cpython/Misc/NEWS.d/next/Security
Łukasz Langa 0cb0c238d5
gh-108310: Fix CVE-2023-40217: Check for & avoid the ssl pre-close flaw (#108315)
Instances of `ssl.SSLSocket` were vulnerable to a bypass of the TLS handshake
and included protections (like certificate verification) and treating sent
unencrypted data as if it were post-handshake TLS encrypted data.

The vulnerability is caused when a socket is connected, data is sent by the
malicious peer and stored in a buffer, and then the malicious peer closes the
socket within a small timing window before the other peers’ TLS handshake can
begin. After this sequence of events the closed socket will not immediately
attempt a TLS handshake due to not being connected but will also allow the
buffered data to be read as if a successful TLS handshake had occurred.

Co-authored-by: Gregory P. Smith [Google LLC] <greg@krypto.org>
2023-08-22 19:53:15 +02:00
..
2023-03-07-21-46-29.gh-issue-102509.5ouaH_.rst gh-102509: Start initializing ob_digit of _PyLongValue (GH-102510) 2023-07-28 14:39:54 +01:00
2023-05-24-09-29-08.gh-issue-99108.hwS2cr.rst gh-99108: Refresh HACL* (#104808) 2023-05-24 13:30:11 -07:00
2023-06-01-03-24-58.gh-issue-103142.GLWDMX.rst gh-103142: Upgrade binary builds and CI to OpenSSL 1.1.1u (#105174) 2023-06-01 09:42:18 -07:00
2023-06-13-20-52-24.gh-issue-102988.Kei7Vf.rst gh-106669: Revert "gh-102988: Detect email address parsing errors ... (#105127)" (#106733) 2023-07-20 20:30:52 -07:00
2023-08-05-03-51-05.gh-issue-107774.VPjaTR.rst GH-107774: Add missing audit event for PEP 669 (GH-107775) 2023-08-10 12:29:06 +01:00
2023-08-22-17-39-12.gh-issue-108310.fVM3sg.rst gh-108310: Fix CVE-2023-40217: Check for & avoid the ssl pre-close flaw (#108315) 2023-08-22 19:53:15 +02:00
README.rst

Put news entry `blurb`_ files for the *Security* section in this directory.

.. _blurb: https://pypi.org/project/blurb/