[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 2577-1] python-pysaml2 security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-2577-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                          Abhijith PA
February 26, 2021                             https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : python-pysaml2
Version        : 3.0.0-5+deb9u2
CVE ID         : CVE-2017-1000433 CVE-2021-21239
Debian Bug     : 886423 CVE-2021-21239

Several issues have been found in python-pysaml2, a pure python 
implementation of SAML Version 2 Standard.

CVE-2017-1000433

     pysaml2 accept any password when run with python optimizations 
     enabled. This allows attackers to log in as any user without 
     knowing their password.

CVE-2021-21239

     pysaml2 has an improper verification of cryptographic signature
     vulnerability. Users of pysaml2 that use the default
     CryptoBackendXmlSec1 backend and need to verify signed SAML
     documents are impacted. PySAML2 does not ensure that a signed
     SAML document is correctly signed. The default
     CryptoBackendXmlSec1 backend is using the xmlsec1 binary to
     verify the signature of signed SAML documents, but by default
     xmlsec1 accepts any type of key found within the given document.
     xmlsec1 needs to be configured explicitly to only use only _x509
     certificates_ for the verification process of the SAML document signature.

For Debian 9 stretch, these problems have been fixed in version
3.0.0-5+deb9u2.

We recommend that you upgrade your python-pysaml2 packages.

For the detailed security status of python-pysaml2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python-pysaml2

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=GU8r
-----END PGP SIGNATURE-----


Reply to: