After an evaluation, GNOME has moved from Bugzilla to GitLab. Learn more about GitLab.
No new issues can be reported in GNOME Bugzilla anymore.
To report an issue in a GNOME project, go to GNOME GitLab.
Do not go to GNOME Gitlab for: Bluefish, Doxygen, GnuCash, GStreamer, java-gnome, LDTP, NetworkManager, Tomboy.
Bug 219485 - Evolution v1.0.1 fails to pass mails properly to gpg for signature verification
Evolution v1.0.1 fails to pass mails properly to gpg for signature verification
Status: RESOLVED DUPLICATE of bug 218935
Product: evolution
Classification: Applications
Component: Mailer
unspecified
Other All
: Normal normal
: ---
Assigned To: Evolution Triage Team
Evolution QA team
Depends on:
Blocks:
 
 
Reported: 2002-01-29 13:25 UTC by temp0008
Modified: 2002-01-29 22:25 UTC
See Also:
GNOME target: ---
GNOME version: ---



Description temp0008 2002-01-29 13:53:45 UTC
Package: Evolution
Priority: Normal
Version: 1.0.1
Synopsis: Evolution v1.0.1 fails to pass mails properly to gpg for signature verification
Bugzilla-Product: Evolution
Bugzilla-Component: Mailer

Description:
Mails which come from various sources fail to valiate as correctly
signed because apparently the first portion of the signed part gets cut
out.

A quick perl script chucked into the place of gpg to write out args and
stdin shows the problem...

Arguments passed to gpg: --verbose --no-secmem-warning --no-greeting
--no-tty --yes --batch --verify /tmp/evolution-pgp.X1cUva -

Filename "/tmp/evolution-pgp.X1cUva" contains:
1:
2: -----BEGIN PGP SIGNATURE-----
3: Version: PGP 6.5.8
4:
5: iQCVAwUBPFBhSKCVPMXQI2HJAQH5HAQAgW7wzSjezC68o+q8fDGgokZzgEK8+28I
6: 9PS9W4/Ah48+6LEnIW1gE0yfqTnt/vIONFZf0Wy2hfgUTJbLAj3kA5lGiCIu7aog
7: XSUwSnY7YOYa7i6tEWL0OoFWVtAWDlCf6ty1bt5UQqVAiLZcMzJlCehnLK/WHYq8
8: FrCx65d/sR0=
9: =DlDC
10: -----END PGP SIGNATURE-----

STDIN contained:
1:    Original release date: January 24, 2002^M
2:    Last revised: --^M
3:    Source: CERT/CC^M
4: ^M
5:    A complete revision history can be found at the end of this
file.^M
6: ^M
7: Systems Affected^M
(snipped)

The actual email starts with...
-----BEGIN PGP SIGNED MESSAGE-----

CERT Advisory CA-2002-02 Buffer Overflow in AOL ICQ

   Original release date: January 24, 2002
   Last revised: --
   Source: CERT/CC
(snipped)

Note that the "CERT Advisory CA-2002-02 Buffer Overflow in AOL ICQ" line
is missing during viewing of the email as well.




Unknown reporter: temp0008@dsurreal.org, changed to bugbuddy-import@ximian.com.

Comment 1 israel 2002-01-29 22:25:29 UTC

*** This bug has been marked as a duplicate of 218935 ***