Skip to content

rsyslog: use ssl.create_default_context for secure TLS#189

Closed
dogukancagatay wants to merge 1 commit intomasterfrom
dogukancagatay/fix-insecure-ssl-tls-protocol-rsyslogd
Closed

rsyslog: use ssl.create_default_context for secure TLS#189
dogukancagatay wants to merge 1 commit intomasterfrom
dogukancagatay/fix-insecure-ssl-tls-protocol-rsyslogd

Conversation

@dogukancagatay
Copy link
Contributor

@dogukancagatay dogukancagatay commented Mar 10, 2026

Replace manual ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT) with
ssl.create_default_context(), which is the Python-recommended
factory for creating secure TLS contexts. This resolves the
CodeQL py/insecure-protocol alert (CWE-327) as CodeQL recognizes
create_default_context as inherently safe.

This resolves the CodeQL alert for CWE-327 (use of a broken or
weak cryptographic algorithm).

Replace manual ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT) with
ssl.create_default_context(), which is the Python-recommended
factory for creating secure TLS contexts. This resolves the
CodeQL py/insecure-protocol alert (CWE-327) as CodeQL recognizes
create_default_context as inherently safe.

This resolves the CodeQL alert for CWE-327 (use of a broken or
weak cryptographic algorithm).
@dogukancagatay dogukancagatay force-pushed the dogukancagatay/fix-insecure-ssl-tls-protocol-rsyslogd branch from caccfde to 652975d Compare March 10, 2026 16:33
@dogukancagatay dogukancagatay changed the title rsyslog: fix insecure SSL/TLS protocol in SyslogTcpClient rsyslog: use ssl.create_default_context for secure TLS Mar 10, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant