Package: openssl-blacklist
Version: 0.5-3
Severity: normal

openssl-vulnkey fails when applied to a file which is not x509, req or
rsa. This breaks doing something like "openssl vulnkey *" in a keys
directory, because it stops processing once it fails.

------------------------------------------------------------
$ openssl vulnkey *
[...]
Traceback (most recent call last):
  File "/usr/bin/openssl-vulnkey", line 182, in <module>
    "(not x509, req or rsa)" % (realname)
TypeError: not all arguments converted during string formatting
------------------------------------------------------------

The reason is fairly obvious:

------------------------------------------------------------
if not options.quiet:
    print >> sys.stderr, "Skipped: '%s' is unsupported type " + \
                         "(not x509, req or rsa)" % (realname)
------------------------------------------------------------

The % operator is more strongly binding than +, therefore it is
applied only to the string "(not x509, req or rsa)", not to the string
with the '%s'.

        Sami


-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.14.4 (SMP w/8 CPU cores; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=fi_FI.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages openssl-blacklist depends on:
ii  dpkg     1.17.10
ii  openssl  1.0.1h-3
ii  python   2.7.6-2

openssl-blacklist recommends no packages.

openssl-blacklist suggests no packages.

-- no debconf information

Attachment: signature.asc
Description: Digital signature

Reply via email to