diff options
author | Peter Marko <peter.marko@siemens.com> | 2024-04-14 00:49:17 +0200 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2024-04-16 07:33:19 +0100 |
commit | fd794ce87c9063691aa65002f10dd87a9c7fce44 (patch) | |
tree | 8f730590282fe1ce355d13383d6af182a0804a8f /meta | |
parent | 27a0ee667033d2c8f2c6a6fa6b6c0cc19655e8f9 (diff) | |
download | poky-fd794ce87c9063691aa65002f10dd87a9c7fce44.tar.gz |
openssl: openssl: patch CVE-2024-2511
Patch: https://github.com/openssl/openssl/commit/e9d7083e241670332e0443da0f0d4ffb52829f08
News: https://github.com/openssl/openssl/commit/b7acb6731a96b073d6150465bd090e2052a595c2
(From OE-Core rev: b439d1c9e5a115bbb5193a2df25e84291cc07bec)
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta')
-rw-r--r-- | meta/recipes-connectivity/openssl/openssl/CVE-2024-2511.patch | 120 | ||||
-rw-r--r-- | meta/recipes-connectivity/openssl/openssl_3.2.1.bb | 1 |
2 files changed, 121 insertions, 0 deletions
diff --git a/meta/recipes-connectivity/openssl/openssl/CVE-2024-2511.patch b/meta/recipes-connectivity/openssl/openssl/CVE-2024-2511.patch new file mode 100644 index 0000000000..8772f716d5 --- /dev/null +++ b/meta/recipes-connectivity/openssl/openssl/CVE-2024-2511.patch | |||
@@ -0,0 +1,120 @@ | |||
1 | From e9d7083e241670332e0443da0f0d4ffb52829f08 Mon Sep 17 00:00:00 2001 | ||
2 | From: Matt Caswell <matt@openssl.org> | ||
3 | Date: Tue, 5 Mar 2024 15:43:53 +0000 | ||
4 | Subject: [PATCH] Fix unconstrained session cache growth in TLSv1.3 | ||
5 | |||
6 | In TLSv1.3 we create a new session object for each ticket that we send. | ||
7 | We do this by duplicating the original session. If SSL_OP_NO_TICKET is in | ||
8 | use then the new session will be added to the session cache. However, if | ||
9 | early data is not in use (and therefore anti-replay protection is being | ||
10 | used), then multiple threads could be resuming from the same session | ||
11 | simultaneously. If this happens and a problem occurs on one of the threads, | ||
12 | then the original session object could be marked as not_resumable. When we | ||
13 | duplicate the session object this not_resumable status gets copied into the | ||
14 | new session object. The new session object is then added to the session | ||
15 | cache even though it is not_resumable. | ||
16 | |||
17 | Subsequently, another bug means that the session_id_length is set to 0 for | ||
18 | sessions that are marked as not_resumable - even though that session is | ||
19 | still in the cache. Once this happens the session can never be removed from | ||
20 | the cache. When that object gets to be the session cache tail object the | ||
21 | cache never shrinks again and grows indefinitely. | ||
22 | |||
23 | CVE-2024-2511 | ||
24 | |||
25 | Reviewed-by: Neil Horman <nhorman@openssl.org> | ||
26 | Reviewed-by: Tomas Mraz <tomas@openssl.org> | ||
27 | (Merged from https://github.com/openssl/openssl/pull/24043) | ||
28 | |||
29 | CVE: CVE-2024-2511 | ||
30 | Upstream-Status: Backport [https://github.com/openssl/openssl/commit/e9d7083e241670332e0443da0f0d4ffb52829f08] | ||
31 | Signed-off-by: Peter Marko <peter.marko@siemens.com> | ||
32 | --- | ||
33 | ssl/ssl_lib.c | 5 +++-- | ||
34 | ssl/ssl_sess.c | 28 ++++++++++++++++++++++------ | ||
35 | ssl/statem/statem_srvr.c | 5 ++--- | ||
36 | 3 files changed, 27 insertions(+), 11 deletions(-) | ||
37 | |||
38 | diff --git a/ssl/ssl_lib.c b/ssl/ssl_lib.c | ||
39 | index 4afb43bc86e54..c51529ddab5bb 100644 | ||
40 | --- a/ssl/ssl_lib.c | ||
41 | +++ b/ssl/ssl_lib.c | ||
42 | @@ -4457,9 +4457,10 @@ void ssl_update_cache(SSL_CONNECTION *s, int mode) | ||
43 | |||
44 | /* | ||
45 | * If the session_id_length is 0, we are not supposed to cache it, and it | ||
46 | - * would be rather hard to do anyway :-) | ||
47 | + * would be rather hard to do anyway :-). Also if the session has already | ||
48 | + * been marked as not_resumable we should not cache it for later reuse. | ||
49 | */ | ||
50 | - if (s->session->session_id_length == 0) | ||
51 | + if (s->session->session_id_length == 0 || s->session->not_resumable) | ||
52 | return; | ||
53 | |||
54 | /* | ||
55 | diff --git a/ssl/ssl_sess.c b/ssl/ssl_sess.c | ||
56 | index 3dcc4d81e5bc6..1fa6d17c46863 100644 | ||
57 | --- a/ssl/ssl_sess.c | ||
58 | +++ b/ssl/ssl_sess.c | ||
59 | @@ -127,16 +127,11 @@ SSL_SESSION *SSL_SESSION_new(void) | ||
60 | return ss; | ||
61 | } | ||
62 | |||
63 | -SSL_SESSION *SSL_SESSION_dup(const SSL_SESSION *src) | ||
64 | -{ | ||
65 | - return ssl_session_dup(src, 1); | ||
66 | -} | ||
67 | - | ||
68 | /* | ||
69 | * Create a new SSL_SESSION and duplicate the contents of |src| into it. If | ||
70 | * ticket == 0 then no ticket information is duplicated, otherwise it is. | ||
71 | */ | ||
72 | -SSL_SESSION *ssl_session_dup(const SSL_SESSION *src, int ticket) | ||
73 | +static SSL_SESSION *ssl_session_dup_intern(const SSL_SESSION *src, int ticket) | ||
74 | { | ||
75 | SSL_SESSION *dest; | ||
76 | |||
77 | @@ -265,6 +260,27 @@ SSL_SESSION *ssl_session_dup(const SSL_SESSION *src, int ticket) | ||
78 | return NULL; | ||
79 | } | ||
80 | |||
81 | +SSL_SESSION *SSL_SESSION_dup(const SSL_SESSION *src) | ||
82 | +{ | ||
83 | + return ssl_session_dup_intern(src, 1); | ||
84 | +} | ||
85 | + | ||
86 | +/* | ||
87 | + * Used internally when duplicating a session which might be already shared. | ||
88 | + * We will have resumed the original session. Subsequently we might have marked | ||
89 | + * it as non-resumable (e.g. in another thread) - but this copy should be ok to | ||
90 | + * resume from. | ||
91 | + */ | ||
92 | +SSL_SESSION *ssl_session_dup(const SSL_SESSION *src, int ticket) | ||
93 | +{ | ||
94 | + SSL_SESSION *sess = ssl_session_dup_intern(src, ticket); | ||
95 | + | ||
96 | + if (sess != NULL) | ||
97 | + sess->not_resumable = 0; | ||
98 | + | ||
99 | + return sess; | ||
100 | +} | ||
101 | + | ||
102 | const unsigned char *SSL_SESSION_get_id(const SSL_SESSION *s, unsigned int *len) | ||
103 | { | ||
104 | if (len) | ||
105 | diff --git a/ssl/statem/statem_srvr.c b/ssl/statem/statem_srvr.c | ||
106 | index 853af8c0aa9f9..d5f0ab091dacc 100644 | ||
107 | --- a/ssl/statem/statem_srvr.c | ||
108 | +++ b/ssl/statem/statem_srvr.c | ||
109 | @@ -2445,9 +2445,8 @@ CON_FUNC_RETURN tls_construct_server_hello(SSL_CONNECTION *s, WPACKET *pkt) | ||
110 | * so the following won't overwrite an ID that we're supposed | ||
111 | * to send back. | ||
112 | */ | ||
113 | - if (s->session->not_resumable || | ||
114 | - (!(SSL_CONNECTION_GET_CTX(s)->session_cache_mode & SSL_SESS_CACHE_SERVER) | ||
115 | - && !s->hit)) | ||
116 | + if (!(SSL_CONNECTION_GET_CTX(s)->session_cache_mode & SSL_SESS_CACHE_SERVER) | ||
117 | + && !s->hit) | ||
118 | s->session->session_id_length = 0; | ||
119 | |||
120 | if (usetls13) { | ||
diff --git a/meta/recipes-connectivity/openssl/openssl_3.2.1.bb b/meta/recipes-connectivity/openssl/openssl_3.2.1.bb index c7134c54db..d37b68abbb 100644 --- a/meta/recipes-connectivity/openssl/openssl_3.2.1.bb +++ b/meta/recipes-connectivity/openssl/openssl_3.2.1.bb | |||
@@ -13,6 +13,7 @@ SRC_URI = "http://www.openssl.org/source/openssl-${PV}.tar.gz \ | |||
13 | file://0001-Configure-do-not-tweak-mips-cflags.patch \ | 13 | file://0001-Configure-do-not-tweak-mips-cflags.patch \ |
14 | file://0001-Added-handshake-history-reporting-when-test-fails.patch \ | 14 | file://0001-Added-handshake-history-reporting-when-test-fails.patch \ |
15 | file://bti.patch \ | 15 | file://bti.patch \ |
16 | file://CVE-2024-2511.patch \ | ||
16 | " | 17 | " |
17 | 18 | ||
18 | SRC_URI:append:class-nativesdk = " \ | 19 | SRC_URI:append:class-nativesdk = " \ |