Debian alert DLA-1314-1 (simplesamlphp)
From: | Thijs Kinkhorst <thijs@debian.org> | |
To: | <debian-lts-announce@lists.debian.org> | |
Subject: | [SECURITY] [DLA 1314-1] simplesamlphp security update | |
Date: | Fri, 23 Mar 2018 12:58:28 +0100 | |
Message-ID: | <f04e1c82-ac0d-f29c-8933-f82180dbce55@debian.org> |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Package : simplesamlphp Version : 1.9.2-1+deb7u4 CVE ID : CVE-2018-7711 Cure53 discovered that in SimpleSAMLphp, in rare circumstances an invalid signature on the SAML 2.0 HTTP Redirect binding could be considered valid. Additionally this update fixes a regression introduced in DLA-1298 by the backported patch for SSA-201802-01/CVE-2018-7644. For Debian 7 "Wheezy", these problems have been fixed in version 1.9.2-1+deb7u4. We recommend that you upgrade your simplesamlphp packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQEuBAEBCAAYBQJatOvfERx0aGlqc0BkZWJpYW4ub3JnAAoJEFb2GnlAHawEa1gI AKCdPxL7Wa99pCRftFLjb7ncjhJplXveO3jr3/DGVBTeKgfzTa340Qzbb4FgGGcB /At78ekCJNcD36swfiGc53V6rf4kiQgnthYxTR3zJPLDvM4YrzxWWFcBS7QT+RJE BFHFD+w8g6pVuhnZkrdJNRQ8FiWNNbf917WUQkcVLKOQx0M90cNWmhI96+Yd/xQz dKT21X4r9xpXNcDaDOrmV9gWm2JiO0V+Sff4iiAD6/RhwOtWBICp8npnwowJ0RFl iJJiDWxDDxNHRiQ/zuJGY3B7LvfvBfhrXjgP3N2jDYWrHMwJGjs+aQmOgBmRjTKQ UAnTxxv2TEL4x2louqa30zk= =lhxS -----END PGP SIGNATURE-----