squeeze update of shibboleth-sp2?

Ferenc Wagner wferi at niif.hu
Mon Apr 13 19:42:31 UTC 2015


Raphael Hertzog <hertzog at debian.org> writes:

> the Debian LTS team would like to fix the security issues which are
> currently open in the Squeeze version of shibboleth-sp2:
> https://security-tracker.debian.org/tracker/CVE-2015-2684
>
> Would you like to take care of this yourself? We are still understaffed so
> any help is always highly appreciated.

Hi Raphaël,

I will help you as far as I can, but I'm no DD, so most of the
administrative work will stay on your shoulders.  And I'm somewhat
uncertain whether a squeeze update would do much good without a
corresponding squeeze-backports fix.  What do you think?

Anyway, I pushed the backported fix to the squeeze branch of
http://anonscm.debian.org/cgit/pkg-shibboleth/shibboleth-sp2.git.  You
can find the corresponding source package at http://apt.niif.hu/lts/
(debdiff below).  Unfortunately, I couldn't test the package, but in
case I find a way, I'll inform you.
-- 
Regards,
Feri.


$ debdiff shibboleth-sp2_2.3.1+dfsg-5.dsc shibboleth-sp2_2.3.1+dfsg-5+deb6u1.dsc
diff -u shibboleth-sp2-2.3.1+dfsg/debian/changelog shibboleth-sp2-2.3.1+dfsg/debian/changelog
--- shibboleth-sp2-2.3.1+dfsg/debian/changelog
+++ shibboleth-sp2-2.3.1+dfsg/debian/changelog
@@ -1,3 +1,11 @@
+shibboleth-sp2 (2.3.1+dfsg-5+deb6u1) squeeze-lts; urgency=high
+
+  * Backport security fix from V2.5.4 for CVE-2015-2684: authenticated
+    denial of service vulnerability that results in a crash on certain
+    kinds of malformed SAML messages.
+
+ -- Ferenc Wagner <wferi at niif.hu>  Mon, 13 Apr 2015 21:09:55 +0200
+
 shibboleth-sp2 (2.3.1+dfsg-5) unstable; urgency=high
 
   * Merge the forgotten pidfile fix from branch bug/unlink-pidfile after
only in patch2:
unchanged:
--- shibboleth-sp2-2.3.1+dfsg.orig/shibsp/handler/impl/SAML2Consumer.cpp
+++ shibboleth-sp2-2.3.1+dfsg/shibsp/handler/impl/SAML2Consumer.cpp
@@ -38,6 +38,7 @@
 # include <xmltooling/XMLToolingConfig.h>
 # include <xmltooling/io/HTTPRequest.h>
 # include <xmltooling/util/DateTime.h>
+# include <xmltooling/validation/ValidatorSuite.h>
 using namespace opensaml::saml2;
 using namespace opensaml::saml2p;
 using namespace opensaml::saml2md;
@@ -275,6 +276,9 @@
             continue;
 
         try {
+            // Run the schema validators against the assertion, since it was hidden by encryption.
+            SchemaValidators.validate(decrypted);
+
             // We clear the security flag, so we can tell whether the token was secured on its own.
             policy.setAuthenticated(false);
             policy.reset(true);
only in patch2:
unchanged:
<VirtualHost *:80>
        ServerAdmin wferi at niif.hu

        DocumentRoot /var/www
        <Directory />
--- shibboleth-sp2-2.3.1+dfsg.orig/shibsp/impl/StorageServiceSessionCache.cpp
+++ shibboleth-sp2-2.3.1+dfsg/shibsp/impl/StorageServiceSessionCache.cpp
@@ -1040,7 +1040,7 @@
 
     // Store the reverse mapping for logout.
     try {
-        if (nameid)
+        if (name.get() && *name.get())
             insert(key.get(), expires, name.get(), index.get());
     }
     catch (exception& ex) {



More information about the Pkg-shibboleth-devel mailing list