Package: mutt Version: 1.5.20-7 Severity: important
If the user tries to send a GnuPG message, but realises during the key selection step that they have made a mistake such as: - trying to send encrypted email to someone they don't have a key for - failing to BCC themselves in order to keep a decryptable copy of the message - picking the wrong PGP mode for this message etc There is no longer any way to escape from the key selection menus back to the message composition menu. The user must either kill mutt and loose the message, or send some nonsense encrypted with the wrong keys to the recipients. This is extremely bad! -- Package-specific info: Mutt 1.5.20 (2009-06-14) Copyright (C) 1996-2009 Michael R. Elkins and others. Mutt comes with ABSOLUTELY NO WARRANTY; for details type `mutt -vv'. Mutt is free software, and you are welcome to redistribute it under certain conditions; type `mutt -vv' for details. System: Linux 2.6.32-1-686-bigmem (i686) ncurses: ncurses 5.7.20090803 (compiled with 5.7) libidn: 1.15 (compiled with 1.15) hcache backend: GDBM version 1.8.3. 10/15/2002 (built Oct 12 2009 09:53:17) Compile options: -DOMAIN +DEBUG -HOMESPOOL +USE_SETGID +USE_DOTLOCK +DL_STANDALONE +USE_FCNTL -USE_FLOCK +USE_POP +USE_IMAP +USE_SMTP -USE_SSL_OPENSSL +USE_SSL_GNUTLS +USE_SASL +USE_GSS +HAVE_GETADDRINFO +HAVE_REGCOMP -USE_GNU_REGEX +HAVE_COLOR +HAVE_START_COLOR +HAVE_TYPEAHEAD +HAVE_BKGDSET +HAVE_CURS_SET +HAVE_META +HAVE_RESIZETERM +CRYPT_BACKEND_CLASSIC_PGP +CRYPT_BACKEND_CLASSIC_SMIME +CRYPT_BACKEND_GPGME -EXACT_ADDRESS -SUN_ATTACHMENT +ENABLE_NLS -LOCALES_HACK +COMPRESSED +HAVE_WC_FUNCS +HAVE_LANGINFO_CODESET +HAVE_LANGINFO_YESEXPR +HAVE_ICONV -ICONV_NONTRANS +HAVE_LIBIDN +HAVE_GETSID +USE_HCACHE -ISPELL SENDMAIL="/usr/sbin/sendmail" MAILPATH="/var/mail" PKGDATADIR="/usr/share/mutt" SYSCONFDIR="/etc" EXECSHELL="/bin/sh" MIXMASTER="mixmaster" To contact the developers, please mail to <[email protected]>. To report a bug, please visit http://bugs.mutt.org/. patch-1.5.13.cd.ifdef.2 -- System Information: Debian Release: squeeze/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.32-1-686-bigmem (SMP w/2 CPU cores) Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages mutt depends on: ii libc6 2.10.2-4 Embedded GNU C Library: Shared lib ii libcomerr2 1.41.9-1 common error description library ii libgdbm3 1.8.3-7 GNU dbm database routines (runtime ii libgnutls26 2.8.4-2 the GNU TLS library - runtime libr ii libgpg-error0 1.6-1 library for common error values an ii libgpgme11 1.2.0-1 GPGME - GnuPG Made Easy ii libgssapi-krb5-2 1.8+dfsg~alpha1-7 MIT Kerberos runtime libraries - k ii libidn11 1.15-2 GNU Libidn library, implementation ii libk5crypto3 1.8+dfsg~alpha1-7 MIT Kerberos runtime libraries - C ii libkrb5-3 1.8+dfsg~alpha1-7 MIT Kerberos runtime libraries ii libncursesw5 5.7+20090803-2 shared libraries for terminal hand ii libsasl2-2 2.1.23.dfsg1-2 Cyrus SASL - authentication abstra Versions of packages mutt recommends: ii exim4-daemon-light [mail- 4.69-11+b1 lightweight Exim MTA (v4) daemon ii libsasl2-modules 2.1.23.dfsg1-2 Cyrus SASL - pluggable authenticat ii locales 2.10.2-4 Embedded GNU C Library: National L ii mime-support 3.46-1 MIME files 'mime.types' & 'mailcap Versions of packages mutt suggests: ii aspell 0.60.6-2 GNU Aspell spell-checker ii ca-certificates 20090814 Common CA certificates ii gnupg 1.4.10-2 GNU privacy guard - a free PGP rep ii ispell 3.1.20.0-6 International Ispell (an interacti pn mixmaster <none> (no description available) ii openssl 0.9.8k-8 Secure Socket Layer (SSL) binary a pn urlview <none> (no description available) Versions of packages mutt is related to: ii mutt 1.5.20-7 text-based mailreader supporting M pn mutt-dbg <none> (no description available) pn mutt-patched <none> (no description available) -- no debconf information -- To UNSUBSCRIBE, email to [email protected] with a subject of "unsubscribe". Trouble? Contact [email protected]

