Bug#505279: libgnutls26: segfault in _gnutls_x509_crt_get_raw_dn2
Simon Josefsson
simon at josefsson.org
Tue Nov 11 13:41:39 UTC 2008
Michael Meskes <meskes at debian.org> writes:
> Package: libgnutls26
> Version: 2.4.2-2
> Severity: critical
> Justification: breaks unrelated software
>
> Since updating libgnutls26 today I cannot use mutt anymore because it gets a
> segfault. Here's what gdb says:
>
> #0 0xf7e13ff4 in _gnutls_x509_crt_get_raw_dn2 (cert=0x11, whom=0xf7e4e367 "issuer", start=0xff9b6a04) at x509.c:1718
> #1 0xf7e18c9a in is_issuer (cert=0xf7e4cdce, issuer_cert=0x89c4d90) at verify.c:164
> #2 0xf7e19b12 in _gnutls_verify_certificate2 (cert=0x11, trusted_cas=<value optimized out>, tcas_size=145, flags=0, output=0xff9b6ac8)
> at verify.c:199
> #3 0xf7e1a381 in gnutls_x509_crt_list_verify (cert_list=0x8b27a68, cert_list_length=0, CA_list=0x8b1e250, CA_list_length=145, CRL_list=0x0,
> CRL_list_length=0, flags=0, verify=0xff9b6b8c) at verify.c:396
> #4 0xf7dfc64c in _gnutls_x509_cert_verify_peers (session=0x8b26540, status=0xff9b6b8c) at gnutls_x509.c:176
> #5 0xf7dee921 in gnutls_certificate_verify_peers2 (session=0x8b26540, status=0xff9b6b8c) at gnutls_cert.c:606
> #6 0xf7dee959 in gnutls_certificate_verify_peers (session=0x8b26540) at gnutls_cert.c:639
> #7 0x080d46d8 in tls_check_certificate (conn=0x89c38b8) at ../mutt_ssl_gnutls.c:509
> #8 0x080d5ad8 in tls_negotiate (conn=0x89c38b8) at ../mutt_ssl_gnutls.c:269
> #9 0x080d5c85 in mutt_ssl_starttls (conn=0x89c38b8) at ../mutt_ssl_gnutls.c:162
> #10 0x080de14d in imap_open_connection (idata=0x89c3e30) at ../../imap/imap.c:436
> #11 0x080de3fd in imap_conn_find (account=0xff9b83c4, flags=<value optimized out>) at ../../imap/imap.c:367
> #12 0x080df1d1 in imap_open_mailbox (ctx=0x89b8400) at ../../imap/imap.c:567
> ...
>
> Downgrading to 2.4.2-1 immediately fixes the problem.
Can you run
gnutls-cli -p 143 your.imap.server -s
then type:
. STARTTLS
and then press Ctrl-D, and cut'n'paste the output? I'm interested to
see the certificate chain of the server.
Are you using X.509 client certificate authentication? Then your client
certificate chain would be interesting too.
/Simon
More information about the Pkg-gnutls-maint
mailing list