summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--meta/recipes-devtools/perl/files/CVE-2023-31486-0001.patch215
-rw-r--r--meta/recipes-devtools/perl/files/CVE-2023-31486-0002.patch36
-rw-r--r--meta/recipes-devtools/perl/perl_5.34.1.bb2
3 files changed, 253 insertions, 0 deletions
diff --git a/meta/recipes-devtools/perl/files/CVE-2023-31486-0001.patch b/meta/recipes-devtools/perl/files/CVE-2023-31486-0001.patch
new file mode 100644
index 0000000000..d29996ddcb
--- /dev/null
+++ b/meta/recipes-devtools/perl/files/CVE-2023-31486-0001.patch
@@ -0,0 +1,215 @@
1From 77f557ef84698efeb6eed04e4a9704eaf85b741d
2From: Stig Palmquist <git@stig.io>
3Date: Mon Jun 5 16:46:22 2023 +0200
4Subject: [PATCH] Change verify_SSL default to 1, add ENV var to enable
5 insecure default - Changes the `verify_SSL` default parameter from `0` to `1`
6
7 Based on patch by Dominic Hargreaves:
8 https://salsa.debian.org/perl-team/interpreter/perl/-/commit/1490431e40e22052f75a0b3449f1f53cbd27ba92
9
10 CVE: CVE-2023-31486
11
12- Add check for `$ENV{PERL_HTTP_TINY_SSL_INSECURE_BY_DEFAULT}` that
13 enables the previous insecure default behaviour if set to `1`.
14
15 This provides a workaround for users who encounter problems with the
16 new `verify_SSL` default.
17
18 Example to disable certificate checks:
19 ```
20 $ PERL_HTTP_TINY_SSL_INSECURE_BY_DEFAULT=1 ./script.pl
21 ```
22
23- Updates to documentation:
24 - Describe changing the verify_SSL value
25 - Describe the escape-hatch environment variable
26 - Remove rationale for not enabling verify_SSL
27 - Add missing certificate search paths
28 - Replace "SSL" with "TLS/SSL" where appropriate
29 - Use "machine-in-the-middle" instead of "man-in-the-middle"
30
31Upstream-Status: Backport [https://github.com/chansen/p5-http-tiny/commit/77f557ef84698efeb6eed04e4a9704eaf85b741d]
32
33Signed-off-by: Soumya <soumya.sambu@windriver.com>
34---
35 cpan/HTTP-Tiny/lib/HTTP/Tiny.pm | 86 ++++++++++++++++++++++-----------
36 1 file changed, 57 insertions(+), 29 deletions(-)
37
38diff --git a/cpan/HTTP-Tiny/lib/HTTP/Tiny.pm b/cpan/HTTP-Tiny/lib/HTTP/Tiny.pm
39index 5803e45..1808c41 100644
40--- a/cpan/HTTP-Tiny/lib/HTTP/Tiny.pm
41+++ b/cpan/HTTP-Tiny/lib/HTTP/Tiny.pm
42@@ -39,10 +39,14 @@ sub _croak { require Carp; Carp::croak(@_) }
43 #pod C<$ENV{no_proxy}> —)
44 #pod * C<timeout> — Request timeout in seconds (default is 60) If a socket open,
45 #pod read or write takes longer than the timeout, an exception is thrown.
46-#pod * C<verify_SSL> — A boolean that indicates whether to validate the SSL
47-#pod certificate of an C<https> — connection (default is false)
48+#pod * C<verify_SSL> — A boolean that indicates whether to validate the TLS/SSL
49+#pod certificate of an C<https> — connection (default is true). Changed from false
50+#pod to true in version 0.083.
51 #pod * C<SSL_options> — A hashref of C<SSL_*> — options to pass through to
52 #pod L<IO::Socket::SSL>
53+#pod * C<$ENV{PERL_HTTP_TINY_SSL_INSECURE_BY_DEFAULT}> - Changes the default
54+#pod certificate verification behavior to not check server identity if set to 1.
55+#pod Only effective if C<verify_SSL> is not set. Added in version 0.083.
56 #pod
57 #pod Passing an explicit C<undef> for C<proxy>, C<http_proxy> or C<https_proxy> will
58 #pod prevent getting the corresponding proxies from the environment.
59@@ -108,11 +112,17 @@ sub timeout {
60 sub new {
61 my($class, %args) = @_;
62
63+ # Support lower case verify_ssl argument, but only if verify_SSL is not
64+ # true.
65+ if ( exists $args{verify_ssl} ) {
66+ $args{verify_SSL} ||= $args{verify_ssl};
67+ }
68+
69 my $self = {
70 max_redirect => 5,
71 timeout => defined $args{timeout} ? $args{timeout} : 60,
72 keep_alive => 1,
73- verify_SSL => $args{verify_SSL} || $args{verify_ssl} || 0, # no verification by default
74+ verify_SSL => defined $args{verify_SSL} ? $args{verify_SSL} : _verify_SSL_default(),
75 no_proxy => $ENV{no_proxy},
76 };
77
78@@ -131,6 +141,13 @@ sub new {
79 return $self;
80 }
81
82+sub _verify_SSL_default {
83+ my ($self) = @_;
84+ # Check if insecure default certificate verification behaviour has been
85+ # changed by the user by setting PERL_HTTP_TINY_SSL_INSECURE_BY_DEFAULT=1
86+ return (($ENV{PERL_HTTP_TINY_INSECURE_BY_DEFAULT} || '') eq '1') ? 0 : 1;
87+}
88+
89 sub _set_proxies {
90 my ($self) = @_;
91
92@@ -1038,7 +1055,7 @@ sub new {
93 timeout => 60,
94 max_line_size => 16384,
95 max_header_lines => 64,
96- verify_SSL => 0,
97+ verify_SSL => HTTP::Tiny::_verify_SSL_default(),
98 SSL_options => {},
99 %args
100 }, $class;
101@@ -2009,11 +2026,11 @@ proxy
102 timeout
103 verify_SSL
104
105-=head1 SSL SUPPORT
106+=head1 TLS/SSL SUPPORT
107
108 Direct C<https> connections are supported only if L<IO::Socket::SSL> 1.56 or
109 greater and L<Net::SSLeay> 1.49 or greater are installed. An exception will be
110-thrown if new enough versions of these modules are not installed or if the SSL
111+thrown if new enough versions of these modules are not installed or if the TLS
112 encryption fails. You can also use C<HTTP::Tiny::can_ssl()> utility function
113 that returns boolean to see if the required modules are installed.
114
115@@ -2021,7 +2038,7 @@ An C<https> connection may be made via an C<http> proxy that supports the CONNEC
116 command (i.e. RFC 2817). You may not proxy C<https> via a proxy that itself
117 requires C<https> to communicate.
118
119-SSL provides two distinct capabilities:
120+TLS/SSL provides two distinct capabilities:
121
122 =over 4
123
124@@ -2035,24 +2052,17 @@ Verification of server identity
125
126 =back
127
128-B<By default, HTTP::Tiny does not verify server identity>.
129-
130-Server identity verification is controversial and potentially tricky because it
131-depends on a (usually paid) third-party Certificate Authority (CA) trust model
132-to validate a certificate as legitimate. This discriminates against servers
133-with self-signed certificates or certificates signed by free, community-driven
134-CA's such as L<CAcert.org|http://cacert.org>.
135+B<By default, HTTP::Tiny verifies server identity>.
136
137-By default, HTTP::Tiny does not make any assumptions about your trust model,
138-threat level or risk tolerance. It just aims to give you an encrypted channel
139-when you need one.
140+This was changed in version 0.083 due to security concerns. The previous default
141+behavior can be enabled by setting C<$ENV{PERL_HTTP_TINY_SSL_INSECURE_BY_DEFAULT}>
142+to 1.
143
144-Setting the C<verify_SSL> attribute to a true value will make HTTP::Tiny verify
145-that an SSL connection has a valid SSL certificate corresponding to the host
146-name of the connection and that the SSL certificate has been verified by a CA.
147-Assuming you trust the CA, this will protect against a L<man-in-the-middle
148-attack|http://en.wikipedia.org/wiki/Man-in-the-middle_attack>. If you are
149-concerned about security, you should enable this option.
150+Verification is done by checking that that the TLS/SSL connection has a valid
151+certificate corresponding to the host name of the connection and that the
152+certificate has been verified by a CA. Assuming you trust the CA, this will
153+protect against L<machine-in-the-middle
154+attacks|http://en.wikipedia.org/wiki/Machine-in-the-middle_attack>.
155
156 Certificate verification requires a file containing trusted CA certificates.
157
158@@ -2060,9 +2070,7 @@ If the environment variable C<SSL_CERT_FILE> is present, HTTP::Tiny
159 will try to find a CA certificate file in that location.
160
161 If the L<Mozilla::CA> module is installed, HTTP::Tiny will use the CA file
162-included with it as a source of trusted CA's. (This means you trust Mozilla,
163-the author of Mozilla::CA, the CPAN mirror where you got Mozilla::CA, the
164-toolchain used to install it, and your operating system security, right?)
165+included with it as a source of trusted CA's.
166
167 If that module is not available, then HTTP::Tiny will search several
168 system-specific default locations for a CA certificate file:
169@@ -2081,13 +2089,33 @@ system-specific default locations for a CA certificate file:
170
171 /etc/ssl/ca-bundle.pem
172
173+=item *
174+
175+/etc/openssl/certs/ca-certificates.crt
176+
177+=item *
178+
179+/etc/ssl/cert.pem
180+
181+=item *
182+
183+/usr/local/share/certs/ca-root-nss.crt
184+
185+=item *
186+
187+/etc/pki/tls/cacert.pem
188+
189+=item *
190+
191+/etc/certs/ca-certificates.crt
192+
193 =back
194
195 An exception will be raised if C<verify_SSL> is true and no CA certificate file
196 is available.
197
198-If you desire complete control over SSL connections, the C<SSL_options> attribute
199-lets you provide a hash reference that will be passed through to
200+If you desire complete control over TLS/SSL connections, the C<SSL_options>
201+attribute lets you provide a hash reference that will be passed through to
202 C<IO::Socket::SSL::start_SSL()>, overriding any options set by HTTP::Tiny. For
203 example, to provide your own trusted CA file:
204
205@@ -2097,7 +2125,7 @@ example, to provide your own trusted CA file:
206
207 The C<SSL_options> attribute could also be used for such things as providing a
208 client certificate for authentication to a server or controlling the choice of
209-cipher used for the SSL connection. See L<IO::Socket::SSL> documentation for
210+cipher used for the TLS/SSL connection. See L<IO::Socket::SSL> documentation for
211 details.
212
213 =head1 PROXY SUPPORT
214--
2152.40.0
diff --git a/meta/recipes-devtools/perl/files/CVE-2023-31486-0002.patch b/meta/recipes-devtools/perl/files/CVE-2023-31486-0002.patch
new file mode 100644
index 0000000000..45452be389
--- /dev/null
+++ b/meta/recipes-devtools/perl/files/CVE-2023-31486-0002.patch
@@ -0,0 +1,36 @@
1From a22785783b17cbaa28afaee4a024d81a1903701d
2From: Stig Palmquist <git@stig.io>
3Date: Sun Jun 18 11:36:05 2023 +0200
4Subject: [PATCH] Fix incorrect env var name for verify_SSL default
5
6The variable to override the verify_SSL default differed slightly in the
7documentation from what was checked for in the code.
8
9This commit makes the code use `PERL_HTTP_TINY_SSL_INSECURE_BY_DEFAULT`
10as documented, instead of `PERL_HTTP_TINY_INSECURE_BY_DEFAULT` which was
11missing `SSL_`
12
13CVE: CVE-2023-31486
14
15Upstream-Status: Backport [https://github.com/chansen/p5-http-tiny/commit/a22785783b17cbaa28afaee4a024d81a1903701d]
16
17Signed-off-by: Soumya <soumya.sambu@windriver.com>
18---
19 cpan/HTTP-Tiny/lib/HTTP/Tiny.pm | 2 +-
20 1 file changed, 1 insertion(+), 1 deletion(-)
21
22diff --git a/cpan/HTTP-Tiny/lib/HTTP/Tiny.pm b/cpan/HTTP-Tiny/lib/HTTP/Tiny.pm
23index ebc34a1..65ac8ff 100644
24--- a/cpan/HTTP-Tiny/lib/HTTP/Tiny.pm
25+++ b/cpan/HTTP-Tiny/lib/HTTP/Tiny.pm
26@@ -148,7 +148,7 @@ sub _verify_SSL_default {
27 my ($self) = @_;
28 # Check if insecure default certificate verification behaviour has been
29 # changed by the user by setting PERL_HTTP_TINY_SSL_INSECURE_BY_DEFAULT=1
30- return (($ENV{PERL_HTTP_TINY_INSECURE_BY_DEFAULT} || '') eq '1') ? 0 : 1;
31+ return (($ENV{PERL_HTTP_TINY_SSL_INSECURE_BY_DEFAULT} || '') eq '1') ? 0 : 1;
32 }
33
34 sub _set_proxies {
35--
362.40.0
diff --git a/meta/recipes-devtools/perl/perl_5.34.1.bb b/meta/recipes-devtools/perl/perl_5.34.1.bb
index e0ee006e50..db306d0be3 100644
--- a/meta/recipes-devtools/perl/perl_5.34.1.bb
+++ b/meta/recipes-devtools/perl/perl_5.34.1.bb
@@ -19,6 +19,8 @@ SRC_URI = "https://www.cpan.org/src/5.0/perl-${PV}.tar.gz;name=perl \
19 file://0001-cpan-Sys-Syslog-Makefile.PL-Fix-_PATH_LOG-for-determ.patch \ 19 file://0001-cpan-Sys-Syslog-Makefile.PL-Fix-_PATH_LOG-for-determ.patch \
20 file://0001-Fix-build-with-gcc-12.patch \ 20 file://0001-Fix-build-with-gcc-12.patch \
21 file://CVE-2023-31484.patch \ 21 file://CVE-2023-31484.patch \
22 file://CVE-2023-31486-0001.patch \
23 file://CVE-2023-31486-0002.patch \
22 " 24 "
23SRC_URI:append:class-native = " \ 25SRC_URI:append:class-native = " \
24 file://perl-configpm-switch.patch \ 26 file://perl-configpm-switch.patch \