Bug#631017: crash on group reply

2013-10-17 Thread C. Meissa
tags 631017 fixed-upstream
thanks

Bug seems to be fixed in upstream’s HEAD.


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#631017: crash on group reply

2012-04-22 Thread Arne Wichmann
tags 631017 + upstream confirmed

This problem is known upstream: http://dev.mutt.org/trac/ticket/3531

cu

AW
-- 
[...] If you don't want to be restricted, don't agree to it. If you are
coerced, comply as much as you must to protect yourself, just don't support
it. Noone can free you but yourself. (crag, on Debian Planet)
Arne Wichmann (a...@linux.de)


signature.asc
Description: Digital signature


Bug#631017: crash on group reply

2012-01-30 Thread C.M.
Package: mutt
Version: 1.5.21-5
Followup-For: Bug #631017

Hi,
this problem happens for me on current unstable AND stable, too.
This also applies for a vanilla mutt/1.5.21.

Superficially tested this happens when there is a trailing colon
in the To: (crashes for me on Reply AND Group Reply)
or CC: (crashes only on group reply) header.

Putting a leading colon or a colon to the middle of the Header won't
fail, just like any other character except a trailing colon in
To: or CC: makes mutt crash.

C.M.


-- Package-specific info:
Mutt 1.5.21 (2010-09-15)
Copyright (C) 1996-2009 Michael R. Elkins and others.
Mutt comes with ABSOLUTELY NO WARRANTY; for details type `mutt -vv'.
Mutt is free software, and you are welcome to redistribute it
under certain conditions; type `mutt -vv' for details.

System: Linux 3.2.0-1-amd64 (x86_64)
ncurses: ncurses 5.9.20110404 (compiled with 5.9)
libidn: 1.23 (compiled with 1.20)
hcache backend: tokyocabinet 1.4.37
Compile options:
-DOMAIN
+DEBUG
-HOMESPOOL  +USE_SETGID  +USE_DOTLOCK  +DL_STANDALONE  +USE_FCNTL  -USE_FLOCK   
+USE_POP  +USE_IMAP  +USE_SMTP  
-USE_SSL_OPENSSL  +USE_SSL_GNUTLS  +USE_SASL  +USE_GSS  +HAVE_GETADDRINFO  
+HAVE_REGCOMP  -USE_GNU_REGEX  
+HAVE_COLOR  +HAVE_START_COLOR  +HAVE_TYPEAHEAD  +HAVE_BKGDSET  
+HAVE_CURS_SET  +HAVE_META  +HAVE_RESIZETERM  
+CRYPT_BACKEND_CLASSIC_PGP  +CRYPT_BACKEND_CLASSIC_SMIME  +CRYPT_BACKEND_GPGME  
-EXACT_ADDRESS  -SUN_ATTACHMENT  
+ENABLE_NLS  -LOCALES_HACK  +COMPRESSED  +HAVE_WC_FUNCS  +HAVE_LANGINFO_CODESET 
 +HAVE_LANGINFO_YESEXPR  
+HAVE_ICONV  -ICONV_NONTRANS  +HAVE_LIBIDN  +HAVE_GETSID  +USE_HCACHE  
-ISPELL
SENDMAIL=/usr/sbin/sendmail
MAILPATH=/var/mail
PKGDATADIR=/usr/share/mutt
SYSCONFDIR=/etc
EXECSHELL=/bin/sh
MIXMASTER=mixmaster
To contact the developers, please mail to mutt-...@mutt.org.
To report a bug, please visit http://bugs.mutt.org/.

misc/am-maintainer-mode
features/ifdef
features/xtitles
features/trash-folder
features/purge-message
features/imap_fast_trash
features/sensible_browser_position
features-old/patch-1.5.4.vk.pgp_verbose_mime
features/compressed-folders
features/compressed-folders.debian
debian-specific/Muttrc
debian-specific/Md.etc_mailname_gethostbyname.diff
debian-specific/use_usr_bin_editor.diff
debian-specific/correct_docdir_in_man_page.diff
debian-specific/dont_document_not_present_features.diff
debian-specific/document_debian_defaults
debian-specific/assumed_charset-compat
debian-specific/467432-write_bcc.patch
debian-specific/566076-build_doc_adjustments.patch
misc/define-pgp_getkeys_command.diff
misc/gpg.rc-paths
misc/smime.rc
upstream/531430-imapuser.patch
upstream/537818-emptycharset.patch
upstream/543467-thread-segfault.patch
upstream/542817-smimekeys-tmpdir.patch
upstream/548577-gpgme-1.2.patch
upstream/553321-ansi-escape-segfault.patch
upstream/568295-references.patch
upstream/547980-smime_keys-chaining.patch
upstream/528233-readonly-open.patch
upstream/228671-pipe-mime.patch
upstream/383769-score-match.patch
upstream/578087-header-strchr.patch
upstream/603288-split-fetches.patch
upstream/537061-dont-recode-saved-attachments.patch
upstream/608706-fix-spelling-errors.patch
upstream/620854-pop3-segfault.patch
upstream/611412-bts-regexp.patch
upstream/624058-gnutls-deprecated-set-priority.patch
upstream/624085-gnutls-deprecated-verify-peers.patch
upstream/584138-mx_update_context-segfault.patch
upstream/619216-gnutls-CN-validation.patch
upstream/611410-no-implicit_autoview-for-text-html.patch
upstream/path_max
mutt.org

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-1-amd64 (SMP w/1 CPU core)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages mutt depends on:
ii  libc6 2.13-24
ii  libcomerr21.42-1
ii  libgnutls26   2.12.16-1
ii  libgpg-error0 1.10-2
ii  libgpgme111.2.0-1.4
ii  libgssapi-krb5-2  1.10+dfsg~beta1-2
ii  libidn11  1.23-2
ii  libk5crypto3  1.10+dfsg~beta1-2
ii  libkrb5-3 1.10+dfsg~beta1-2
ii  libncursesw5  5.9-4
ii  libsasl2-22.1.25.dfsg1-3
ii  libtokyocabinet8  1.4.37-6.1

Versions of packages mutt recommends:
ii  exim4-daemon-light [mail-transport-agent]  4.77-1+b1
ii  libsasl2-modules   2.1.25.dfsg1-3
ii  locales2.13-24
ii  mime-support   3.51-1

Versions of packages mutt suggests:
pn  aspell   0.60.7~20110707-1
pn  ca-certificates  none
pn  gnupg1.4.11-3
pn  ispell   3.3.02-5
pn  mixmasternone
pn  openssl  none
pn  urlview  none

Versions of packages mutt is related to:
pn  mutt  1.5.21-5
pn  mutt-dbg  none
pn  mutt-patched  none

-- no debconf information



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact 

Bug#631017: crash on group reply

2011-06-19 Thread Joey Hess
Package: mutt
Version: 1.5.21-5
Severity: normal

mutt is crashing if I do a group reply to a message in my inbox.
non-group reply doesn't crash. 

[42292.085328] mutt[26333]: segfault at c ip 080a7e9a sp bfd8b950 error 4 in 
mutt-org[8048000+d7000]

Backtrace from a debug build:

Program received signal SIGSEGV, Segmentation fault.
0x080b0fdf in rfc822_cpy_adr (addr=0x0, prune=1) at ../rfc822.c:804
804   for (; addr; addr = addr-next)
(gdb) bt
#0  0x080b0fdf in rfc822_cpy_adr (addr=0x0, prune=1) at ../rfc822.c:804
#1  0x080b1056 in rfc822_append (a=0x825cdc4, b=0x81ed958, prune=1)
at ../rfc822.c:834
#2  0x080b72d4 in mutt_fetch_recips (out=0x825cdb8, in=0x81ebc30, flags=3)
at ../send.c:561
#3  0x080b7884 in envelope_defaults (env=0x825cdb8, ctx=0x81b6000, 
cur=0x81f39d0, flags=3) at ../send.c:733
#4  0x080b8992 in ci_send_message (flags=3, msg=0x825cf40, tempfile=0x0, 
ctx=0x81b6000, cur=0x81f39d0) at ../send.c:1253
#5  0x0806e945 in mutt_index_menu () at ../curs_main.c:1990
#6  0x0808a8e4 in main (argc=1, argv=0xb284) at ../main.c:1026
(gdb) 

The relevant headers seem to be these, slightly modified for privacy
reasons. I can probably provide the full message, and certianly unmodified
headers privately if needed.. but my guess is the To: (which I have left
entirely unchanged) is causing the crash.

From: aaa aaa@nospam
Cc: xxx xxx@nospam,
 yyy@nospam,
 zzz@nospam, mmm mmm@nospam,
Joey Hess j...@kitenet.net, nnn nnn@nospam
References: 20110609161335.gg17...@.com 4df4b646.7000...@gmail.com
In-Reply-To: 4df4b646.7000...@gmail.com
To: Undisclosed.Recipients:
Message-Id: 201106151503.52166.aaa@nospam

-- Package-specific info:
Mutt 1.5.21 (2010-09-15)
Copyright (C) 1996-2009 Michael R. Elkins and others.
Mutt comes with ABSOLUTELY NO WARRANTY; for details type `mutt -vv'.
Mutt is free software, and you are welcome to redistribute it
under certain conditions; type `mutt -vv' for details.

System: Linux 2.6.32-5-686 (i686)
ncurses: ncurses 5.9.20110404 (compiled with 5.9)
libidn: 1.20 (compiled with 1.20)
hcache backend: tokyocabinet 1.4.37
Compile options:
-DOMAIN
+DEBUG
-HOMESPOOL  +USE_SETGID  +USE_DOTLOCK  +DL_STANDALONE  +USE_FCNTL  -USE_FLOCK   
+USE_POP  +USE_IMAP  +USE_SMTP  
-USE_SSL_OPENSSL  +USE_SSL_GNUTLS  +USE_SASL  +USE_GSS  +HAVE_GETADDRINFO  
+HAVE_REGCOMP  -USE_GNU_REGEX  
+HAVE_COLOR  +HAVE_START_COLOR  +HAVE_TYPEAHEAD  +HAVE_BKGDSET  
+HAVE_CURS_SET  +HAVE_META  +HAVE_RESIZETERM  
+CRYPT_BACKEND_CLASSIC_PGP  +CRYPT_BACKEND_CLASSIC_SMIME  +CRYPT_BACKEND_GPGME  
-EXACT_ADDRESS  -SUN_ATTACHMENT  
+ENABLE_NLS  -LOCALES_HACK  +COMPRESSED  +HAVE_WC_FUNCS  +HAVE_LANGINFO_CODESET 
 +HAVE_LANGINFO_YESEXPR  
+HAVE_ICONV  -ICONV_NONTRANS  +HAVE_LIBIDN  +HAVE_GETSID  +USE_HCACHE  
-ISPELL
SENDMAIL=/usr/sbin/sendmail
MAILPATH=/var/mail
PKGDATADIR=/usr/share/mutt
SYSCONFDIR=/etc
EXECSHELL=/bin/sh
MIXMASTER=mixmaster
To contact the developers, please mail to mutt-...@mutt.org.
To report a bug, please visit http://bugs.mutt.org/.

misc/am-maintainer-mode
features/ifdef
features/xtitles
features/trash-folder
features/purge-message
features/imap_fast_trash
features/sensible_browser_position
features-old/patch-1.5.4.vk.pgp_verbose_mime
features/compressed-folders
features/compressed-folders.debian
debian-specific/Muttrc
debian-specific/Md.etc_mailname_gethostbyname.diff
debian-specific/use_usr_bin_editor.diff
debian-specific/correct_docdir_in_man_page.diff
debian-specific/dont_document_not_present_features.diff
debian-specific/document_debian_defaults
debian-specific/assumed_charset-compat
debian-specific/467432-write_bcc.patch
debian-specific/566076-build_doc_adjustments.patch
misc/define-pgp_getkeys_command.diff
misc/gpg.rc-paths
misc/smime.rc
upstream/531430-imapuser.patch
upstream/537818-emptycharset.patch
upstream/543467-thread-segfault.patch
upstream/542817-smimekeys-tmpdir.patch
upstream/548577-gpgme-1.2.patch
upstream/553321-ansi-escape-segfault.patch
upstream/568295-references.patch
upstream/547980-smime_keys-chaining.patch
upstream/528233-readonly-open.patch
upstream/228671-pipe-mime.patch
upstream/383769-score-match.patch
upstream/578087-header-strchr.patch
upstream/603288-split-fetches.patch
upstream/537061-dont-recode-saved-attachments.patch
upstream/608706-fix-spelling-errors.patch
upstream/620854-pop3-segfault.patch
upstream/611412-bts-regexp.patch
upstream/624058-gnutls-deprecated-set-priority.patch
upstream/624085-gnutls-deprecated-verify-peers.patch
upstream/584138-mx_update_context-segfault.patch
upstream/619216-gnutls-CN-validation.patch
upstream/611410-no-implicit_autoview-for-text-html.patch
upstream/path_max
mutt.org

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-5-686 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages mutt depends on: