Your message dated Sun, 20 Sep 2015 17:48:48 +0000
with message-id <[email protected]>
and subject line Bug#763522: fixed in mutt 1.5.24-1
has caused the Debian Bug report #763522,
regarding mutt: SEGV when choosing pgp keyID from list (mutt/mutt-patched)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
763522: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=763522
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: mutt
Version: 1.5.23-1.1
Severity: important

Dear Maintainer,

mutt segfaults when selecting keyID from the list. 
Reproduce: compose email, choose encrypt/sign from PGP menu, be asked for the 
key (because for example you're  writing to someone whole email is different 
than anything in your pubring). Press [Enter] without entering keyID, a list of 
keys in pubring shows up. Choose any key, segfaut appears, mutt dies.
gdb output (just after segfault):

Program received signal SIGSEGV, Segmentation fault.
0x000000000048caf2 in pgp_getkeybystr (p=<optimized out>, abilities=2, 
keyring=<optimized out>
                    at ../pgpkey.c:997
997  ../pgpkey.c: No such file or directory.

Seeems similar to: 
http://bugs.mutt.org/trac/ticket/1665
and 
http://permalink.gmane.org/gmane.mail.mutt.devel/21584

but I don't see here in debian lists.
Mark duplicate if I missed it.
regards
WA


-- Package-specific info:
Mutt 1.5.23 (2014-03-12)
Copyright (C) 1996-2009 Michael R. Elkins and others.
Mutt comes with ABSOLUTELY NO WARRANTY; for details type `mutt -vv'.
Mutt is free software, and you are welcome to redistribute it
under certain conditions; type `mutt -vv' for details.

System: Linux 3.16-2-amd64 (x86_64)
ncurses: ncurses 5.9.20140913 (compiled with 5.9)
libidn: 1.29 (compiled with 1.29)
hcache backend: tokyocabinet 1.4.48

Compiler:
Using built-in specs.
COLLECT_GCC=gcc
COLLECT_LTO_WRAPPER=/usr/lib/gcc/x86_64-linux-gnu/4.9/lto-wrapper
Target: x86_64-linux-gnu
Configured with: ../src/configure -v --with-pkgversion='Debian 4.9.1-6' 
--with-bugurl=file:///usr/share/doc/gcc-4.9/README.Bugs 
--enable-languages=c,c++,java,go,d,fortran,objc,obj-c++ --prefix=/usr 
--program-suffix=-4.9 --enable-shared --enable-linker-build-id 
--libexecdir=/usr/lib --without-included-gettext --enable-threads=posix 
--with-gxx-include-dir=/usr/include/c++/4.9 --libdir=/usr/lib --enable-nls 
--with-sysroot=/ --enable-clocale=gnu --enable-libstdcxx-debug 
--enable-libstdcxx-time=yes --enable-gnu-unique-object --disable-vtable-verify 
--enable-plugin --with-system-zlib --disable-browser-plugin 
--enable-java-awt=gtk --enable-gtk-cairo 
--with-java-home=/usr/lib/jvm/java-1.5.0-gcj-4.9-amd64/jre --enable-java-home 
--with-jvm-root-dir=/usr/lib/jvm/java-1.5.0-gcj-4.9-amd64 
--with-jvm-jar-dir=/usr/lib/jvm-exports/java-1.5.0-gcj-4.9-amd64 
--with-arch-directory=amd64 --with-ecj-jar=/usr/share/java/eclipse-ecj.jar 
--enable-objc-gc --enable-multiarch --with-arch-32=i586 --with-abi=m64 
 --with-multilib-list=m32,m64,mx32 --enable-multilib --with-tune=generic 
--enable-checking=release --build=x86_64-linux-gnu --host=x86_64-linux-gnu 
--target=x86_64-linux-gnu
Thread model: posix
gcc version 4.9.1 (Debian 4.9.1-6) 

