[Pkg-telepathy-commits] [SCM] telepathy-gabble packaging branch, debian-squeeze, updated. debian/0.9.15-1-2-gd70ad8a

Jonny Lamb jonny at debian.org
Thu Feb 17 09:32:10 UTC 2011


The following commit has been merged in the debian-squeeze branch:
commit 3701898420a6e6c03adc1a9e96d79e4e0e5b8a34
Author: Jonny Lamb <jonny at debian.org>
Date:   Wed Feb 16 15:51:56 2011 +0000

    debian/patches/00-jingleinfo.diff: Added.
    
    Signed-off-by: Jonny Lamb <jonny at debian.org>

diff --git a/debian/changelog b/debian/changelog
index d3f0f4e..5a5c679 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,13 @@
+telepathy-gabble (0.9.15-1+squeeze1) UNRELEASED; urgency=low
+
+  * debian/patches/00-jingleinfo.diff: Added to ignore google:jingleinfo
+    pushes from contacts which may theoretically allow an attacker to
+    trick Gabble into relaying streamed media through a server of the
+    attacker's choosing, enabling them to intercept, obstruct or modify
+    the user's audio and video calls.
+
+ -- Jonny Lamb <jonny at debian.org>  Wed, 16 Feb 2011 15:51:10 +0000
+
 telepathy-gabble (0.9.15-1) unstable; urgency=low
 
   * New upstream release
diff --git a/debian/patches/00-jingleinfo.diff b/debian/patches/00-jingleinfo.diff
new file mode 100644
index 0000000..9e5e293
--- /dev/null
+++ b/debian/patches/00-jingleinfo.diff
@@ -0,0 +1,53 @@
+From 5ab349b6837389d21a2664a71db464d1b9c6644c Mon Sep 17 00:00:00 2001
+From: Will Thompson <will.thompson at collabora.co.uk>
+Date: Tue, 8 Feb 2011 18:43:21 +0000
+Subject: [PATCH] Ignore google:jingleinfo pushes from contacts.
+
+Previously, Gabble would erroneously process google:jingleinfo updates
+sent by anybody, rather than only paying attention to those sent by the
+user's server. This may theoretically allow an attacker to trick Gabble
+into relaying streamed media through a server of the attacker's
+choosing, enabling them to intercept, obstruct or modify the user's
+audio and video calls.
+
+This patch addresses this flaw, following the same pattern as the
+corresponding check in the roster code.
+
+Note that even without this flaw, no security guarantees on media in
+calls can be provided in the presence of malicious network admins or
+insecure networks: an attacker who can eavesdrop the network traffic
+still has the ability to intercept the content of the call, as the media
+is transmitted unencrypted.
+---
+ src/jingle-factory.c |   16 ++++++++++++++++
+ 1 files changed, 16 insertions(+), 0 deletions(-)
+
+diff --git a/src/jingle-factory.c b/src/jingle-factory.c
+index 0ad4d6b..02add56 100644
+--- a/src/jingle-factory.c
++++ b/src/jingle-factory.c
+@@ -254,6 +254,22 @@ got_jingle_info_stanza (GabbleJingleFactory *fac,
+   GabbleJingleFactoryPrivate *priv = fac->priv;
+   LmMessageSubType sub_type;
+   LmMessageNode *query_node, *node;
++  const gchar *from = wocky_node_get_attribute (wocky_stanza_get_top_node (message), "from");
++
++  if (from != NULL)
++    {
++      TpBaseConnection *base_conn = TP_BASE_CONNECTION (priv->conn);
++      TpHandleRepoIface *contact_repo = tp_base_connection_get_handles (
++          base_conn, TP_HANDLE_TYPE_CONTACT);
++      TpHandle sender = tp_handle_lookup (contact_repo, from, NULL, NULL);
++
++      if (sender != base_conn->self_handle)
++        {
++          DEBUG ("ignoring jingleinfo from '%s', not ourself nor the server",
++              from);
++          return LM_HANDLER_RESULT_ALLOW_MORE_HANDLERS;
++        }
++    }
+
+   query_node = lm_message_node_get_child_with_namespace (
+       wocky_stanza_get_top_node (message), "query", NS_GOOGLE_JINGLE_INFO);
+-- 
+1.7.2.3

-- 
telepathy-gabble packaging



More information about the Pkg-telepathy-commits mailing list