MFH: r496975

Fix CVE-2019-5010

- Bump PORTREVISION for package change

Obtained from:	216a4d83c3
Reference:	https://bugs.python.org/issue35746
Security:	d74371d2-4fee-11e9-a5cd-1df8a848de3d

Approved by:	ports-secteam (miwi)
This commit is contained in:
Sunpoet Po-Chuan Hsieh 2019-03-28 18:08:45 +00:00
parent 932773b097
commit 57bef2d69a
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/branches/2019Q1/; revision=497049
2 changed files with 22 additions and 0 deletions

View File

@ -3,6 +3,7 @@
PORTNAME= python
PORTVERSION= ${PYTHON_PORTVERSION}
PORTREVISION= 1
CATEGORIES= lang python ipv6
MASTER_SITES= PYTHON/ftp/python/${PORTVERSION}
PKGNAMESUFFIX= ${PYTHON_SUFFIX}

View File

@ -0,0 +1,21 @@
Obtained from: https://github.com/python/cpython/commit/216a4d83c3b72f4fdcd81b588dc3f42cc461739a
bpo-35746: Fix segfault in ssl's cert parser (GH-11569) (GH-11573)
Fix a NULL pointer deref in ssl module. The cert parser did not handle CRL
distribution points with empty DP or URI correctly. A malicious or buggy
certificate can result into segfault.
--- Modules/_ssl.c.orig
+++ Modules/_ssl.c
@@ -1338,6 +1338,10 @@ _get_crl_dp(X509 *certificate) {
STACK_OF(GENERAL_NAME) *gns;
dp = sk_DIST_POINT_value(dps, i);
+ if (dp->distpoint == NULL) {
+ /* Ignore empty DP value, CVE-2019-5010 */
+ continue;
+ }
gns = dp->distpoint->name.fullname;
for (j=0; j < sk_GENERAL_NAME_num(gns); j++) {