Blame SOURCES/CVE-2019-11324.patch

38a001
From 54e768a6dbe3cadeb456dea37bbeaf6e1e17e87c Mon Sep 17 00:00:00 2001
38a001
From: Lumir Balhar <lbalhar@redhat.com>
38a001
Date: Thu, 9 Jan 2020 10:47:27 +0100
38a001
Subject: [PATCH] CVE-2019-11324 Certification mishandle when error should be
38a001
 thrown
38a001
38a001
---
38a001
 util/ssl_.py | 2 +-
38a001
 1 file changed, 1 insertion(+), 1 deletion(-)
38a001
38a001
diff --git a/util/ssl_.py b/util/ssl_.py
38a001
index 32fd9ed..f9f12ff 100644
38a001
--- a/util/ssl_.py
38a001
+++ b/util/ssl_.py
38a001
@@ -319,7 +319,7 @@ def ssl_wrap_socket(sock, keyfile=None, certfile=None, cert_reqs=None,
38a001
             if e.errno == errno.ENOENT:
38a001
                 raise SSLError(e)
38a001
             raise
38a001
-    elif getattr(context, 'load_default_certs', None) is not None:
38a001
+    elif ssl_context is None and hasattr(context, 'load_default_certs'):
38a001
         # try to load OS default certs; works well on Windows (require Python3.4+)
38a001
         context.load_default_certs()
38a001
 
38a001
-- 
38a001
2.24.1
38a001