|
|
Subscribe / Log in / New account

Debian alert DLA-1314-1 (simplesamlphp)

From:  Thijs Kinkhorst <thijs@debian.org>
To:  <debian-lts-announce@lists.debian.org>
Subject:  [SECURITY] [DLA 1314-1] simplesamlphp security update
Date:  Fri, 23 Mar 2018 12:58:28 +0100
Message-ID:  <f04e1c82-ac0d-f29c-8933-f82180dbce55@debian.org>

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Package : simplesamlphp Version : 1.9.2-1+deb7u4 CVE ID : CVE-2018-7711 Cure53 discovered that in SimpleSAMLphp, in rare circumstances an invalid signature on the SAML 2.0 HTTP Redirect binding could be considered valid. Additionally this update fixes a regression introduced in DLA-1298 by the backported patch for SSA-201802-01/CVE-2018-7644. For Debian 7 "Wheezy", these problems have been fixed in version 1.9.2-1+deb7u4. We recommend that you upgrade your simplesamlphp packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQEuBAEBCAAYBQJatOvfERx0aGlqc0BkZWJpYW4ub3JnAAoJEFb2GnlAHawEa1gI AKCdPxL7Wa99pCRftFLjb7ncjhJplXveO3jr3/DGVBTeKgfzTa340Qzbb4FgGGcB /At78ekCJNcD36swfiGc53V6rf4kiQgnthYxTR3zJPLDvM4YrzxWWFcBS7QT+RJE BFHFD+w8g6pVuhnZkrdJNRQ8FiWNNbf917WUQkcVLKOQx0M90cNWmhI96+Yd/xQz dKT21X4r9xpXNcDaDOrmV9gWm2JiO0V+Sff4iiAD6/RhwOtWBICp8npnwowJ0RFl iJJiDWxDDxNHRiQ/zuJGY3B7LvfvBfhrXjgP3N2jDYWrHMwJGjs+aQmOgBmRjTKQ UAnTxxv2TEL4x2louqa30zk= =lhxS -----END PGP SIGNATURE-----


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds