Package: release.debian.org
Severity: normal
User: release.debian....@packages.debian.org
Tags: squeeze
Usertags: pu

Please let ejabberd/2.1.5-3+squeeze2 enter Squeeze.

It fixes just a single security bug [1]: by disabling SSLv2 and weak
cyphers in TLS driver (this bug is itself a clone of [2] which has
been filed against the version in Sid and is intended to be fixed
by [3]).

Please see the attached debdiff.

1. http://bugs.debian.org/724993
2. http://bugs.debian.org/722105
3. http://bugs.debian.org/725790
diff -u ejabberd-2.1.5/debian/changelog ejabberd-2.1.5/debian/changelog
--- ejabberd-2.1.5/debian/changelog
+++ ejabberd-2.1.5/debian/changelog
@@ -1,3 +1,9 @@
+ejabberd (2.1.5-3+squeeze2) stable-security; urgency=low
+
+  * Disable SSLv2 and weak/export cyphers in TLS driver (closes: #724993).
+
+ -- Konstantin Khomoutov <flatw...@users.sourceforge.net>  Mon, 30 Sep 2013 
17:10:02 +0400
+
 ejabberd (2.1.5-3+squeeze1) stable-security; urgency=high
 
   * Non-maintainer upload by the Security Team.
diff -u ejabberd-2.1.5/debian/patches/series 
ejabberd-2.1.5/debian/patches/series
--- ejabberd-2.1.5/debian/patches/series
+++ ejabberd-2.1.5/debian/patches/series
@@ -10,0 +11,2 @@
+disable-ssl2.patch
+disable-insecure-ssl-cyphers.patch
only in patch2:
unchanged:
--- ejabberd-2.1.5.orig/debian/patches/disable-ssl2.patch
+++ ejabberd-2.1.5/debian/patches/disable-ssl2.patch
@@ -0,0 +1,36 @@
+Description: Disable SSLv2 in the TLS driver
+ SSL 2.0 is not used anywhere as it has security problems.
+ Disable it unconditionally both in server and client mode.
+ This does not disable support for SSL 2.0 compatible client
+ hello which still will be accepted in the server mode.
+ .
+ This patch is a backport of changes introduced by the commit
+ e06c1c49c14c3f56cf4ddae080514f7802669335 in the upstream Git repository
+ to the ejabberd code base as of version 2.1.12.
+Author: Janusz Dziemidowicz <rrapt...@nails.eu.org>
+Forwarded: not-needed
+Last-Update: 2013-09-29
+---
+This patch header follows DEP-3: http://dep.debian.net/deps/dep3/
+--- a/src/tls/tls_drv.c
++++ b/src/tls/tls_drv.c
+@@ -344,6 +344,8 @@
+           res = SSL_CTX_check_private_key(ctx);
+           die_unless(res > 0, "SSL_CTX_check_private_key failed");
+ 
++          SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv2|SSL_OP_NO_TICKET);
++
+           SSL_CTX_set_session_cache_mode(ctx, SSL_SESS_CACHE_OFF);
+           SSL_CTX_set_default_verify_paths(ctx);
+ 
+@@ -370,10 +372,8 @@
+        SSL_set_bio(d->ssl, d->bio_read, d->bio_write);
+ 
+        if (command == SET_CERTIFICATE_FILE_ACCEPT) {
+-          SSL_set_options(d->ssl, SSL_OP_NO_TICKET);
+           SSL_set_accept_state(d->ssl);
+        } else {
+-          SSL_set_options(d->ssl, SSL_OP_NO_SSLv2|SSL_OP_NO_TICKET);
+           SSL_set_connect_state(d->ssl);
+        }
+        break;
only in patch2:
unchanged:
--- ejabberd-2.1.5.orig/debian/patches/disable-insecure-ssl-cyphers.patch
+++ ejabberd-2.1.5/debian/patches/disable-insecure-ssl-cyphers.patch
@@ -0,0 +1,34 @@
+Description: Disable old and insecure cyphers in TLS driver
+ Disabled:
+ * Export ciphers - broken by design, 40 and 56 bit encryption.
+ * Low encryption ciphers - 56 and 64 bit encryption.
+ * SSLv2 ciphers - some ciphers using MD5 MAC.
+ .
+ This patch is a backport of changes introduced by the commit
+ d2d51381ec3fea97d0bd968cd7ffed2364b644c6 in the upstream Git repository
+ to the ejabberd code base as of version 2.1.12.
+Author: Janusz Dziemidowicz <rrapt...@nails.eu.org>
+Forwarded: not-needed
+Last-Update: 2013-09-29
+---
+This patch header follows DEP-3: http://dep.debian.net/deps/dep3/
+--- a/src/tls/tls_drv.c
++++ b/src/tls/tls_drv.c
+@@ -44,6 +44,8 @@
+ #define SSL_OP_NO_TICKET 0
+ #endif
+ 
++#define CIPHERS "DEFAULT:!EXPORT:!LOW:!SSLv2"
++
+ /*
+  * str_hash is based on the public domain code from
+  * http://www.burtleburtle.net/bob/hash/doobs.html
+@@ -346,6 +348,8 @@
+ 
+           SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv2|SSL_OP_NO_TICKET);
+ 
++          SSL_CTX_set_cipher_list(ctx, CIPHERS);
++
+           SSL_CTX_set_session_cache_mode(ctx, SSL_SESS_CACHE_OFF);
+           SSL_CTX_set_default_verify_paths(ctx);
+ 

Reply via email to