Package: nginx
Version: 0.7.67-3
Severity: grave
Tags: security patch

Hi,

nginx in squeeze and wheezy is vulnerable to the SSL attack CVE-2012-4929
dubbed 'CRIME'. The attack is related to SSL compression.

The popular solution to the attack is to disable SSL compression. This is
what Apache has done and also what nginx upstream has done in 1.2.2.
Attached patch does that, works for us and we've verified that it solves
the problem.

Upstream info is here: http://forum.nginx.org/read.php?2,231067,231068

I'd gladly hear your view on this patch. Barring any objections I'm planning
to release this as a DSA after the weekend, and also make an upload to
wheezy.


Cheers,
Thijs

-- System Information:
Debian Release: 7.0
  APT prefers testing
  APT policy: (400, 'testing'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=nl_NL.UTF-8, LC_CTYPE=nl_NL.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Index: nginx-0.7.67/src/event/ngx_event_openssl.c
===================================================================
--- nginx-0.7.67.orig/src/event/ngx_event_openssl.c	2010-06-07 13:55:20.000000000 +0200
+++ nginx-0.7.67/src/event/ngx_event_openssl.c	2013-02-12 16:02:39.238581000 +0100
@@ -108,6 +108,9 @@
 
     OpenSSL_add_all_algorithms();
 
+    /* Disable compression in older versions of OpenSSL (CVE-2012-4929) */
+    sk_SSL_COMP_zero(SSL_COMP_get_compression_methods());
+
     ngx_ssl_connection_index = SSL_get_ex_new_index(0, NULL, NULL, NULL, NULL);
 
     if (ngx_ssl_connection_index == -1) {

Reply via email to