Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

[3.12] gh-108310: Fix CVE-2023-40217: Check for & avoid the ssl pre-close flaw#108316

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Merged
ambv merged 1 commit intopython:3.12fromambv:cve-2023-40217-3.12
Aug 22, 2023

Conversation

@ambv
Copy link
Contributor

@ambvambv commentedAug 22, 2023
edited by bedevere-bot
Loading

Instances ofssl.SSLSocket were vulnerable to a bypass of the TLS handshake and included protections (like certificate verification) and treating sent unencrypted data as if it were post-handshake TLS encrypted data.

The vulnerability is caused when a socket is connected, data is sent by the malicious peer and stored in a buffer, and then the malicious peer closes the socket within a small timing window before the other peers’ TLS handshake can begin. After this sequence of events the closed socket will not immediately attempt a TLS handshake due to not being connected but will also allow the buffered data to be read as if a successful TLS handshake had occurred.

gpshead reacted with thumbs up emoji
…ose flawInstances of `ssl.SSLSocket` were vulnerable to a bypass of the TLS handshakeand included protections (like certificate verification) and treating sentunencrypted data as if it were post-handshake TLS encrypted data.The vulnerability is caused when a socket is connected, data is sent by themalicious peer and stored in a buffer, and then the malicious peer closes thesocket within a small timing window before the other peers’ TLS handshake canbegin. After this sequence of events the closed socket will not immediatelyattempt a TLS handshake due to not being connected but will also allow thebuffered data to be read as if a successful TLS handshake had occurred.Co-Authored-By: Gregory P. Smith [Google LLC] <greg@krypto.org>
@ambvambv merged commit256586a intopython:3.12Aug 22, 2023
@ambvambv deleted the cve-2023-40217-3.12 branchAugust 22, 2023 19:03
blaisep added a commit to blaisep/cpython that referenced this pull requestMay 22, 2025
Sign up for freeto join this conversation on GitHub. Already have an account?Sign in to comment

Reviewers

No reviews

Assignees

No one assigned

Labels

None yet

Projects

None yet

Milestone

No milestone

Development

Successfully merging this pull request may close these issues.

2 participants

@ambv@bedevere-bot

[8]ページ先頭

©2009-2025 Movatter.jp