Package: mutt
Version: 1.5.21-5
Severity: normal
Tags: upstream

Dear Maintainer,

I recently needed to update by smime-keyring with a new version of my own
certificate to a new one, and saved it to a file named
"cacert kan...@ak-online.be renewed.p12".

Unfortunately 'smime_keys add_p12 "cacert kan...@ak-online.be renewed.p12"'
failed with the return code 256 from openssl and a dump of it's commandline
options.

I looked into smime_keys and found that the perl-script builds the command
in line 156 directly from $ARGV[1]:

>>>> snip <<<<
156:    my $cmd = "$opensslbin pkcs12 -in $ARGV[1] -out $pem_file";
157:        system $cmd and die "'$cmd' returned $?";
>>>> snip <<<<

The error-message also contained the exact commandline it tried to execute
which was:
>>>> snip <<<<
'/usr/bin/openssl pkcs12 -in cacert kan...@ak-online.be renewed.p12 -out
cacert kan...@ak-online.be renewed.p12.pem' returned 256 at
/usr/bin/smime_keys line 157.
>>>> snip <<<<

As there were no quotation marks around the filename I tried it with a
symlink to the same file, but without any space in the filename and it
worked like a charm.

I therefore think that there is some kind of escaping of $ARGV[1] neccesary
to stop smime_keys from passing the spaces directly to the shell that
executes openssl.

Kind regards, Andre

-- Package-specific info:
Mutt 1.5.21 (2010-09-15)
Copyright (C) 1996-2009 Michael R. Elkins and others.
Mutt comes with ABSOLUTELY NO WARRANTY; for details type `mutt -vv'.
Mutt is free software, and you are welcome to redistribute it
under certain conditions; type `mutt -vv' for details.

System: Linux 3.1.0-1-amd64 (x86_64)
ncurses: ncurses 5.9.20110404 (compiled with 5.9)
libidn: 1.23 (compiled with 1.20)
hcache backend: tokyocabinet 1.4.37
Compile options:
-DOMAIN
+DEBUG
-HOMESPOOL  +USE_SETGID  +USE_DOTLOCK  +DL_STANDALONE  +USE_FCNTL  -USE_FLOCK   
+USE_POP  +USE_IMAP  +USE_SMTP  
-USE_SSL_OPENSSL  +USE_SSL_GNUTLS  +USE_SASL  +USE_GSS  +HAVE_GETADDRINFO  
+HAVE_REGCOMP  -USE_GNU_REGEX  
+HAVE_COLOR  +HAVE_START_COLOR  +HAVE_TYPEAHEAD  +HAVE_BKGDSET  
+HAVE_CURS_SET  +HAVE_META  +HAVE_RESIZETERM  
+CRYPT_BACKEND_CLASSIC_PGP  +CRYPT_BACKEND_CLASSIC_SMIME  +CRYPT_BACKEND_GPGME  
-EXACT_ADDRESS  -SUN_ATTACHMENT  
+ENABLE_NLS  -LOCALES_HACK  +COMPRESSED  +HAVE_WC_FUNCS  +HAVE_LANGINFO_CODESET 
 +HAVE_LANGINFO_YESEXPR  
+HAVE_ICONV  -ICONV_NONTRANS  +HAVE_LIBIDN  +HAVE_GETSID  +USE_HCACHE  
-ISPELL
SENDMAIL="/usr/sbin/sendmail"
MAILPATH="/var/mail"
PKGDATADIR="/usr/share/mutt"
SYSCONFDIR="/etc"
EXECSHELL="/bin/sh"
MIXMASTER="mixmaster"
To contact the developers, please mail to <mutt-...@mutt.org>.
To report a bug, please visit http://bugs.mutt.org/.

misc/am-maintainer-mode
features/ifdef
features/xtitles
features/trash-folder
features/purge-message
features/imap_fast_trash
features/sensible_browser_position
features-old/patch-1.5.4.vk.pgp_verbose_mime
features/compressed-folders
features/compressed-folders.debian
debian-specific/Muttrc
debian-specific/Md.etc_mailname_gethostbyname.diff
debian-specific/use_usr_bin_editor.diff
debian-specific/correct_docdir_in_man_page.diff
debian-specific/dont_document_not_present_features.diff
debian-specific/document_debian_defaults
debian-specific/assumed_charset-compat
debian-specific/467432-write_bcc.patch
debian-specific/566076-build_doc_adjustments.patch
misc/define-pgp_getkeys_command.diff
misc/gpg.rc-paths
misc/smime.rc
upstream/531430-imapuser.patch
upstream/537818-emptycharset.patch
upstream/543467-thread-segfault.patch
upstream/542817-smimekeys-tmpdir.patch
upstream/548577-gpgme-1.2.patch
upstream/553321-ansi-escape-segfault.patch
upstream/568295-references.patch
upstream/547980-smime_keys-chaining.patch
upstream/528233-readonly-open.patch
upstream/228671-pipe-mime.patch
upstream/383769-score-match.patch
upstream/578087-header-strchr.patch
upstream/603288-split-fetches.patch
upstream/537061-dont-recode-saved-attachments.patch
upstream/608706-fix-spelling-errors.patch
upstream/620854-pop3-segfault.patch
upstream/611412-bts-regexp.patch
upstream/624058-gnutls-deprecated-set-priority.patch
upstream/624085-gnutls-deprecated-verify-peers.patch
upstream/584138-mx_update_context-segfault.patch
upstream/619216-gnutls-CN-validation.patch
upstream/611410-no-implicit_autoview-for-text-html.patch
upstream/path_max
mutt.org

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (500, 'testing'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.1.0-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages mutt depends on:
ii  libc6             2.13-23
ii  libcomerr2        1.42-1
ii  libgnutls26       2.12.14-5
ii  libgpg-error0     1.10-1
ii  libgpgme11        1.2.0-1.4
ii  libgssapi-krb5-2  1.10+dfsg~alpha2-1
ii  libidn11          1.23-2
ii  libk5crypto3      1.10+dfsg~alpha2-1
ii  libkrb5-3         1.10+dfsg~alpha2-1
ii  libncursesw5      5.9-4
ii  libsasl2-2        2.1.25.dfsg1-2
ii  libtokyocabinet8  1.4.37-6.1

Versions of packages mutt recommends:
ii  exim4-daemon-light [mail-transport-agent]  4.77-1+b1
ii  libsasl2-modules                           2.1.25.dfsg1-2
ii  locales                                    2.13-23
ii  mime-support                               3.51-1

Versions of packages mutt suggests:
pn  aspell           0.60.7~20110707-1
pn  ca-certificates  20111211
pn  gnupg            1.4.11-3
pn  ispell           3.3.02-5
pn  mixmaster        <none>
pn  openssl          1.0.0e-3
pn  urlview          <none>

Versions of packages mutt is related to:
pn  mutt          1.5.21-5
pn  mutt-dbg      <none>
pn  mutt-patched  <none>

-- no debconf information



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to