Bug 2181115 (CVE-2023-28119) - CVE-2023-28119 crewjam/saml: Denial Of Service Via Deflate Decompression Bomb
Summary: CVE-2023-28119 crewjam/saml: Denial Of Service Via Deflate Decompression Bomb
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2023-28119
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2181078
TreeView+ depends on / blocked
 
Reported: 2023-03-23 06:34 UTC by Avinash Hanwate
Modified: 2023-03-23 12:22 UTC (History)
19 users (show)

Fixed In Version: crewjam/saml 0.4.13
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2023-03-23 12:22:04 UTC
Embargoed:


Attachments (Terms of Use)

Description Avinash Hanwate 2023-03-23 06:34:08 UTC
The crewjam/saml go library contains a partial implementation of the SAML standard in golang. Prior to version 0.4.13, the package's use of `flate.NewReader` does not limit the size of the input. The user can pass more than 1 MB of data in the HTTP request to the processing functions, which will be decompressed server-side using the Deflate algorithm. Therefore, after repeating the same request multiple times, it is possible to achieve a reliable crash since the operating system kills the process. This issue is patched in version 0.4.13.

https://github.com/crewjam/saml/commit/8e9236867d176ad6338c870a84e2039aef8a5021
https://github.com/crewjam/saml/security/advisories/GHSA-5mqj-xc49-246p

Comment 1 Product Security DevOps Team 2023-03-23 12:22:01 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2023-28119


Note You need to log in before you can comment on or make changes to this bug.