Bug 1364444
| Summary: | Python fails to decode X.509 cert with GEN_RID subject alt name | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Christian Heimes <cheimes> | |
| Component: | python | Assignee: | Charalampos Stratakis <cstratak> | |
| Status: | CLOSED ERRATA | QA Contact: | Branislav Náter <bnater> | |
| Severity: | unspecified | Docs Contact: | ||
| Priority: | unspecified | |||
| Version: | 7.2 | CC: | bnater, cstratak, pviktori, rmeggins | |
| Target Milestone: | rc | Keywords: | Patch | |
| Target Release: | --- | |||
| Hardware: | Unspecified | |||
| OS: | Unspecified | |||
| Whiteboard: | ||||
| Fixed In Version: | python-2.7.5-49.el7 | Doc Type: | No Doc Update | |
| Doc Text: |
undefined
|
Story Points: | --- | |
| Clone Of: | ||||
| : | 1402154 (view as bug list) | Environment: | ||
| Last Closed: | 2017-08-01 20:25:03 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 1380359, 1393868 | |||
|
Description
Christian Heimes
2016-08-05 11:09:35 UTC
Fixing Python tracker ID. I plan to add devel_ack as soon as the patch is upstream. Reproduced on python-2.7.5-48.el7:
:: [ BEGIN ] :: Running 'python -c "import _ssl; print(_ssl._test_decode_cert('rid.pem'))"'
Traceback (most recent call last):
File "<string>", line 1, in <module>
SystemError: error return without exception set
:: [ FAIL ] :: Command 'python -c "import _ssl; print(_ssl._test_decode_cert('rid.pem'))"' (Expected 0, got 1)
Verified on python-2.7.5-57.el7:
Python is able to decode certificate that has a registered id (GEN_RID) in the X509v3 subject alt name extension.
:: [ BEGIN ] :: Running 'python -c "import _ssl; print(_ssl._test_decode_cert('rid.pem'))"'
{'crlDistributionPoints': (u'http://acme.test/ca/tls-server-ca.crl',), 'subjectAltName': ((u'Registered ID', u'1.2.3.4.5.5'), ('DNS', 'localhost'), ('IP Address', '127.0.0.1'), ('IP Address', '0:0:0:0:0:0:0:1\n')), 'notBefore': u'Aug 5 09:13:13 2016 GMT', 'caIssuers': (u'http://acme.test/ca/tls-server-ca.cer',), 'OCSP': (u'http://acme.test/ca/ocsp/tls-server-ca',), 'serialNumber': u'01', 'notAfter': 'Aug 5 09:13:13 2018 GMT', 'version': 3L, 'subject': ((('countryName', u'XX'),), (('organizationName', u'Acme Corp'),), (('organizationalUnitName', u'Acme Users'),), (('commonName', u'localhost'),)), 'issuer': ((('countryName', u'XX'),), (('organizationName', u'Acme Corp'),), (('organizationalUnitName', u'Acme Certificate Authority'),), (('commonName', u'Acme TLS Server CA'),))}
:: [ PASS ] :: Command 'python -c "import _ssl; print(_ssl._test_decode_cert('rid.pem'))"' (Expected 0, got 0)
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2017:1868 |