<<< Date Index >>>     <<< Thread Index >>>

mutt/2199: [gpgme] Sending ^C while running pinentry segfaults Mutt



>Number:         2199
>Notify-List:    
>Category:       mutt
>Synopsis:       [gpgme] Sending ^C while running pinentry segfaults Mutt
>Confidential:   no
>Severity:       normal
>Priority:       medium
>Responsible:    mutt-dev
>State:          open
>Keywords:       
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Tue Mar 21 17:34:14 +0100 2006
>Originator:     Ed Schouten
>Release:        1.5.11
>Organization:
>Environment:
FreeBSD zonk.fxq.nl 7.0-CURRENT FreeBSD 7.0-CURRENT #0: Sun Mar 19 18:58:46 CET 
2006     root@xxxxxxxxxxx:/usr/obj/export/src/sys/ZONK  i386

gnupg-1.4.2.2       The GNU Privacy Guard
gnupg-devel-1.9.20_1 Prerelease package of GnuPG extensions for GnuPG 2.0
gpgme-1.0.3_1       A library to make access to GnuPG easier
mutt-devel-lite-1.5.11_2 The Mongrel of Mail User Agents (development version, 
lite 
>Description:
When entering your passphrase into the pinentry application when using Mutt in 
combination with GPGME, it's possible to segfault Mutt. Just press ^C in the 
terminal running Mutt (or pinentry, when using the curses application)
>How-To-Repeat:
Compose a message that is signed with PGP. When the passphrase dialog is on 
screen, switch to the terminal running Mutt (the current terminal when using 
the curses application). Press ^C. Mutt will exit with a segmentation fault.
>Fix:
Unknown
>Add-To-Audit-Trail:

>Unformatted: