MFH: r496975
Fix CVE-2019-5010
- Bump PORTREVISION for package change
Obtained from: 216a4d83c3
Reference: https://bugs.python.org/issue35746
Security: d74371d2-4fee-11e9-a5cd-1df8a848de3d
Approved by: ports-secteam (miwi)
This commit is contained in:
parent
932773b097
commit
57bef2d69a
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/branches/2019Q1/; revision=497049
@ -3,6 +3,7 @@
|
||||
|
||||
PORTNAME= python
|
||||
PORTVERSION= ${PYTHON_PORTVERSION}
|
||||
PORTREVISION= 1
|
||||
CATEGORIES= lang python ipv6
|
||||
MASTER_SITES= PYTHON/ftp/python/${PORTVERSION}
|
||||
PKGNAMESUFFIX= ${PYTHON_SUFFIX}
|
||||
|
21
lang/python36/files/patch-bpo35746
Normal file
21
lang/python36/files/patch-bpo35746
Normal file
@ -0,0 +1,21 @@
|
||||
Obtained from: https://github.com/python/cpython/commit/216a4d83c3b72f4fdcd81b588dc3f42cc461739a
|
||||
|
||||
bpo-35746: Fix segfault in ssl's cert parser (GH-11569) (GH-11573)
|
||||
|
||||
Fix a NULL pointer deref in ssl module. The cert parser did not handle CRL
|
||||
distribution points with empty DP or URI correctly. A malicious or buggy
|
||||
certificate can result into segfault.
|
||||
|
||||
--- Modules/_ssl.c.orig
|
||||
+++ Modules/_ssl.c
|
||||
@@ -1338,6 +1338,10 @@ _get_crl_dp(X509 *certificate) {
|
||||
STACK_OF(GENERAL_NAME) *gns;
|
||||
|
||||
dp = sk_DIST_POINT_value(dps, i);
|
||||
+ if (dp->distpoint == NULL) {
|
||||
+ /* Ignore empty DP value, CVE-2019-5010 */
|
||||
+ continue;
|
||||
+ }
|
||||
gns = dp->distpoint->name.fullname;
|
||||
|
||||
for (j=0; j < sk_GENERAL_NAME_num(gns); j++) {
|
Loading…
Reference in New Issue
Block a user