Bug#863735: unblock: freeradius/3.0.12+dfsg-5
Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: unblock
Please unblock package freeradius
The new upload addresses a security issue: CVE-2017-9148, #863673
% debdiff freeradius_3.0.12+dfsg-4.dsc freeradius_3.0.12+dfsg-5.dsc
dpkg-source: warning: extracting unsigned source package (/home/michael/d/out/freeradius/freeradius_3.0.12+dfsg-4.dsc)
diff -Nru freeradius-3.0.12+dfsg/debian/changelog freeradius-3.0.12+dfsg/debian/changelog
--- freeradius-3.0.12+dfsg/debian/changelog 2016-11-17 22:29:04.000000000 +0100
+++ freeradius-3.0.12+dfsg/debian/changelog 2017-05-30 17:18:34.000000000 +0200
@@ -1,3 +1,9 @@
+freeradius (3.0.12+dfsg-5) unstable; urgency=high
+
+ * disable session cache to address CVE-2017-9148 (closes: #863673)
+
+ -- Michael Stapelberg <stapelberg@debian.org> Tue, 30 May 2017 17:18:34 +0200
+
freeradius (3.0.12+dfsg-4) unstable; urgency=medium
* fix openssl-1.1.diff: initialize ctx_out
diff -Nru freeradius-3.0.12+dfsg/debian/patches/disable-session-cache-CVE-2017-9148.patch freeradius-3.0.12+dfsg/debian/patches/disable-session-cache-CVE-2017-9148.patch
--- freeradius-3.0.12+dfsg/debian/patches/disable-session-cache-CVE-2017-9148.patch 1970-01-01 01:00:00.000000000 +0100
+++ freeradius-3.0.12+dfsg/debian/patches/disable-session-cache-CVE-2017-9148.patch 2017-05-30 17:18:34.000000000 +0200
@@ -0,0 +1,49 @@
+Description: disable session caching in the server (as opposed to in the
+ config, which would be way harder to get right) to address
+ https://security-tracker.debian.org/tracker/CVE-2017-9148
+Author: Michael Stapelberg <stapelberg@debian.org>
+Forwarded: not-needed
+Last-Update: 2017-05-30
+
+---
+
+Index: freeradius/src/main/tls.c
+===================================================================
+--- freeradius.orig/src/main/tls.c
++++ freeradius/src/main/tls.c
+@@ -579,7 +579,7 @@ tls_session_t *tls_new_session(TALLOC_CT
+ *
+ * FIXME: Also do it every N sessions?
+ */
+- if (conf->session_cache_enable &&
++ if (/*conf->session_cache_enable*/0 &&
+ ((conf->session_last_flushed + ((int)conf->session_timeout * 1800)) <= request->timestamp)){
+ RDEBUG2("Flushing SSL sessions (of #%ld)", SSL_CTX_sess_number(conf->ctx));
+
+@@ -674,7 +674,7 @@ tls_session_t *tls_new_session(TALLOC_CT
+ state->mtu = vp->vp_integer;
+ }
+
+- if (conf->session_cache_enable) state->allow_session_resumption = true; /* otherwise it's false */
++ if (/*conf->session_cache_enable*/0) state->allow_session_resumption = true; /* otherwise it's false */
+
+ return state;
+ }
+@@ -2848,7 +2848,7 @@ post_ca:
+ /*
+ * Callbacks, etc. for session resumption.
+ */
+- if (conf->session_cache_enable) {
++ if (/*conf->session_cache_enable*/0) {
+ /*
+ * Cache sessions on disk if requested.
+ */
+@@ -2916,7 +2916,7 @@ post_ca:
+ /*
+ * Setup session caching
+ */
+- if (conf->session_cache_enable) {
++ if (/*conf->session_cache_enable*/0) {
+ /*
+ * Create a unique context Id per EAP-TLS configuration.
+ */
diff -Nru freeradius-3.0.12+dfsg/debian/patches/series freeradius-3.0.12+dfsg/debian/patches/series
--- freeradius-3.0.12+dfsg/debian/patches/series 2016-11-17 22:29:04.000000000 +0100
+++ freeradius-3.0.12+dfsg/debian/patches/series 2017-05-30 17:18:34.000000000 +0200
@@ -1,3 +1,4 @@
+disable-session-cache-CVE-2017-9148.patch
debian-local/0001-Rename-radius-to-freeradius.patch
0002-gitignore.diff.patch
0006-jradius.diff.patch
unblock freeradius/3.0.12+dfsg-5
-- System Information:
Debian Release: 9.0
APT prefers testing
APT policy: (990, 'testing'), (500, 'unstable-debug'), (500, 'testing-debug'), (500, 'unstable')
Architecture: amd64
(x86_64)
Foreign Architectures: i386, armel, mipsel, arm64
Kernel: Linux 4.9.0-2-amd64 (SMP w/8 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
Reply to: