Blame SOURCES/CVE-2019-11324.patch

f866d3
From 54e768a6dbe3cadeb456dea37bbeaf6e1e17e87c Mon Sep 17 00:00:00 2001
f866d3
From: Lumir Balhar <lbalhar@redhat.com>
f866d3
Date: Thu, 9 Jan 2020 10:47:27 +0100
f866d3
Subject: [PATCH] CVE-2019-11324 Certification mishandle when error should be
f866d3
 thrown
f866d3
f866d3
---
f866d3
 util/ssl_.py | 2 +-
f866d3
 1 file changed, 1 insertion(+), 1 deletion(-)
f866d3
f866d3
diff --git a/util/ssl_.py b/util/ssl_.py
f866d3
index 32fd9ed..f9f12ff 100644
f866d3
--- a/util/ssl_.py
f866d3
+++ b/util/ssl_.py
f866d3
@@ -319,7 +319,7 @@ def ssl_wrap_socket(sock, keyfile=None, certfile=None, cert_reqs=None,
f866d3
             if e.errno == errno.ENOENT:
f866d3
                 raise SSLError(e)
f866d3
             raise
f866d3
-    elif getattr(context, 'load_default_certs', None) is not None:
f866d3
+    elif ssl_context is None and hasattr(context, 'load_default_certs'):
f866d3
         # try to load OS default certs; works well on Windows (require Python3.4+)
f866d3
         context.load_default_certs()
f866d3
 
f866d3
-- 
f866d3
2.24.1
f866d3