Blame SOURCES/httpd-2.4.37-CVE-2019-0215.patch
|
|
c49bed |
diff --git a/modules/ssl/ssl_engine_kernel.c b/modules/ssl/ssl_engine_kernel.c
|
|
|
c49bed |
index de0ffb0..e6a9f67 100644
|
|
|
c49bed |
--- a/modules/ssl/ssl_engine_kernel.c
|
|
|
c49bed |
+++ b/modules/ssl/ssl_engine_kernel.c
|
|
|
c49bed |
@@ -1154,6 +1154,7 @@ static int ssl_hook_Access_modern(request_rec *r, SSLSrvConfigRec *sc, SSLDirCon
|
|
|
c49bed |
ssl_log_ssl_error(SSLLOG_MARK, APLOG_ERR, r->server);
|
|
|
c49bed |
apr_table_setn(r->notes, "error-notes",
|
|
|
c49bed |
"Reason: Cannot perform Post-Handshake Authentication. ");
|
|
|
c49bed |
+ SSL_set_verify(ssl, vmode_inplace, NULL);
|
|
|
c49bed |
return HTTP_FORBIDDEN;
|
|
|
c49bed |
}
|
|
|
c49bed |
|
|
|
c49bed |
@@ -1175,6 +1176,7 @@ static int ssl_hook_Access_modern(request_rec *r, SSLSrvConfigRec *sc, SSLDirCon
|
|
|
c49bed |
* Finally check for acceptable renegotiation results
|
|
|
c49bed |
*/
|
|
|
c49bed |
if (OK != (rc = ssl_check_post_client_verify(r, sc, dc, sslconn, ssl))) {
|
|
|
c49bed |
+ SSL_set_verify(ssl, vmode_inplace, NULL);
|
|
|
c49bed |
return rc;
|
|
|
c49bed |
}
|
|
|
c49bed |
}
|