[Bug 950078] Re: Segfault when using SSLv2

2015-03-26 Thread Marc Deslauriers
This issue doesn't affect any currently supported releases of Ubuntu as it is fixed in Ubuntu 12.04 LTS and above. Closing bug. ** Changed in: pyopenssl (Ubuntu) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subsc

[Bug 950078] Re: Segfault when using SSLv2

2012-03-09 Thread Marc Deslauriers
When we disabled SSLv2 in Maverick, one of our goals was to not change the ABI so we didn't need to rebuild the archive until we transitioned to OpenSSL 1.x. I seem to recall that setting OPENSSL_NO_SSL2 disabled a lot of code and changed ABI. I think it's too late to do this in a stable release,

[Bug 950078] Re: Segfault when using SSLv2

2012-03-09 Thread Jean-Paul Calderone
Maybe there are two bugs here. Thanks for pointing out the missing return value checking on the `SSL_CTX_new` call. pyOpenSSL prevents calls with SSLv2_METHOD if OPENSSL_NO_SSL2 is defined, though. Since the Ubuntu OpenSSL package does not support SSLv2, shouldn't it define OPENSSL_NO_SSL2? Tha

[Bug 950078] Re: Segfault when using SSLv2

2012-03-09 Thread Marc Deslauriers
** Changed in: pyopenssl (Ubuntu) Status: New => Confirmed ** Visibility changed to: Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/950078 Title: Segfault when using SSLv2 To manage n