Configure options: '--prefix=/usr' '--sysconfdir=/etc' 
'--mandir=/usr/share/man' '--with-docdir=/usr/share/doc' 
'--with-mailpath=/var/mail' '--disable-dependency-tracking' 
'--enable-compressed' '--enable-debug' '--enable-fcntl' '--enable-hcache' 
'--enable-gpgme' '--enable-imap' '--enable-smtp' '--enable-pop' '--with-curses' 
'--with-gnutls' '--with-gss' '--with-idn' '--with-mixmaster' '--with-sasl' 
'--without-gdbm' '--without-bdb' '--without-qdbm' '--build' 'x86_64-linux-gnu' 
'--enable-nntp' 'build_alias=x86_64-linux-gnu' 'CFLAGS=-g -O2 
-fstack-protector-strong -Wformat -Werror=format-security -Wall' 
'LDFLAGS=-Wl,-z,relro' 'CPPFLAGS=-D_FORTIFY_SOURCE=2 -I/usr/include/qdbm'

Compilation CFLAGS: -g -O2 -fstack-protector-strong -Wformat 
-Werror=format-security -Wall

Compile options:
-DOMAIN
+DEBUG
-HOMESPOOL  +USE_SETGID  +USE_DOTLOCK  +DL_STANDALONE  +USE_FCNTL  -USE_FLOCK   
+USE_POP  +USE_NNTP  +USE_IMAP  +USE_SMTP  
-USE_SSL_OPENSSL  +USE_SSL_GNUTLS  +USE_SASL  +USE_GSS  +HAVE_GETADDRINFO  
+HAVE_REGCOMP  -USE_GNU_REGEX  
+HAVE_COLOR  +HAVE_START_COLOR  +HAVE_TYPEAHEAD  +HAVE_BKGDSET  
+HAVE_CURS_SET  +HAVE_META  +HAVE_RESIZETERM  
+CRYPT_BACKEND_CLASSIC_PGP  +CRYPT_BACKEND_CLASSIC_SMIME  +CRYPT_BACKEND_GPGME  
-EXACT_ADDRESS  -SUN_ATTACHMENT  
+ENABLE_NLS  -LOCALES_HACK  +COMPRESSED  +HAVE_WC_FUNCS  +HAVE_LANGINFO_CODESET 
 +HAVE_LANGINFO_YESEXPR  
+HAVE_ICONV  -ICONV_NONTRANS  +HAVE_LIBIDN  +HAVE_GETSID  +USE_HCACHE  
-ISPELL
SENDMAIL="/usr/sbin/sendmail"
MAILPATH="/var/mail"
PKGDATADIR="/usr/share/mutt"
SYSCONFDIR="/etc"
EXECSHELL="/bin/sh"
MIXMASTER="mixmaster"
To contact the developers, please mail to <[email protected]>.
To report a bug, please visit http://bugs.mutt.org/.

misc/am-maintainer-mode.patch
features/ifdef.patch
features/xtitles.patch
features/trash-folder.patch
features/purge-message.patch
features/imap_fast_trash.patch
features/sensible_browser_position.patch
features-old/patch-1.5.4.vk.pgp_verbose_mime.patch
features/compressed-folders.patch
features/compressed-folders.debian.patch
debian-specific/Muttrc.patch
debian-specific/Md.etc_mailname_gethostbyname.patch
debian-specific/use_usr_bin_editor.patch
debian-specific/correct_docdir_in_man_page.patch
debian-specific/dont_document_not_present_features.patch
debian-specific/document_debian_defaults.patch
debian-specific/assumed_charset-compat.patch
debian-specific/467432-write_bcc.patch
debian-specific/566076-build_doc_adjustments.patch
misc/define-pgp_getkeys_command.patch
misc/gpg.rc-paths.patch
misc/smime.rc.patch
misc/fix-configure-test-operator.patch
upstream/531430-imapuser.patch
upstream/543467-thread-segfault.patch
upstream/542817-smimekeys-tmpdir.patch
upstream/548577-gpgme-1.2.patch
upstream/553321-ansi-escape-segfault.patch
upstream/547980-smime_keys-chaining.patch
upstream/528233-readonly-open.patch
upstream/228671-pipe-mime.patch
upstream/383769-score-match.patch
upstream/603288-split-fetches.patch
upstream/611410-no-implicit_autoview-for-text-html.patch
upstream/path_max.patch
translations/update_german_translation.patch
__separator__mutt.org.patch
mutt-patched/sidebar.patch
mutt-patched/sidebar-dotpathsep.patch
mutt-patched/sidebar-utf8.patch
mutt-patched/multiple-fcc.patch
mutt-patched/sidebar-newonly.patch
mutt-patched/sidebar-delimnullwide.patch
mutt-patched/sidebar-compose.patch
mutt-patched/nntp.patch

