Dunfell has reached end of life and we are no longer taking changes. The final build was done on April 15.
Steve On Tue, Apr 23, 2024 at 1:21 AM virendra thakur <thakur.virendra1...@gmail.com> wrote: > > From: Soumya <soumya.sa...@windriver.com> > > HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available > standalone on CPAN, has an insecure default TLS configuration where > users must opt in to verify certificates. > > References: > https://nvd.nist.gov/vuln/detail/CVE-2023-31486 > > Upstream patches: > https://github.com/chansen/p5-http-tiny/commit/77f557ef84698efeb6eed04e4a9704eaf85b741d > https://github.com/chansen/p5-http-tiny/commit/a22785783b17cbaa28afaee4a024d81a1903701d > > (From OE-Core rev: 5819c839e1de92ab7669a0d4997886d0306c4cc1) > > Signed-off-by: Soumya <soumya.sa...@windriver.com> > Signed-off-by: Steve Sakoman <st...@sakoman.com> > (cherry picked from commit 80ecd63cc84d7eb9db26ec47d4afcf5a59d598e8) > > Signed-off-by: virendra thakur <virend...@kpit.com> > --- > .../perl/files/CVE-2023-31486-0001.patch | 216 ++++++++++++++++++ > .../perl/files/CVE-2023-31486-0002.patch | 36 +++ > meta/recipes-devtools/perl/perl_5.30.1.bb | 2 + > 3 files changed, 254 insertions(+) > create mode 100644 meta/recipes-devtools/perl/files/CVE-2023-31486-0001.patch > create mode 100644 meta/recipes-devtools/perl/files/CVE-2023-31486-0002.patch > > diff --git a/meta/recipes-devtools/perl/files/CVE-2023-31486-0001.patch > b/meta/recipes-devtools/perl/files/CVE-2023-31486-0001.patch > new file mode 100644 > index 0000000000..d8326b4ef8 > --- /dev/null > +++ b/meta/recipes-devtools/perl/files/CVE-2023-31486-0001.patch > @@ -0,0 +1,216 @@ > +From 77f557ef84698efeb6eed04e4a9704eaf85b741d > +From: Stig Palmquist <g...@stig.io> > +Date: Mon Jun 5 16:46:22 2023 +0200 > +Subject: [PATCH] Change verify_SSL default to 1, add ENV var to enable > + insecure default - Changes the `verify_SSL` default parameter from `0` to > `1` > + > + Based on patch by Dominic Hargreaves: > + > https://salsa.debian.org/perl-team/interpreter/perl/-/commit/1490431e40e22052f75a0b3449f1f53cbd27ba92 > + > + CVE: CVE-2023-31486 > + > +- Add check for `$ENV{PERL_HTTP_TINY_SSL_INSECURE_BY_DEFAULT}` that > + enables the previous insecure default behaviour if set to `1`. > + > + This provides a workaround for users who encounter problems with the > + new `verify_SSL` default. > + > + Example to disable certificate checks: > + ``` > + $ PERL_HTTP_TINY_SSL_INSECURE_BY_DEFAULT=1 ./script.pl > + ``` > + > +- Updates to documentation: > + - Describe changing the verify_SSL value > + - Describe the escape-hatch environment variable > + - Remove rationale for not enabling verify_SSL > + - Add missing certificate search paths > + - Replace "SSL" with "TLS/SSL" where appropriate > + - Use "machine-in-the-middle" instead of "man-in-the-middle" > + > +Upstream-Status: Backport > [https://github.com/chansen/p5-http-tiny/commit/77f557ef84698efeb6eed04e4a9704eaf85b741d] > + > +Signed-off-by: Soumya <soumya.sa...@windriver.com> > +Signed-off-by: virendra thakur <virend...@kpit.com> > +--- > + cpan/HTTP-Tiny/lib/HTTP/Tiny.pm | 86 ++++++++++++++++++++++----------- > + 1 file changed, 57 insertions(+), 29 deletions(-) > + > +diff --git a/cpan/HTTP-Tiny/lib/HTTP/Tiny.pm > b/cpan/HTTP-Tiny/lib/HTTP/Tiny.pm > +index 5803e45..1808c41 100644 > +--- a/cpan/HTTP-Tiny/lib/HTTP/Tiny.pm > ++++ b/cpan/HTTP-Tiny/lib/HTTP/Tiny.pm > +@@ -39,10 +39,14 @@ sub _croak { require Carp; Carp::croak(@_) } > + #pod C<$ENV{no_proxy}> —) > + #pod * C<timeout> — Request timeout in seconds (default is 60) If a socket > open, > + #pod read or write takes longer than the timeout, an exception is thrown. > +-#pod * C<verify_SSL> — A boolean that indicates whether to validate the SSL > +-#pod certificate of an C<https> — connection (default is false) > ++#pod * C<verify_SSL> — A boolean that indicates whether to validate the > TLS/SSL > ++#pod certificate of an C<https> — connection (default is true). Changed > from false > ++#pod to true in version 0.083. > + #pod * C<SSL_options> — A hashref of C<SSL_*> — options to pass through to > + #pod L<IO::Socket::SSL> > ++#pod * C<$ENV{PERL_HTTP_TINY_SSL_INSECURE_BY_DEFAULT}> - Changes the default > ++#pod certificate verification behavior to not check server identity if > set to 1. > ++#pod Only effective if C<verify_SSL> is not set. Added in version 0.083. > + #pod > + #pod Passing an explicit C<undef> for C<proxy>, C<http_proxy> or > C<https_proxy> will > + #pod prevent getting the corresponding proxies from the environment. > +@@ -108,11 +112,17 @@ sub timeout { > + sub new { > + my($class, %args) = @_; > + > ++ # Support lower case verify_ssl argument, but only if verify_SSL is not > ++ # true. > ++ if ( exists $args{verify_ssl} ) { > ++ $args{verify_SSL} ||= $args{verify_ssl}; > ++ } > ++ > + my $self = { > + max_redirect => 5, > + timeout => defined $args{timeout} ? $args{timeout} : 60, > + keep_alive => 1, > +- verify_SSL => $args{verify_SSL} || $args{verify_ssl} || 0, # no > verification by default > ++ verify_SSL => defined $args{verify_SSL} ? $args{verify_SSL} : > _verify_SSL_default(), > + no_proxy => $ENV{no_proxy}, > + }; > + > +@@ -131,6 +141,13 @@ sub new { > + return $self; > + } > + > ++sub _verify_SSL_default { > ++ my ($self) = @_; > ++ # Check if insecure default certificate verification behaviour has been > ++ # changed by the user by setting > PERL_HTTP_TINY_SSL_INSECURE_BY_DEFAULT=1 > ++ return (($ENV{PERL_HTTP_TINY_INSECURE_BY_DEFAULT} || '') eq '1') ? 0 : > 1; > ++} > ++ > + sub _set_proxies { > + my ($self) = @_; > + > +@@ -1038,7 +1055,7 @@ sub new { > + timeout => 60, > + max_line_size => 16384, > + max_header_lines => 64, > +- verify_SSL => 0, > ++ verify_SSL => HTTP::Tiny::_verify_SSL_default(), > + SSL_options => {}, > + %args > + }, $class; > +@@ -2009,11 +2026,11 @@ proxy > + timeout > + verify_SSL > + > +-=head1 SSL SUPPORT > ++=head1 TLS/SSL SUPPORT > + > + Direct C<https> connections are supported only if L<IO::Socket::SSL> 1.56 or > + greater and L<Net::SSLeay> 1.49 or greater are installed. An exception will > be > +-thrown if new enough versions of these modules are not installed or if the > SSL > ++thrown if new enough versions of these modules are not installed or if the > TLS > + encryption fails. You can also use C<HTTP::Tiny::can_ssl()> utility function > + that returns boolean to see if the required modules are installed. > + > +@@ -2021,7 +2038,7 @@ An C<https> connection may be made via an C<http> > proxy that supports the CONNEC > + command (i.e. RFC 2817). You may not proxy C<https> via a proxy that itself > + requires C<https> to communicate. > + > +-SSL provides two distinct capabilities: > ++TLS/SSL provides two distinct capabilities: > + > + =over 4 > + > +@@ -2035,24 +2052,17 @@ Verification of server identity > + > + =back > + > +-B<By default, HTTP::Tiny does not verify server identity>. > +- > +-Server identity verification is controversial and potentially tricky > because it > +-depends on a (usually paid) third-party Certificate Authority (CA) trust > model > +-to validate a certificate as legitimate. This discriminates against servers > +-with self-signed certificates or certificates signed by free, > community-driven > +-CA's such as L<CAcert.org|http://cacert.org>. > ++B<By default, HTTP::Tiny verifies server identity>. > + > +-By default, HTTP::Tiny does not make any assumptions about your trust model, > +-threat level or risk tolerance. It just aims to give you an encrypted > channel > +-when you need one. > ++This was changed in version 0.083 due to security concerns. The previous > default > ++behavior can be enabled by setting > C<$ENV{PERL_HTTP_TINY_SSL_INSECURE_BY_DEFAULT}> > ++to 1. > + > +-Setting the C<verify_SSL> attribute to a true value will make HTTP::Tiny > verify > +-that an SSL connection has a valid SSL certificate corresponding to the host > +-name of the connection and that the SSL certificate has been verified by a > CA. > +-Assuming you trust the CA, this will protect against a L<man-in-the-middle > +-attack|http://en.wikipedia.org/wiki/Man-in-the-middle_attack>. If you are > +-concerned about security, you should enable this option. > ++Verification is done by checking that that the TLS/SSL connection has a > valid > ++certificate corresponding to the host name of the connection and that the > ++certificate has been verified by a CA. Assuming you trust the CA, this will > ++protect against L<machine-in-the-middle > ++attacks|http://en.wikipedia.org/wiki/Machine-in-the-middle_attack>. > + > + Certificate verification requires a file containing trusted CA certificates. > + > +@@ -2060,9 +2070,7 @@ If the environment variable C<SSL_CERT_FILE> is > present, HTTP::Tiny > + will try to find a CA certificate file in that location. > + > + If the L<Mozilla::CA> module is installed, HTTP::Tiny will use the CA file > +-included with it as a source of trusted CA's. (This means you trust > Mozilla, > +-the author of Mozilla::CA, the CPAN mirror where you got Mozilla::CA, the > +-toolchain used to install it, and your operating system security, right?) > ++included with it as a source of trusted CA's. > + > + If that module is not available, then HTTP::Tiny will search several > + system-specific default locations for a CA certificate file: > +@@ -2081,13 +2089,33 @@ system-specific default locations for a CA > certificate file: > + > + /etc/ssl/ca-bundle.pem > + > ++=item * > ++ > ++/etc/openssl/certs/ca-certificates.crt > ++ > ++=item * > ++ > ++/etc/ssl/cert.pem > ++ > ++=item * > ++ > ++/usr/local/share/certs/ca-root-nss.crt > ++ > ++=item * > ++ > ++/etc/pki/tls/cacert.pem > ++ > ++=item * > ++ > ++/etc/certs/ca-certificates.crt > ++ > + =back > + > + An exception will be raised if C<verify_SSL> is true and no CA certificate > file > + is available. > + > +-If you desire complete control over SSL connections, the C<SSL_options> > attribute > +-lets you provide a hash reference that will be passed through to > ++If you desire complete control over TLS/SSL connections, the