[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#863735: unblock: freeradius/3.0.12+dfsg-5



Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: unblock

Please unblock package freeradius

The new upload addresses a security issue: CVE-2017-9148, #863673

% debdiff freeradius_3.0.12+dfsg-4.dsc freeradius_3.0.12+dfsg-5.dsc 
dpkg-source: warning: extracting unsigned source package (/home/michael/d/out/freeradius/freeradius_3.0.12+dfsg-4.dsc)
diff -Nru freeradius-3.0.12+dfsg/debian/changelog freeradius-3.0.12+dfsg/debian/changelog
--- freeradius-3.0.12+dfsg/debian/changelog	2016-11-17 22:29:04.000000000 +0100
+++ freeradius-3.0.12+dfsg/debian/changelog	2017-05-30 17:18:34.000000000 +0200
@@ -1,3 +1,9 @@
+freeradius (3.0.12+dfsg-5) unstable; urgency=high
+
+  * disable session cache to address CVE-2017-9148 (closes: #863673)
+
+ -- Michael Stapelberg <stapelberg@debian.org>  Tue, 30 May 2017 17:18:34 +0200
+
 freeradius (3.0.12+dfsg-4) unstable; urgency=medium
 
   * fix openssl-1.1.diff: initialize ctx_out
diff -Nru freeradius-3.0.12+dfsg/debian/patches/disable-session-cache-CVE-2017-9148.patch freeradius-3.0.12+dfsg/debian/patches/disable-session-cache-CVE-2017-9148.patch
--- freeradius-3.0.12+dfsg/debian/patches/disable-session-cache-CVE-2017-9148.patch	1970-01-01 01:00:00.000000000 +0100
+++ freeradius-3.0.12+dfsg/debian/patches/disable-session-cache-CVE-2017-9148.patch	2017-05-30 17:18:34.000000000 +0200
@@ -0,0 +1,49 @@
+Description: disable session caching in the server (as opposed to in the
+ config, which would be way harder to get right) to address
+ https://security-tracker.debian.org/tracker/CVE-2017-9148
+Author: Michael Stapelberg <stapelberg@debian.org>
+Forwarded: not-needed
+Last-Update: 2017-05-30
+
+---
+
+Index: freeradius/src/main/tls.c
+===================================================================
+--- freeradius.orig/src/main/tls.c
++++ freeradius/src/main/tls.c
+@@ -579,7 +579,7 @@ tls_session_t *tls_new_session(TALLOC_CT
+ 	 *
+ 	 *	FIXME: Also do it every N sessions?
+ 	 */
+-	if (conf->session_cache_enable &&
++	if (/*conf->session_cache_enable*/0 &&
+ 	    ((conf->session_last_flushed + ((int)conf->session_timeout * 1800)) <= request->timestamp)){
+ 		RDEBUG2("Flushing SSL sessions (of #%ld)", SSL_CTX_sess_number(conf->ctx));
+ 
+@@ -674,7 +674,7 @@ tls_session_t *tls_new_session(TALLOC_CT
+ 		state->mtu = vp->vp_integer;
+ 	}
+ 
+-	if (conf->session_cache_enable) state->allow_session_resumption = true; /* otherwise it's false */
++	if (/*conf->session_cache_enable*/0) state->allow_session_resumption = true; /* otherwise it's false */
+ 
+ 	return state;
+ }
+@@ -2848,7 +2848,7 @@ post_ca:
+ 	/*
+ 	 *	Callbacks, etc. for session resumption.
+ 	 */
+-	if (conf->session_cache_enable) {
++	if (/*conf->session_cache_enable*/0) {
+ 		/*
+ 		 *	Cache sessions on disk if requested.
+ 		 */
+@@ -2916,7 +2916,7 @@ post_ca:
+ 	/*
+ 	 *	Setup session caching
+ 	 */
+-	if (conf->session_cache_enable) {
++	if (/*conf->session_cache_enable*/0) {
+ 		/*
+ 		 *	Create a unique context Id per EAP-TLS configuration.
+ 		 */
diff -Nru freeradius-3.0.12+dfsg/debian/patches/series freeradius-3.0.12+dfsg/debian/patches/series
--- freeradius-3.0.12+dfsg/debian/patches/series	2016-11-17 22:29:04.000000000 +0100
+++ freeradius-3.0.12+dfsg/debian/patches/series	2017-05-30 17:18:34.000000000 +0200
@@ -1,3 +1,4 @@
+disable-session-cache-CVE-2017-9148.patch
 debian-local/0001-Rename-radius-to-freeradius.patch
 0002-gitignore.diff.patch
 0006-jradius.diff.patch

unblock freeradius/3.0.12+dfsg-5

-- System Information:
Debian Release: 9.0
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable-debug'), (500, 'testing-debug'), (500, 'unstable')
Architecture: amd64
 (x86_64)
Foreign Architectures: i386, armel, mipsel, arm64

Kernel: Linux 4.9.0-2-amd64 (SMP w/8 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)


Reply to: