Bug#631017: crash on group reply
tags 631017 fixed-upstream thanks Bug seems to be fixed in upstream’s HEAD. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#631017: crash on group reply
tags 631017 + upstream confirmed This problem is known upstream: http://dev.mutt.org/trac/ticket/3531 cu AW -- [...] If you don't want to be restricted, don't agree to it. If you are coerced, comply as much as you must to protect yourself, just don't support it. Noone can free you but yourself. (crag, on Debian Planet) Arne Wichmann (a...@linux.de) signature.asc Description: Digital signature
Bug#631017: crash on group reply
Package: mutt Version: 1.5.21-5 Followup-For: Bug #631017 Hi, this problem happens for me on current unstable AND stable, too. This also applies for a vanilla mutt/1.5.21. Superficially tested this happens when there is a trailing colon in the To: (crashes for me on Reply AND Group Reply) or CC: (crashes only on group reply) header. Putting a leading colon or a colon to the middle of the Header won't fail, just like any other character except a trailing colon in To: or CC: makes mutt crash. C.M. -- Package-specific info: Mutt 1.5.21 (2010-09-15) Copyright (C) 1996-2009 Michael R. Elkins and others. Mutt comes with ABSOLUTELY NO WARRANTY; for details type `mutt -vv'. Mutt is free software, and you are welcome to redistribute it under certain conditions; type `mutt -vv' for details. System: Linux 3.2.0-1-amd64 (x86_64) ncurses: ncurses 5.9.20110404 (compiled with 5.9) libidn: 1.23 (compiled with 1.20) hcache backend: tokyocabinet 1.4.37 Compile options: -DOMAIN +DEBUG -HOMESPOOL +USE_SETGID +USE_DOTLOCK +DL_STANDALONE +USE_FCNTL -USE_FLOCK +USE_POP +USE_IMAP +USE_SMTP -USE_SSL_OPENSSL +USE_SSL_GNUTLS +USE_SASL +USE_GSS +HAVE_GETADDRINFO +HAVE_REGCOMP -USE_GNU_REGEX +HAVE_COLOR +HAVE_START_COLOR +HAVE_TYPEAHEAD +HAVE_BKGDSET +HAVE_CURS_SET +HAVE_META +HAVE_RESIZETERM +CRYPT_BACKEND_CLASSIC_PGP +CRYPT_BACKEND_CLASSIC_SMIME +CRYPT_BACKEND_GPGME -EXACT_ADDRESS -SUN_ATTACHMENT +ENABLE_NLS -LOCALES_HACK +COMPRESSED +HAVE_WC_FUNCS +HAVE_LANGINFO_CODESET +HAVE_LANGINFO_YESEXPR +HAVE_ICONV -ICONV_NONTRANS +HAVE_LIBIDN +HAVE_GETSID +USE_HCACHE -ISPELL SENDMAIL=/usr/sbin/sendmail MAILPATH=/var/mail PKGDATADIR=/usr/share/mutt SYSCONFDIR=/etc EXECSHELL=/bin/sh MIXMASTER=mixmaster To contact the developers, please mail to mutt-...@mutt.org. To report a bug, please visit http://bugs.mutt.org/. misc/am-maintainer-mode features/ifdef features/xtitles features/trash-folder features/purge-message features/imap_fast_trash features/sensible_browser_position features-old/patch-1.5.4.vk.pgp_verbose_mime features/compressed-folders features/compressed-folders.debian debian-specific/Muttrc debian-specific/Md.etc_mailname_gethostbyname.diff debian-specific/use_usr_bin_editor.diff debian-specific/correct_docdir_in_man_page.diff debian-specific/dont_document_not_present_features.diff debian-specific/document_debian_defaults debian-specific/assumed_charset-compat debian-specific/467432-write_bcc.patch debian-specific/566076-build_doc_adjustments.patch misc/define-pgp_getkeys_command.diff misc/gpg.rc-paths misc/smime.rc upstream/531430-imapuser.patch upstream/537818-emptycharset.patch upstream/543467-thread-segfault.patch upstream/542817-smimekeys-tmpdir.patch upstream/548577-gpgme-1.2.patch upstream/553321-ansi-escape-segfault.patch upstream/568295-references.patch upstream/547980-smime_keys-chaining.patch upstream/528233-readonly-open.patch upstream/228671-pipe-mime.patch upstream/383769-score-match.patch upstream/578087-header-strchr.patch upstream/603288-split-fetches.patch upstream/537061-dont-recode-saved-attachments.patch upstream/608706-fix-spelling-errors.patch upstream/620854-pop3-segfault.patch upstream/611412-bts-regexp.patch upstream/624058-gnutls-deprecated-set-priority.patch upstream/624085-gnutls-deprecated-verify-peers.patch upstream/584138-mx_update_context-segfault.patch upstream/619216-gnutls-CN-validation.patch upstream/611410-no-implicit_autoview-for-text-html.patch upstream/path_max mutt.org -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-1-amd64 (SMP w/1 CPU core) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages mutt depends on: ii libc6 2.13-24 ii libcomerr21.42-1 ii libgnutls26 2.12.16-1 ii libgpg-error0 1.10-2 ii libgpgme111.2.0-1.4 ii libgssapi-krb5-2 1.10+dfsg~beta1-2 ii libidn11 1.23-2 ii libk5crypto3 1.10+dfsg~beta1-2 ii libkrb5-3 1.10+dfsg~beta1-2 ii libncursesw5 5.9-4 ii libsasl2-22.1.25.dfsg1-3 ii libtokyocabinet8 1.4.37-6.1 Versions of packages mutt recommends: ii exim4-daemon-light [mail-transport-agent] 4.77-1+b1 ii libsasl2-modules 2.1.25.dfsg1-3 ii locales2.13-24 ii mime-support 3.51-1 Versions of packages mutt suggests: pn aspell 0.60.7~20110707-1 pn ca-certificates none pn gnupg1.4.11-3 pn ispell 3.3.02-5 pn mixmasternone pn openssl none pn urlview none Versions of packages mutt is related to: pn mutt 1.5.21-5 pn mutt-dbg none pn mutt-patched none -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact
Bug#631017: crash on group reply
Package: mutt Version: 1.5.21-5 Severity: normal mutt is crashing if I do a group reply to a message in my inbox. non-group reply doesn't crash. [42292.085328] mutt[26333]: segfault at c ip 080a7e9a sp bfd8b950 error 4 in mutt-org[8048000+d7000] Backtrace from a debug build: Program received signal SIGSEGV, Segmentation fault. 0x080b0fdf in rfc822_cpy_adr (addr=0x0, prune=1) at ../rfc822.c:804 804 for (; addr; addr = addr-next) (gdb) bt #0 0x080b0fdf in rfc822_cpy_adr (addr=0x0, prune=1) at ../rfc822.c:804 #1 0x080b1056 in rfc822_append (a=0x825cdc4, b=0x81ed958, prune=1) at ../rfc822.c:834 #2 0x080b72d4 in mutt_fetch_recips (out=0x825cdb8, in=0x81ebc30, flags=3) at ../send.c:561 #3 0x080b7884 in envelope_defaults (env=0x825cdb8, ctx=0x81b6000, cur=0x81f39d0, flags=3) at ../send.c:733 #4 0x080b8992 in ci_send_message (flags=3, msg=0x825cf40, tempfile=0x0, ctx=0x81b6000, cur=0x81f39d0) at ../send.c:1253 #5 0x0806e945 in mutt_index_menu () at ../curs_main.c:1990 #6 0x0808a8e4 in main (argc=1, argv=0xb284) at ../main.c:1026 (gdb) The relevant headers seem to be these, slightly modified for privacy reasons. I can probably provide the full message, and certianly unmodified headers privately if needed.. but my guess is the To: (which I have left entirely unchanged) is causing the crash. From: aaa aaa@nospam Cc: xxx xxx@nospam, yyy@nospam, zzz@nospam, mmm mmm@nospam, Joey Hess j...@kitenet.net, nnn nnn@nospam References: 20110609161335.gg17...