Bug 1526610

Summary: ipsilon: SAML2 multi-session vulnerability
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED DUPLICATE QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: puiterwijk, rcritten
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: ipsilon 2.1.0 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2017-12-18 13:21:04 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1526611    

Description Pedro Sampaio 2017-12-15 20:16:03 UTC
A SAML2 multi-session flaw was found in ipsilon 2.0.0.

External references:

https://ipsilon-project.org/release/2.1.0.html

Comment 1 Pedro Sampaio 2017-12-18 13:21:04 UTC

*** This bug has been marked as a duplicate of bug 1392829 ***

Comment 2 Patrick Uiterwijk 2017-12-19 14:18:06 UTC
Some background on marking duplicate:
Between Ipsilon 2.0.1 and 2.0.0, CVE-2016-8638 had been found and fixed, with multiple releases to fix it, but the entry did again show up in the 2.1.0 release notes because that's on a different branch.

Someone found that entry in our changelog and requested a CVE ID from Mitre and got assigned CVE-2017-16855.
But this was just the fix on the master branch that was already released as 2.0.2 (among other backport releases) of CVE-2016-8638.