-- System Information:
Debian Release: jessie/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.16-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages mutt depends on:
ii  libassuan0         2.1.2-2
ii  libc6              2.19-11
ii  libcomerr2         1.42.12-1
ii  libgnutls-deb0-28  3.3.8-2
ii  libgpg-error0      1.16-1
ii  libgpgme11         1.5.1-6
ii  libgssapi-krb5-2   1.12.1+dfsg-10
ii  libidn11           1.29-1
ii  libk5crypto3       1.12.1+dfsg-10
ii  libkrb5-3          1.12.1+dfsg-10
ii  libncursesw5       5.9+20140913-1
ii  libsasl2-2         2.1.26.dfsg1-11
ii  libtinfo5          5.9+20140913-1
ii  libtokyocabinet9   1.4.48-2

Versions of packages mutt recommends:
ii  exim4-daemon-light [mail-transport-agent]  4.84-2
ii  libsasl2-modules                           2.1.26.dfsg1-11
ii  locales                                    2.19-11
ii  mime-support                               3.56

Versions of packages mutt suggests:
ii  aspell           0.60.7~20110707-1.1
ii  ca-certificates  20140325
ii  gnupg            1.4.18-4
ii  ispell           3.3.02-6
pn  mixmaster        <none>
ii  openssl          1.0.1i-2
ii  urlview          0.9-19

Versions of packages mutt is related to:
ii  mutt          1.5.23-1.1
ii  mutt-dbg      1.5.23-1.1
ii  mutt-patched  1.5.23-1.1

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: mutt
Source-Version: 1.5.24-1

