 ii libgssapi-krb5-2 1.12.1+dfsg-10 ii libidn11 1.29-1 ii libk5crypto3 1.12.1+dfsg-10 ii libkrb5-3 1.12.1+dfsg-10 ii libncursesw5 5.9+20140913-1 ii libsasl2-2 2.1.26.dfsg1-11 ii libtinfo5 5.9+20140913-1 ii libtokyocabinet9 1.4.48-2 Versions of packages mutt recommends: ii exim4-daemon-light [mail-transport-agent] 4.84-2 ii libsasl2-modules 2.1.26.dfsg1-11 ii locales 2.19-11 ii mime-support 3.56 Versions of packages mutt suggests: ii aspell 0.60.7~20110707-1.1 ii ca-certificates 20140325 ii gnupg 1.4.18-4 ii ispell 3.3.02-6 pn mixmaster <none> ii openssl 1.0.1i-2 ii urlview 0.9-19 Versions of packages mutt is related to: ii mutt 1.5.23-1.1 ii mutt-dbg 1.5.23-1.1 ii mutt-patched 1.5.23-1.1 -- no debconf information
--- End Message ---
--- Begin Message ---Source: mutt Source-Version: 1.5.24-1 We believe that the bug you reported is fixed in the latest version of mutt, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Christoph Berg <[email protected]> (supplier of updated mutt package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Sun, 20 Sep 2015 17:58:34 +0200 Source: mutt Binary: mutt mutt-patched mutt-dbg Architecture: source amd64 Version: 1.5.24-1 Distribution: unstable Urgency: medium Maintainer: Antonio Radici <[email protected]> Changed-By: Christoph Berg <[email protected]> Description: mutt - text-based mailreader supporting MIME, GPG, PGP and threading mutt-dbg - debugging symbols for mutt mutt-patched - Mutt Mail User Agent with extra patches Closes: 763522 Changes: mutt (1.5.24-1) unstable; urgency=medium . * Team upload. . [ Evgeni Golov ] * Fix implicit-function-declaration warnings during compile . [ Matteo F. Vescovi ] * Imported Upstream version 1.5.24 (Closes: #763522) * debian/patches/: patchset re-worked against v1.5.24 - features-old/patch-1.5.4.vk.pgp_verbose_mime.patch dropped (applied upstream) - features/xtitles.patch dropped (different approach by upstream) - upstream/542817-smimekeys-tmpdir.patch dropped (applied upstream) - upstream/547980-smime_keys-chaining.patch dropped (applied upstream) - upstream/624058-gnutls-deprecated.patch dropped (applied upstream) * debian/control: S-V bump 3.9.5 => 3.9.6 (no changes needed) * debian/: GnuPG signature verification added * debian/watch: path to release tarballs updated Checksums-Sha1: aad4f9d378602b19d26e177f1f87301516ceaf76 2207 mutt_1.5.24-1.dsc 38a2da5eb01ff83a90a2caee28fa2e95dbfe6898 3897115 mutt_1.5.24.orig.tar.gz 3f0ba0444a1221f62c3e2e493d7c311159ffd9f5 132716 mutt_1.5.24-1.debian.tar.xz 2b8223010b2bc598a5910a9f65140d363b217754 2241052 mutt-dbg_1.5.24-1_amd64.deb 333e3dfc25f5a8173b53336ebb9622aaed9c59dc 718100 mutt-patched_1.5.24-1_amd64.deb da5c7da9ac7563b8ef0f2783ce74c264d05facf1 1464030 mutt_1.5.24-1_amd64.deb Checksums-Sha256: 8a52678879806a2317ee05da2013f9c6c7145396e6b9505c7ad7a9d1ccc57402 2207 mutt_1.5.24-1.dsc a292ca765ed7b19db4ac495938a3ef808a16193b7d623d65562bb8feb2b42200 3897115 mutt_1.5.24.orig.tar.gz 1bbd63901c308b9ed1077e55a6fb3a3be5be5fb29b20d8f38105c663c2d1e589 132716 mutt_1.5.24-1.debian.tar.xz 2745346f226c77a34e44407939fc31cf8de5066cb76e0ba4afb22f7742b0c5ec 2241052 mutt-dbg_1.5.24-1_amd64.deb 9cafe049a7fa728f5e86b5cf291fe1d84297f7534c66ed82b344a6c5593e21fe 718100 mutt-patched_1.5.24-1_amd64.deb 78550f46c2d98eefb3fa359fb97869fa4c55dca12ebe0756fdc551271e759cbb 1464030 mutt_1.5.24-1_amd64.deb Files: 2ef0725dbd5c170a1f7534c9a3c0048d 2207 mail standard mutt_1.5.24-1.dsc 7f25d27f3c7c82285ac07aac35f5f0f2 3897115 mail standard mutt_1.5.24.orig.tar.gz 7c3befa918c5c51050f44eb0691fd689 132716 mail standard mutt_1.5.24-1.debian.tar.xz a125e003d7b0d583ea6cdf24924d6099 2241052 debug extra mutt-dbg_1.5.24-1_amd64.deb 2997661ce4c8b0d418f589038d352f00 718100 mail extra mutt-patched_1.5.24-1_amd64.deb b7b9806826c57d3a9c587c1f7939cf55 1464030 mail standard mutt_1.5.24-1_amd64.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJV/vBjAAoJEExaa6sS0qeu6aMP/jsbex6VdIFxmeqo6lfkFSga 1TIX13+fzWVCPHv+sr67yLGSD5aA2+t0N6c3zijEfy3/gTaPnW5Hp+Xn4OOMdIeO HUvMFzyvBvUKCoUaOcbL9a38ZVe9N4mizeQ4kPyVg+3xeHUwSHn7eynmgLYnCVCe S8xJVZ7mXt4kK2spJ/QnzAnMuQhLUMvX+8F258Bn49kr5I0tuMSrh18XkBGTLSLm bdkYaHJcMF1sbrMiMziFSs5C8RSg32wBXGE1pAZy6bhZvjb7bkOTrerkEYyLvKIu 728Jd7W9XNJ5VDs63IO+VlSmOp77yQdQwQ+kqMHh9kNRlQsEPyc/bvJ3augXxXk6 3yelDvVJc5VViQoJg3+AueGO4TKS80iOaOKo70S9UyBfZZnksb4jp3acZR01XuVN L1apnOvHh1xu65NklQEaJVZTCEL4y73RHzX9QTf2lH8bOyBvWKi2pq3/AA4aujow trRII5j72iH6GPdE4icm881P3JYOWiR22kXPxYcNjTvt5HsxMnt9HfK8C5iazi6Y 24FA7mj35m8XEA6xFSuPdMm4Q0jhY2w2AGj5hKm2SywvMVzpiq+UIGf9PMV1EAJu A4E+pZc+8eIqzworOJncvnyDAmdkRChxW+BlVBfu2pthqUJDEjQDr7+ivTWqMhG/ zuzKq6WXNSwq9/XqC4I8 =blig -----END PGP SIGNATURE-----
--- End Message ---

