[Pkg-mutt-maintainers] Bug#827189: crashes with `free(): invalid next size` when sending to long addresses with gpgme and opportunistic encryption
Antonio Radici
antonio at debian.org
Tue Sep 13 18:00:24 UTC 2016
Control: tag -1 +confirmed pending
Control: forwarded -1 http://bugs.mutt.org/3873
On Mon, Jun 13, 2016 at 04:41:39PM +0200, chrysn wrote:
> Package: mutt
> Version: 1.6.1-1
> Severity: normal
>
> with very long recipient addresses (as for example used by github in
> reply-to for their issue tracker) with gpgme and opportunistic
> encryption enabled, mutt crashes with:
>
> *** Error in `mutt': free(): invalid next size (fast): 0x0000000001b163e0 ***
> ======= Backtrace: =========
> /lib/x86_64-linux-gnu/libc.so.6(+0x71fc5)[0x7f6d42d00fc5]
> /lib/x86_64-linux-gnu/libc.so.6(+0x77966)[0x7f6d42d06966]
> /lib/x86_64-linux-gnu/libc.so.6(+0x7814e)[0x7f6d42d0714e]
> mutt[0x473654]
> mutt[0x47cbac]
> mutt[0x4816c5]
> mutt[0x4141ff]
> mutt[0x4142ad]
> mutt[0x46514b]
> mutt[0x408981]
> /lib/x86_64-linux-gnu/libc.so.6(__libc_start_main+0xf0)[0x7f6d42caf5f0]
> [...]
> Aborted
Thanks for your bug report, it is perfectly reproducible.
The fix for this will be in 1.7.0-5 which I will release tonight (along with the
fix for another segfault).
More information about the Pkg-mutt-maintainers
mailing list