You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
pyOpenSSL allows TLS connection bypass via unhandled callback exception in set_tlsext_servername_callback
Low severity
GitHub Reviewed
Published
Mar 15, 2026
in
pyca/pyopenssl
If a user provided callback to set_tlsext_servername_callback raised an unhandled exception, this would result in a connection being accepted. If a user was relying on this callback for any security-sensitive behavior, this could allow bypassing it.
Unhandled exceptions now result in rejecting the connection.
Credit to Leury Castillo for reporting this issue.
When the product encounters an error condition or failure, its design requires it to fall back to a state that is less secure than other options that are available, such as selecting the weakest encryption algorithm or using the most permissive access control restrictions.
Learn more on MITRE.
If a user provided callback to
set_tlsext_servername_callbackraised an unhandled exception, this would result in a connection being accepted. If a user was relying on this callback for any security-sensitive behavior, this could allow bypassing it.Unhandled exceptions now result in rejecting the connection.
Credit to Leury Castillo for reporting this issue.
References