[shibboleth-sp2] 01/01: Security fix from V2.5.4 for CVE-2015-2684 backported to V2.3.1
Ferenc Wágner
wferi-guest at moszumanska.debian.org
Mon Apr 13 19:30:08 UTC 2015
This is an automated email from the git hooks/post-receive script.
wferi-guest pushed a commit to branch squeeze
in repository shibboleth-sp2.
commit 9c09d750ff1ca37fe480582feca16cdc07a9c75a
Author: Ferenc Wágner <wferi at niif.hu>
Date: Tue Mar 17 15:09:39 2015 +0100
Security fix from V2.5.4 for CVE-2015-2684 backported to V2.3.1
Shibboleth SP software crashes on malformed input messages
===============================================================
The SP software includes an authenticated denial of service
vulnerability that results in a crash on certain kinds of malformed
SAML messages. The vulnerability is only triggered when special
conditions are met and after a message or assertion signature
has been verified, so exploitation requires a message produced
under a trusted key, limiting the impact.
URL for the full Security Advisory:
http://shibboleth.net/community/advisories/secadv_20150319.txt
---
debian/changelog | 8 ++++++++
shibsp/handler/impl/SAML2Consumer.cpp | 4 ++++
shibsp/impl/StorageServiceSessionCache.cpp | 2 +-
3 files changed, 13 insertions(+), 1 deletion(-)
diff --git a/debian/changelog b/debian/changelog
index 39b695d..74dec45 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,11 @@
+shibboleth-sp2 (2.3.1+dfsg-5+deb6u1) squeeze-lts; urgency=high
+
+ * Backport security fix from V2.5.4 for CVE-2015-2684: authenticated
+ denial of service vulnerability that results in a crash on certain
+ kinds of malformed SAML messages.
+
+ -- Ferenc Wagner <wferi at niif.hu> Mon, 13 Apr 2015 21:09:55 +0200
+
shibboleth-sp2 (2.3.1+dfsg-5) unstable; urgency=high
* Merge the forgotten pidfile fix from branch bug/unlink-pidfile after
diff --git a/shibsp/handler/impl/SAML2Consumer.cpp b/shibsp/handler/impl/SAML2Consumer.cpp
index 1c7af13..a1792dc 100644
--- a/shibsp/handler/impl/SAML2Consumer.cpp
+++ b/shibsp/handler/impl/SAML2Consumer.cpp
@@ -38,6 +38,7 @@
# include <xmltooling/XMLToolingConfig.h>
# include <xmltooling/io/HTTPRequest.h>
# include <xmltooling/util/DateTime.h>
+# include <xmltooling/validation/ValidatorSuite.h>
using namespace opensaml::saml2;
using namespace opensaml::saml2p;
using namespace opensaml::saml2md;
@@ -275,6 +276,9 @@ void SAML2Consumer::implementProtocol(
continue;
try {
+ // Run the schema validators against the assertion, since it was hidden by encryption.
+ SchemaValidators.validate(decrypted);
+
// We clear the security flag, so we can tell whether the token was secured on its own.
policy.setAuthenticated(false);
policy.reset(true);
diff --git a/shibsp/impl/StorageServiceSessionCache.cpp b/shibsp/impl/StorageServiceSessionCache.cpp
index 16cf5e5..a22f2e3 100644
--- a/shibsp/impl/StorageServiceSessionCache.cpp
+++ b/shibsp/impl/StorageServiceSessionCache.cpp
@@ -1040,7 +1040,7 @@ void SSCache::insert(
// Store the reverse mapping for logout.
try {
- if (nameid)
+ if (name.get() && *name.get())
insert(key.get(), expires, name.get(), index.get());
}
catch (exception& ex) {
--
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-shibboleth/shibboleth-sp2.git
More information about the Pkg-shibboleth-devel
mailing list