Blame SOURCES/CVE-2019-11324.patch
|
|
afe2ee |
From 54e768a6dbe3cadeb456dea37bbeaf6e1e17e87c Mon Sep 17 00:00:00 2001
|
|
|
afe2ee |
From: Lumir Balhar <lbalhar@redhat.com>
|
|
|
afe2ee |
Date: Thu, 9 Jan 2020 10:47:27 +0100
|
|
|
afe2ee |
Subject: [PATCH] CVE-2019-11324 Certification mishandle when error should be
|
|
|
afe2ee |
thrown
|
|
|
afe2ee |
|
|
|
afe2ee |
---
|
|
|
afe2ee |
util/ssl_.py | 2 +-
|
|
|
afe2ee |
1 file changed, 1 insertion(+), 1 deletion(-)
|
|
|
afe2ee |
|
|
|
afe2ee |
diff --git a/util/ssl_.py b/util/ssl_.py
|
|
|
afe2ee |
index 32fd9ed..f9f12ff 100644
|
|
|
afe2ee |
--- a/util/ssl_.py
|
|
|
afe2ee |
+++ b/util/ssl_.py
|
|
|
afe2ee |
@@ -319,7 +319,7 @@ def ssl_wrap_socket(sock, keyfile=None, certfile=None, cert_reqs=None,
|
|
|
afe2ee |
if e.errno == errno.ENOENT:
|
|
|
afe2ee |
raise SSLError(e)
|
|
|
afe2ee |
raise
|
|
|
afe2ee |
- elif getattr(context, 'load_default_certs', None) is not None:
|
|
|
afe2ee |
+ elif ssl_context is None and hasattr(context, 'load_default_certs'):
|
|
|
afe2ee |
# try to load OS default certs; works well on Windows (require Python3.4+)
|
|
|
afe2ee |
context.load_default_certs()
|
|
|
afe2ee |
|
|
|
afe2ee |
--
|
|
|
afe2ee |
2.24.1
|
|
|
afe2ee |
|