C<SSL_options> > ++attribute lets you provide a hash reference that will be passed through to > + C<IO::Socket::SSL::start_SSL()>, overriding any options set by HTTP::Tiny. > For > + example, to provide your own trusted CA file: > + > +@@ -2097,7 +2125,7 @@ example, to provide your own trusted CA file: > + > + The C<SSL_options> attribute could also be used for such things as > providing a > + client certificate for authentication to a server or controlling the choice > of > +-cipher used for the SSL connection. See L<IO::Socket::SSL> documentation for > ++cipher used for the TLS/SSL connection. See L<IO::Socket::SSL> > documentation for > + details. > + > + =head1 PROXY SUPPORT > +-- > +2.40.0 > diff --git a/meta/recipes-devtools/perl/files/CVE-2023-31486-0002.patch > b/meta/recipes-devtools/perl/files/CVE-2023-31486-0002.patch > new file mode 100644 > index 0000000000..45452be389 > --- /dev/null > +++ b/meta/recipes-devtools/perl/files/CVE-2023-31486-0002.patch > @@ -0,0 +1,36 @@ > +From a22785783b17cbaa28afaee4a024d81a1903701d > +From: Stig Palmquist <g...@stig.io> > +Date: Sun Jun 18 11:36:05 2023 +0200 > +Subject: [PATCH] Fix incorrect env var name for verify_SSL default > + > +The variable to override the verify_SSL default differed slightly in the > +documentation from what was checked for in the code. > + > +This commit makes the code use `PERL_HTTP_TINY_SSL_INSECURE_BY_DEFAULT` > +as documented, instead of `PERL_HTTP_TINY_INSECURE_BY_DEFAULT` which was > +missing `SSL_` > + > +CVE: CVE-2023-31486 > + > +Upstream-Status: Backport > [https://github.com/chansen/p5-http-tiny/commit/a22785783b17cbaa28afaee4a024d81a1903701d] > + > +Signed-off-by: Soumya <soumya.sa...@windriver.com> > +--- > + cpan/HTTP-Tiny/lib/HTTP/Tiny.pm | 2 +- > + 1 file changed, 1 insertion(+), 1 deletion(-) > + > +diff --git a/cpan/HTTP-Tiny/lib/HTTP/Tiny.pm > b/cpan/HTTP-Tiny/lib/HTTP/Tiny.pm > +index ebc34a1..65ac8ff 100644 > +--- a/cpan/HTTP-Tiny/lib/HTTP/Tiny.pm > ++++ b/cpan/HTTP-Tiny/lib/HTTP/Tiny.pm > +@@ -148,7 +148,7 @@ sub _verify_SSL_default { > + my ($self) = @_; > + # Check if insecure default certificate verification behaviour has been > + # changed by the user by setting > PERL_HTTP_TINY_SSL_INSECURE_BY_DEFAULT=1 > +- return (($ENV{PERL_HTTP_TINY_INSECURE_BY_DEFAULT} || '') eq '1') ? 0 : > 1; > ++ return (($ENV{PERL_HTTP_TINY_SSL_INSECURE_BY_DEFAULT} || '') eq '1') ? > 0 : 1; > + } > + > + sub _set_proxies { > +-- > +2.40.0 > diff --git a/meta/recipes-devtools/perl/perl_5.30.1.bb > b/meta/recipes-devtools/perl/perl_5.30.1.bb > index bf81a023b8..b7c864b6dc 100644 > --- a/meta/recipes-devtools/perl/perl_5.30.1.bb > +++ b/meta/recipes-devtools/perl/perl_5.30.1.bb > @@ -31,6 +31,8 @@ SRC_URI = > "https://www.cpan.org/src/5.0/perl-${PV}.tar.gz;name=perl \ > file://CVE-2020-12723.patch \ > file://CVE-2023-31484.patch \ > file://CVE-2023-47038.patch \ > + file://CVE-2023-31486-0001.patch \ > + file://CVE-2023-31486-0002.patch \ > " > SRC_URI_append_class-native = " \ > file://perl-configpm-switch.patch \ > -- > 2.25.1 >
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#198617): https://lists.openembedded.org/g/openembedded-core/message/198617 Mute This Topic: https://lists.openembedded.org/mt/105686242/21656 Group Owner: openembedded-core+ow...@lists.openembedded.org Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-