We believe that the bug you reported is fixed in the latest version of
mutt, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Christoph Berg <[email protected]> (supplier of updated mutt package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sun, 20 Sep 2015 17:58:34 +0200
Source: mutt
Binary: mutt mutt-patched mutt-dbg
Architecture: source amd64
Version: 1.5.24-1
Distribution: unstable
Urgency: medium
Maintainer: Antonio Radici <[email protected]>
Changed-By: Christoph Berg <[email protected]>
Description:
 mutt       - text-based mailreader supporting MIME, GPG, PGP and threading
 mutt-dbg   - debugging symbols for mutt
 mutt-patched - Mutt Mail User Agent with extra patches
Closes: 763522
Changes:
 mutt (1.5.24-1) unstable; urgency=medium
 .
   * Team upload.
 .
   [ Evgeni Golov ]
   * Fix implicit-function-declaration warnings during compile
 .
   [ Matteo F. Vescovi ]
   * Imported Upstream version 1.5.24 (Closes: #763522)
   * debian/patches/: patchset re-worked against v1.5.24
     - features-old/patch-1.5.4.vk.pgp_verbose_mime.patch dropped
       (applied upstream)
     - features/xtitles.patch dropped (different approach by upstream)
     - upstream/542817-smimekeys-tmpdir.patch dropped (applied upstream)
     - upstream/547980-smime_keys-chaining.patch dropped (applied upstream)
     - upstream/624058-gnutls-deprecated.patch dropped (applied upstream)
   * debian/control: S-V bump 3.9.5 => 3.9.6 (no changes needed)
   * debian/: GnuPG signature verification added
   * debian/watch: path to release tarballs updated
Checksums-Sha1:
 aad4f9d378602b19d26e177f1f87301516ceaf76 2207 mutt_1.5.24-1.dsc
 38a2da5eb01ff83a90a2caee28fa2e95dbfe6898 3897115 mutt_1.5.24.orig.tar.gz
 3f0ba0444a1221f62c3e2e493d7c311159ffd9f5 132716 mutt_1.5.24-1.debian.tar.xz
 2b8223010b2bc598a5910a9f65140d363b217754 2241052 mutt-dbg_1.5.24-1_amd64.deb
 333e3dfc25f5a8173b53336ebb9622aaed9c59dc 718100 mutt-patched_1.5.24-1_amd64.deb
 da5c7da9ac7563b8ef0f2783ce74c264d05facf1 1464030 mutt_1.5.24-1_amd64.deb
Checksums-Sha256:
 8a52678879806a2317ee05da2013f9c6c7145396e6b9505c7ad7a9d1ccc57402 2207 
mutt_1.5.24-1.dsc
 a292ca765ed7b19db4ac495938a3ef808a16193b7d623d65562bb8feb2b42200 3897115 
mutt_1.5.24.orig.tar.gz
 1bbd63901c308b9ed1077e55a6fb3a3be5be5fb29b20d8f38105c663c2d1e589 132716 
mutt_1.5.24-1.debian.tar.xz
 2745346f226c77a34e44407939fc31cf8de5066cb76e0ba4afb22f7742b0c5ec 2241052 
mutt-dbg_1.5.24-1_amd64.deb
 9cafe049a7fa728f5e86b5cf291fe1d84297f7534c66ed82b344a6c5593e21fe 718100 
mutt-patched_1.5.24-1_amd64.deb
 78550f46c2d98eefb3fa359fb97869fa4c55dca12ebe0756fdc551271e759cbb 1464030 
mutt_1.5.24-1_amd64.deb
Files:
 2ef0725dbd5c170a1f7534c9a3c0048d 2207 mail standard mutt_1.5.24-1.dsc
 7f25d27f3c7c82285ac07aac35f5f0f2 3897115 mail standard mutt_1.5.24.orig.tar.gz
 7c3befa918c5c51050f44eb0691fd689 132716 mail standard 
mutt_1.5.24-1.debian.tar.xz
 a125e003d7b0d583ea6cdf24924d6099 2241052 debug extra 
mutt-dbg_1.5.24-1_amd64.deb
 2997661ce4c8b0d418f589038d352f00 718100 mail extra 
mutt-patched_1.5.24-1_amd64.deb
 b7b9806826c57d3a9c587c1f7939cf55 1464030 mail standard mutt_1.5.24-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCAAGBQJV/vBjAAoJEExaa6sS0qeu6aMP/jsbex6VdIFxmeqo6lfkFSga
1TIX13+fzWVCPHv+sr67yLGSD5aA2+t0N6c3zijEfy3/gTaPnW5Hp+Xn4OOMdIeO
HUvMFzyvBvUKCoUaOcbL9a38ZVe9N4mizeQ4kPyVg+3xeHUwSHn7eynmgLYnCVCe
S8xJVZ7mXt4kK2spJ/QnzAnMuQhLUMvX+8F258Bn49kr5I0tuMSrh18XkBGTLSLm
bdkYaHJcMF1sbrMiMziFSs5C8RSg32wBXGE1pAZy6bhZvjb7bkOTrerkEYyLvKIu
728Jd7W9XNJ5VDs63IO+VlSmOp77yQdQwQ+kqMHh9kNRlQsEPyc/bvJ3augXxXk6
3yelDvVJc5VViQoJg3+AueGO4TKS80iOaOKo70S9UyBfZZnksb4jp3acZR01XuVN
L1apnOvHh1xu65NklQEaJVZTCEL4y73RHzX9QTf2lH8bOyBvWKi2pq3/AA4aujow
trRII5j72iH6GPdE4icm881P3JYOWiR22kXPxYcNjTvt5HsxMnt9HfK8C5iazi6Y
24FA7mj35m8XEA6xFSuPdMm4Q0jhY2w2AGj5hKm2SywvMVzpiq+UIGf9PMV1EAJu
A4E+pZc+8eIqzworOJncvnyDAmdkRChxW+BlVBfu2pthqUJDEjQDr7+ivTWqMhG/
zuzKq6WXNSwq9/XqC4I8
=blig
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to