import OL keylime-7.12.1-11.el9_7.4
This commit is contained in:
parent
e9fbd07225
commit
e40691c181
20
SOURCES/0016-CVE-2026-1709.patch
Normal file
20
SOURCES/0016-CVE-2026-1709.patch
Normal file
@ -0,0 +1,20 @@
|
||||
diff --git a/keylime/web/base/server.py b/keylime/web/base/server.py
|
||||
index 1d9a9c2..859b23a 100644
|
||||
--- a/keylime/web/base/server.py
|
||||
+++ b/keylime/web/base/server.py
|
||||
@@ -2,7 +2,6 @@ import asyncio
|
||||
import multiprocessing
|
||||
from abc import ABC, abstractmethod
|
||||
from functools import wraps
|
||||
-from ssl import CERT_OPTIONAL
|
||||
from typing import TYPE_CHECKING, Any, Callable, Optional
|
||||
|
||||
import tornado
|
||||
@@ -252,7 +251,6 @@ class Server(ABC):
|
||||
self._https_port = config.getint(component, "tls_port", fallback=0)
|
||||
self._max_upload_size = config.getint(component, "max_upload_size", fallback=104857600)
|
||||
self._ssl_ctx = web_util.init_mtls(component)
|
||||
- self._ssl_ctx.verify_mode = CERT_OPTIONAL
|
||||
|
||||
def _get(self, pattern: str, controller: type["Controller"], action: str, allow_insecure: bool = False) -> None:
|
||||
"""Creates a new route to handle incoming GET requests issued for paths which match the given
|
||||
@ -9,7 +9,7 @@
|
||||
|
||||
Name: keylime
|
||||
Version: 7.12.1
|
||||
Release: 11%{?dist}.3
|
||||
Release: 11%{?dist}.4
|
||||
Summary: Open source TPM software for Bootstrapping and Maintaining Trust
|
||||
|
||||
URL: https://github.com/keylime/keylime
|
||||
@ -48,6 +48,9 @@ Patch: 0013-fix-malformed-certs-workaround.patch
|
||||
Patch: 0014-Add-shared-memory-infrastructure-for-multiprocess-co.patch
|
||||
Patch: 0015-Fix-registrar-duplicate-UUID-vulnerability.patch
|
||||
|
||||
# CVE-2026-1709
|
||||
Patch: 0016-CVE-2026-1709.patch
|
||||
|
||||
License: ASL 2.0 and MIT
|
||||
|
||||
BuildRequires: git-core
|
||||
@ -441,6 +444,10 @@ fi
|
||||
%license LICENSE
|
||||
|
||||
%changelog
|
||||
* Tue Feb 03 2026 Anderson Toshiyuki Sasaki <ansasaki@redhat.com> - 7.12.1-11.4
|
||||
- CVE-2026-1709: Registrar authentication bypass
|
||||
Resolves: RHEL-145390
|
||||
|
||||
* Fri Dec 12 2025 Sergio Correia <scorreia@redhat.com> - 7.12.1-11.3
|
||||
- Registrar allows identity takeover via duplicate UUID registration
|
||||
Resolves: RHEL-130760
|
||||
|
||||
Loading…
Reference in New Issue
Block a user