Name | CVE-2023-31486 |
Description | HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 954089, 962407 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
libhttp-tiny-perl (PTS) | bookworm | 0.082-2 | vulnerable |
| sid, trixie | 0.090-1 | fixed |
perl (PTS) | bullseye | 5.32.1-4+deb11u3 | vulnerable |
| bullseye (security) | 5.32.1-4+deb11u4 | vulnerable |
| bookworm | 5.36.0-7+deb12u1 | vulnerable |
| sid, trixie | 5.40.0-8 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
libhttp-tiny-perl | source | (unstable) | 0.088-1 | unimportant | | 962407 |
perl | source | experimental | 5.38.0~rc2-1 | | | |
perl | source | (unstable) | 5.38.2-2 | unimportant | | 954089 |
Notes
https://www.openwall.com/lists/oss-security/2023/04/18/14
https://github.com/chansen/p5-http-tiny/issues/134
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
https://hackeriet.github.io/cpan-http-tiny-overview/
Applications need to explicitly opt in to enable verification.