The primary issue is we are assuming that an SSL context will always
initialise, and run SSL_CTX_load_verify_locations() unconditionally
against them:
ssl3ctx = SSL_CTX_new(SSLv3_client_method());
ssl23ctx = SSL_CTX_new(SSLv23_client_method());
tls1ctx = SSL_CTX_new(TLSv1_client_method());
#if OPENSSL_VERSION_NUMBER >= 0x01000100fL
tls11ctx = SSL_CTX_new(TLSv1_1_client_method());
tls12ctx = SSL_CTX_new(TLSv1_2_client_method());
#endif
if (exists_dir(opts.truststore))
capath = opts.truststore;
if (exists_file(opts.truststore))
cafile = opts.truststore;
SSL_CTX_load_verify_locations(ssl3ctx, cafile, capath);
SSL_CTX_load_verify_locations(ssl23ctx, cafile, capath);
SSL_CTX_load_verify_locations(tls1ctx, cafile, capath);
#if OPENSSL_VERSION_NUMBER >= 0x01000100fL
SSL_CTX_load_verify_locations(tls11ctx, cafile, capath);
SSL_CTX_load_verify_locations(tls12ctx, cafile, capath);
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1516585
Title:
imapfilter: core dump on initialisation following disabling of SSL3 in
libssl
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/imapfilter/+bug/1516585/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs