Vulnerability CVE-2023-28119: Information
Description
The crewjam/saml go library contains a partial implementation of the SAML standard in golang. Prior to version 0.4.13, the package's use of `flate.NewReader` does not limit the size of the input. The user can pass more than 1 MB of data in the HTTP request to the processing functions, which will be decompressed server-side using the Deflate algorithm. Therefore, after repeating the same request multiple times, it is possible to achieve a reliable crash since the operating system kills the process. This issue is patched in version 0.4.13.
Severity: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Fixed packages
Package name | Branch | Fixed in version | Version from repository | Errata ID | Task # | State |
---|---|---|---|---|---|---|
grafana | sisyphus | 9.5.5-alt1 | 10.2.2-alt1.1 | ALT-PU-2023-4148-1 | 323937 | Fixed |
grafana | p10 | 9.5.5-alt1 | 10.2.2-alt1.1 | ALT-PU-2023-4133-1 | 323967 | Fixed |
grafana | c10f1 | 9.5.5-alt1 | 10.2.2-alt1.1 | ALT-PU-2023-4346-2 | 324663 | Fixed |
grafana | c9f2 | 9.5.5-alt1 | 9.5.5-alt1 | ALT-PU-2023-4567-3 | 323137 | Fixed |
References to Advisories, Solutions, and Tools
Hyperlink | Resource |
---|---|
https://github.com/crewjam/saml/commit/8e9236867d176ad6338c870a84e2039aef8a5021 |
|
https://github.com/crewjam/saml/security/advisories/GHSA-5mqj-xc49-246p |
|