GNOME Bugzilla – Bug 521086
crash in Email:
Last modified: 2008-03-08 20:07:25 UTC
Version: 2.10 What were you doing when the application crashed? Distribution: Fedora release 7 (Moonshine) Gnome Release: 2.18.3 2007-11-13 (Red Hat, Inc) BugBuddy Version: 2.18.0 System: Linux 2.6.23.15-80.fc7 #1 SMP Sun Feb 10 17:29:10 EST 2008 i686 X Vendor: The X.Org Foundation X Vendor Release: 10300000 Selinux: No Accessibility: Disabled GTK+ Theme: Bluecurve Icon Theme: Bluecurve Memory status: size: 205676544 vsize: 205676544 resident: 64663552 share: 55779328 rss: 64663552 rss_rlim: 4294967295 CPU usage: start_time: 1204923670 rtime: 320 utime: 281 stime: 39 cutime:0 cstime: 0 timeout: 0 it_real_value: 0 frequency: 100 Backtrace was generated from '/usr/bin/evolution' (no debugging symbols found) Using host libthread_db library "/lib/libthread_db.so.1". (no debugging symbols found) [Thread debugging using libthread_db enabled] [New Thread -1208334624 (LWP 2951)] [New Thread -1351619696 (LWP 3078)] [New Thread -1341129840 (LWP 3077)] [New Thread -1258419312 (LWP 2975)] (no debugging symbols found) 0x00110402 in __kernel_vsyscall ()
+ Trace 191683
Thread 1 (Thread -1208334624 (LWP 2951))
----------- .xsession-errors (10 sec old) --------------------- (evolution:2951): camel-pop3-provider-WARNING **: Bad server response: n15fo+Pqj2wP9iCBi4IB4Z+joHh56xMP4ADh2Zs4iT6H1olZlSl9b+qk5o90j3uIuXu/YxKGp5Ip (evolution:2951): camel-pop3-provider-WARNING **: Bad server response: X-Yandex-Front: mxfront21X-Yandex-TimeMark: 1204853160 (evolution:2951): camel-pop3-provider-WARNING **: Bad server response: Received-SPF: none (mxfront21: 217.16.31.140 is neither permitted nor denied by domain of mail.SecurityLab.ru; fakespf=pass) clie (evolution:2951): camel-pop3-provider-WARNING **: Bad server response: Received: from new_web ([217.16.31.136]) by mail.securitylab.ru with Microsoft SMTPSVC(6.0.3790.3959); (evolution:2951): camel-pop3-provider-WARNING **: Bad server response: Fri, 7 Mar 2008 04:25:52 +0300 --------------------------------------------------
Thanks for taking the time to report this bug. This particular bug has already been reported into our bug tracking system, but we are happy to tell you that the problem has already been fixed. It should be solved in the next software version. You may want to check for a software upgrade. *** This bug has been marked as a duplicate of 431459 ***