The crewjam/saml go library prior to version 0.4.9 is vulnerable to an authentication bypass when processing SAML responses containing multiple Assertion elements. This issue has been corrected in version 0.4.9. There are no workarounds other than upgrading to a fixed version. https://github.com/crewjam/saml/commit/aee3fb1edeeaf1088fcb458727e0fd863d277f8b https://github.com/crewjam/saml/security/advisories/GHSA-j2jp-wvqg-wc2g
Created golang-github-crewjam-saml tracking bugs for this issue: Affects: fedora-35 [bug 2149186] Affects: fedora-36 [bug 2149187] Affects: fedora-37 [bug 2149188]
*** Bug 2151477 has been marked as a duplicate of this bug. ***
This issue has been addressed in the following products: Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8 Via RHSA-2022:9040 https://access.redhat.com/errata/RHSA-2022:9040
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-41912
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.11 Via RHSA-2022:9108 https://access.redhat.com/errata/RHSA-2022:9108
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.10 Via RHSA-2023:0032 https://access.redhat.com/errata/RHSA-2023:0032
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.8 Via RHSA-2023:0237 https://access.redhat.com/errata/RHSA-2023:0237
This issue has been addressed in the following products: Red Hat Advanced Cluster Management for Kubernetes 2.7 for RHEL 8 Via RHSA-2023:0630 https://access.redhat.com/errata/RHSA-2023:0630
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.9 Via RHSA-2023:0574 https://access.redhat.com/errata/RHSA-2023:0574
This issue has been addressed in the following products: Red Hat Ceph Storage 6.1 Via RHSA-2023:3642 https://access.redhat.com/errata/RHSA-2023:3642