Your message dated Mon, 03 Apr 2017 11:43:00 +0000
with message-id <[email protected]>
and subject line Re: Bug#859382: unblock: sleekxmpp/1.3.1-6
has caused the Debian Bug report #859382,
regarding unblock: sleekxmpp/1.3.1-6
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
859382: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859382
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: [email protected]
Usertags: unblock

Please unblock package sleekxmpp

Two bug fixes from upstream 1.3.2 have been taken to patch 1.3.1
against bugs #854739 (CVE-2017-5591, grave) and #851900 (Fails
to connect to servers that only support TLS 1.1 or TLS 1.2,
important).

diff -Nru sleekxmpp-1.3.1/debian/changelog sleekxmpp-1.3.1/debian/changelog
--- sleekxmpp-1.3.1/debian/changelog    2016-12-25 22:28:41.000000000 +0100
+++ sleekxmpp-1.3.1/debian/changelog    2017-04-03 02:04:06.000000000 +0200
@@ -1,3 +1,16 @@
+sleekxmpp (1.3.1-6) unstable; urgency=medium
+
+  * Fix CVE-2017-5591:
+    An incorrect implementation of XEP-0280: Message Carbons in slixmpp allows
+    a remote attacker to impersonate any user, including contacts, in the
+    vulnerable application's display. This allows for various kinds of social
+    engineering attacks. (Closes: #854739)
+  * Use ssl.get_protocol_name() to find out which TLS version is
+    in use (allows the latest TLS versions to be used as well as any future
+    versions). (Closes: #851900)
+
+ -- W. Martin Borgert <[email protected]>  Mon, 03 Apr 2017 00:04:06 +0000
+
 sleekxmpp (1.3.1-5) unstable; urgency=medium
 
   * use debhelper 9 compat
diff -Nru sleekxmpp-1.3.1/debian/patches/002-fix_tls_version_check.patch 
sleekxmpp-1.3.1/debian/patches/002-fix_tls_version_check.patch
--- sleekxmpp-1.3.1/debian/patches/002-fix_tls_version_check.patch      
1970-01-01 01:00:00.000000000 +0100
+++ sleekxmpp-1.3.1/debian/patches/002-fix_tls_version_check.patch      
2017-04-03 02:04:06.000000000 +0200
@@ -0,0 +1,24 @@
+Description: Use ssl.get_protocol_name() to find out which TLS version is
+ in use (allows the latest TLS versions to be used as well as any future
+ versions).
+Author: Chris Snijder <[email protected]>
+Origin: upstream, 
https://github.com/fritzy/SleekXMPP/commit/6ebcf6b60d879e31e41bac58ba7db6ea760579b9
+Bug-Debian: https://bugs.debian.org/851900
+Last-Update: 2017-04-02
+---
+This patch header follows DEP-3: http://dep.debian.net/deps/dep3/
+--- a/sleekxmpp/xmlstream/xmlstream.py
++++ b/sleekxmpp/xmlstream/xmlstream.py
+@@ -839,8 +839,10 @@ def start_tls(self):
+         to be restarted.
+         """
+         log.info("Negotiating TLS")
+-        ssl_versions = {3: 'TLS 1.0', 1: 'SSL 3', 2: 'SSL 2/3'}
+-        log.info("Using SSL version: %s", ssl_versions[self.ssl_version])
++        log.info(
++            "Using SSL version: %s",
++            ssl.get_protocol_name(self.ssl_version).replace('PROTOCOL_', '', 
1)
++        )
+         if self.ca_certs is None:
+             cert_policy = ssl.CERT_NONE
+         else:
diff -Nru sleekxmpp-1.3.1/debian/patches/CVE-2017-5591.patch 
sleekxmpp-1.3.1/debian/patches/CVE-2017-5591.patch
--- sleekxmpp-1.3.1/debian/patches/CVE-2017-5591.patch  1970-01-01 
01:00:00.000000000 +0100
+++ sleekxmpp-1.3.1/debian/patches/CVE-2017-5591.patch  2017-04-03 
02:04:06.000000000 +0200
@@ -0,0 +1,29 @@
+Description: fix for CVE-2017-5591
+ An incorrect implementation of XEP-0280: Message Carbons in slixmpp allows a
+ remote attacker to impersonate any user, including contacts, in the vulnerable
+ application's display. This allows for various kinds of social engineering
+ attacks.
+Author: mathieui <[email protected]>
+Origin: other, 
https://github.com/poezio/slixmpp/commit/22664ee7b86c8e010f312b66d12590fb471
+Bug: https://github.com/fritzy/SleekXMPP/issues/442
+Bug-Debian: https://bugs.debian.org/854739
+Last-Update: 2017-03-23
+---
+This patch header follows DEP-3: http://dep.debian.net/deps/dep3/
+--- a/sleekxmpp/plugins/xep_0280/carbons.py
++++ b/sleekxmpp/plugins/xep_0280/carbons.py
+@@ -61,10 +61,12 @@
+         self.xmpp.plugin['xep_0030'].add_feature('urn:xmpp:carbons:2')
+ 
+     def _handle_carbon_received(self, msg):
+-        self.xmpp.event('carbon_received', msg)
++        if msg['from'].bare == self.xmpp.boundjid.bare:
++            self.xmpp.event('carbon_received', msg)
+ 
+     def _handle_carbon_sent(self, msg):
+-        self.xmpp.event('carbon_sent', msg)
++        if msg['from'].bare == self.xmpp.boundjid.bare:
++            self.xmpp.event('carbon_sent', msg)
+ 
+     def enable(self, ifrom=None, block=True, timeout=None, callback=None):
+         iq = self.xmpp.Iq()
diff -Nru sleekxmpp-1.3.1/debian/patches/series 
sleekxmpp-1.3.1/debian/patches/series
--- sleekxmpp-1.3.1/debian/patches/series       2015-12-29 22:44:03.000000000 
+0100
+++ sleekxmpp-1.3.1/debian/patches/series       2017-04-03 02:04:06.000000000 
+0200
@@ -1 +1,3 @@
+CVE-2017-5591.patch
 0001-get-rid-of-embedded-copies-dateutil-gnupg-ordereddic.patch
+002-fix_tls_version_check.patch

unblock sleekxmpp/1.3.1-6

--- End Message ---
--- Begin Message ---
W. Martin Borgert:
> Package: release.debian.org
> Severity: normal
> User: [email protected]
> Usertags: unblock
> 
> Please unblock package sleekxmpp
> 
> Two bug fixes from upstream 1.3.2 have been taken to patch 1.3.1
> against bugs #854739 (CVE-2017-5591, grave) and #851900 (Fails
> to connect to servers that only support TLS 1.1 or TLS 1.2,
> important).
> 
> [...]
> 
> unblock sleekxmpp/1.3.1-6
> 

Unblocked, thanks.

~Niels

--- End Message ---

Reply via email to