http://bugzilla.novell.com/show_bug.cgi?id=551346 Summary: backend_connect SEGV if backend mechanism list in capability reply is empty Classification: openSUSE Product: openSUSE 11.2 Version: RC 2 Platform: All OS/Version: openSUSE 11.2 Status: NEW Severity: Normal Priority: P5 - None Component: Network AssignedTo: bnc-team-screening@forge.provo.novell.com ReportedBy: lauffer@ph-freiburg.de QAContact: qa@suse.de Found By: --- User-Agent: Mozilla/5.0 (X11; U; Linux i686; de; rv:1.9.0.14) Gecko/2009090900 SUSE/3.0.14-0.1.2 Firefox/3.0.14 Note: cyrus-imapd from SLES-11 is affected with this bug, too. I used the same summary for this bug like https://bugzilla.andrew.cmu.edu/show_bug.cgi?id=3166 The descr. there is: "...If a backend server in a murder advertises no capabilities to the frontend proxy server (because, perhaps, it expects a STARTTLS first), mechlist in backend_connect is set to NULL. Before backend_authenticate gets called, this string gets xstrdup'd, which segfaults if the source string is a null pointer. .." In our situation we struggled into this in a cyrus murder concent where the mupdate server (frontend) was a 2.3.14 (sles11) and one backend server was a 2.2.12 (sles10). It's true that there are more reasons why you should not use a 2.3 frontend with 2.2 backends but besides this I thing this bug should be fixed anyway. The link above includes a working patch. Reproducible: Always Steps to Reproduce: 1. set up a cyrus murder concept with a sless11, openSUSE-11.2rc2 cyrus (any newer 2.3.x) and with a backend server with (for at least) cyrus-imapd-2.2.12 (like sles10 comes with) 2. use tls/ssl in your cyrus-imapd servers 3. use lmtpproxy to deliver Mails from the proxy to the backend 3. try to deliver a mail through the proxy. In this case there will be a tls handshake ending in the segfault -- Configure bugmail: http://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.