@.com 4df4b646.7000...@gmail.com In-Reply-To: 4df4b646.7000...@gmail.com To: Undisclosed.Recipients: Message-Id: 201106151503.52166.aaa@nospam -- Package-specific info: Mutt 1.5.21 (2010-09-15) Copyright (C) 1996-2009 Michael R. Elkins and others. Mutt comes with ABSOLUTELY NO WARRANTY; for details type `mutt -vv'. Mutt is free software, and you are welcome to redistribute it under certain conditions; type `mutt -vv' for details. System: Linux 2.6.32-5-686 (i686) ncurses: ncurses 5.9.20110404 (compiled with 5.9) libidn: 1.20 (compiled with 1.20) hcache backend: tokyocabinet 1.4.37 Compile options: -DOMAIN +DEBUG -HOMESPOOL +USE_SETGID +USE_DOTLOCK +DL_STANDALONE +USE_FCNTL -USE_FLOCK +USE_POP +USE_IMAP +USE_SMTP -USE_SSL_OPENSSL +USE_SSL_GNUTLS +USE_SASL +USE_GSS +HAVE_GETADDRINFO +HAVE_REGCOMP -USE_GNU_REGEX +HAVE_COLOR +HAVE_START_COLOR +HAVE_TYPEAHEAD +HAVE_BKGDSET +HAVE_CURS_SET +HAVE_META +HAVE_RESIZETERM +CRYPT_BACKEND_CLASSIC_PGP +CRYPT_BACKEND_CLASSIC_SMIME +CRYPT_BACKEND_GPGME -EXACT_ADDRESS -SUN_ATTACHMENT +ENABLE_NLS -LOCALES_HACK +COMPRESSED +HAVE_WC_FUNCS +HAVE_LANGINFO_CODESET +HAVE_LANGINFO_YESEXPR +HAVE_ICONV -ICONV_NONTRANS +HAVE_LIBIDN +HAVE_GETSID +USE_HCACHE -ISPELL SENDMAIL=/usr/sbin/sendmail MAILPATH=/var/mail PKGDATADIR=/usr/share/mutt SYSCONFDIR=/etc EXECSHELL=/bin/sh MIXMASTER=mixmaster To contact the developers, please mail to mutt-...@mutt.org. To report a bug, please visit http://bugs.mutt.org/. misc/am-maintainer-mode features/ifdef features/xtitles features/trash-folder features/purge-message features/imap_fast_trash features/sensible_browser_position features-old/patch-1.5.4.vk.pgp_verbose_mime features/compressed-folders features/compressed-folders.debian debian-specific/Muttrc debian-specific/Md.etc_mailname_gethostbyname.diff debian-specific/use_usr_bin_editor.diff debian-specific/correct_docdir_in_man_page.diff debian-specific/dont_document_not_present_features.diff debian-specific/document_debian_defaults debian-specific/assumed_charset-compat debian-specific/467432-write_bcc.patch debian-specific/566076-build_doc_adjustments.patch misc/define-pgp_getkeys_command.diff misc/gpg.rc-paths misc/smime.rc upstream/531430-imapuser.patch upstream/537818-emptycharset.patch upstream/543467-thread-segfault.patch upstream/542817-smimekeys-tmpdir.patch upstream/548577-gpgme-1.2.patch upstream/553321-ansi-escape-segfault.patch upstream/568295-references.patch upstream/547980-smime_keys-chaining.patch upstream/528233-readonly-open.patch upstream/228671-pipe-mime.patch upstream/383769-score-match.patch upstream/578087-header-strchr.patch upstream/603288-split-fetches.patch upstream/537061-dont-recode-saved-attachments.patch upstream/608706-fix-spelling-errors.patch upstream/620854-pop3-segfault.patch upstream/611412-bts-regexp.patch upstream/624058-gnutls-deprecated-set-priority.patch upstream/624085-gnutls-deprecated-verify-peers.patch upstream/584138-mx_update_context-segfault.patch upstream/619216-gnutls-CN-validation.patch upstream/611410-no-implicit_autoview-for-text-html.patch upstream/path_max mutt.org -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.32-5-686 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages mutt depends on: