]> git.ipfire.org Git - thirdparty/Python/cpython.git/commit
[3.8] gh-108310: Fix CVE-2023-40217: Check for & avoid the ssl pre-close flaw (#108321)
authorŁukasz Langa <lukasz@langa.pl>
Tue, 22 Aug 2023 17:57:01 +0000 (19:57 +0200)
committerGitHub <noreply@github.com>
Tue, 22 Aug 2023 17:57:01 +0000 (19:57 +0200)
commitb4bcc06a9cfe13d96d5270809d963f8ba278f89b
treea8ee40a657d367ce3556a1f758eada54402c3ebb
parent1663f8ba8405fefc82f74f8d1ed86d6f26250658
[3.8] gh-108310: Fix CVE-2023-40217: Check for & avoid the ssl pre-close flaw (#108321)

gh-108310: Fix CVE-2023-40217: Check for & avoid the ssl pre-close flaw

Instances of `ssl.SSLSocket` were vulnerable to a bypass of the TLS handshake
and included protections (like certificate verification) and treating sent
unencrypted data as if it were post-handshake TLS encrypted data.

The vulnerability is caused when a socket is connected, data is sent by the
malicious peer and stored in a buffer, and then the malicious peer closes the
socket within a small timing window before the other peers’ TLS handshake can
begin. After this sequence of events the closed socket will not immediately
attempt a TLS handshake due to not being connected but will also allow the
buffered data to be read as if a successful TLS handshake had occurred.

Co-authored-by: Gregory P. Smith [Google LLC] <greg@krypto.org>
Lib/ssl.py
Lib/test/test_ssl.py
Misc/NEWS.d/next/Security/2023-08-22-17-39-12.gh-issue-108310.fVM3sg.rst [new file with mode: 0644]