Your message dated Sat, 06 Sep 2025 12:14:50 +0100 with message-id <ee4c0876608d99eb3f8b333b556fbd92e7a652eb.camel@adam-barratt.org.uk> and subject line Closing p-u requests for fixes included in 12.12 has caused the Debian Bug report #1105113, regarding bookworm-pu: package simplesamlphp/1.19.7-1+deb12u2 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1105113: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105113 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: bookworm-pu: package simplesamlphp/1.19.7-1+deb12u2
- From: Tobias Frost <tobi@debian.org>
- Date: Sun, 11 May 2025 16:06:48 +0200
- Message-id: <aCCu-EqCynln-LMw@isildor2.loewenhoehle.ip>
Package: release.debian.org Severity: normal Tags: bookworm X-Debbugs-Cc: simplesamlphp@packages.debian.org, security@debian.org Control: affects -1 + src:simplesamlphp User: release.debian.org@packages.debian.org Usertags: pu Hi, this s-p-u is to fix CVE-2025-27773 a signature confusion attack, to close the gap after fixing LTS (bullseye) and unstable. (The package will not be in trixie) [ Tests ] Manual test in VM, setting up simplesamlphp as service provider and identy provider and testing if things are still working. Joost also helped out in testing, see https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100595#20 The patch is identical for unstable and bullseye, as the file which has been patched is identical too on all those versions, so the testing Joost has done is applicable too [ Checklist ] [x] *all* changes are documented in the d/changelog [x] I reviewed all changes and I approve them [x] attach debdiff against the package in (old)stable [x] the issue is verified as fixed in unstable [ Changes ] The patch has been backported from the upstream changeset, origin: https://github.com/simplesamlphp/saml2/commit/7867d6099dc7f31bed1ea10e5bea159c5623d2a0 [ Other info ] This s-p-u has been done in coordination and approval from the security team. I will upload the new package to the queue after sending this email. Cheers -- tobidiff -Nru simplesamlphp-1.19.7/debian/changelog simplesamlphp-1.19.7/debian/changelog --- simplesamlphp-1.19.7/debian/changelog 2024-12-01 16:41:33.000000000 +0100 +++ simplesamlphp-1.19.7/debian/changelog 2025-05-11 08:35:04.000000000 +0200 @@ -1,7 +1,14 @@ +simplesamlphp (1.19.7-1+deb12u2) bookworm; urgency=medium + + * Team upload for stable proposed updates. + * Fix CVE-2025-27773 (Closes: #1100595) + + -- Tobias Frost <tobi@debian.org> Sun, 11 May 2025 08:35:04 +0200 + simplesamlphp (1.19.7-1+deb12u1) bookworm-security; urgency=high * Upload to the security archive. - * Fix CVE-2024-52596 + * Fix CVE-2024-52596 (Closes: #1088904) -- Thijs Kinkhorst <thijs@debian.org> Sun, 01 Dec 2024 16:41:33 +0100 diff -Nru simplesamlphp-1.19.7/debian/patches/CVE-2025-27773.patch simplesamlphp-1.19.7/debian/patches/CVE-2025-27773.patch --- simplesamlphp-1.19.7/debian/patches/CVE-2025-27773.patch 1970-01-01 01:00:00.000000000 +0100 +++ simplesamlphp-1.19.7/debian/patches/CVE-2025-27773.patch 2025-05-11 08:25:15.000000000 +0200 @@ -0,0 +1,122 @@ +Description: CVE-2025-27773 - signature confusion attack +Origin: https://github.com/simplesamlphp/saml2/commit/7867d6099dc7f31bed1ea10e5bea159c5623d2a0 +Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100595 +Bug: https://github.com/simplesamlphp/saml2/security/advisories/GHSA-46r4-f8gj-xg56 + +--- a/vendor/simplesamlphp/saml2/src/SAML2/HTTPRedirect.php ++++ b/vendor/simplesamlphp/saml2/src/SAML2/HTTPRedirect.php +@@ -94,7 +94,7 @@ + /** + * Receive a SAML 2 message sent using the HTTP-Redirect binding. + * +- * Throws an exception if it is unable receive the message. ++ * Throws an exception if it is unable to receive the message. + * + * @throws \Exception + * @return \SAML2\Message The received message. +@@ -104,10 +104,36 @@ + public function receive(): Message + { + $data = self::parseQuery(); +- if (array_key_exists('SAMLRequest', $data)) { +- $message = $data['SAMLRequest']; +- } elseif (array_key_exists('SAMLResponse', $data)) { +- $message = $data['SAMLResponse']; ++ $signedQuery = $data['SignedQuery']; ++ ++ /** ++ * Get the SAMLRequest/SAMLResponse from the exact same signed data that will be verified later in ++ * validateSignature into $res using the actual SignedQuery ++ */ ++ $res = []; ++ foreach (explode('&', $signedQuery) as $e) { ++ $tmp = explode('=', $e, 2); ++ $name = $tmp[0]; ++ if (count($tmp) === 2) { ++ $value = $tmp[1]; ++ } else { ++ /* No value for this parameter. */ ++ $value = ''; ++ } ++ $name = urldecode($name); ++ $res[$name] = urldecode($value); ++ } ++ ++ /** ++ * Put the SAMLRequest/SAMLResponse from the actual query string into $message, ++ * and assert that the result from parseQuery() in $data and the parsing of the SignedQuery in $res agree ++ */ ++ if (array_key_exists('SAMLRequest', $res)) { ++ Assert::same($res['SAMLRequest'], $data['SAMLRequest'], 'Parse failure.'); ++ $message = $res['SAMLRequest']; ++ } elseif (array_key_exists('SAMLResponse', $res)) { ++ Assert::same($res['SAMLResponse'], $data['SAMLResponse'], 'Parse failure.'); ++ $message = $res['SAMLResponse']; + } else { + throw new \Exception('Missing SAMLRequest or SAMLResponse parameter.'); + } +@@ -116,7 +142,7 @@ + throw new \Exception('Unknown SAMLEncoding: '.var_export($data['SAMLEncoding'], true)); + } + +- $message = base64_decode($message); ++ $message = base64_decode($message, true); + if ($message === false) { + throw new \Exception('Error while base64 decoding SAML message.'); + } +@@ -141,6 +167,15 @@ + return $message; + } + ++ /** ++ * 3.4.5.2 - SAML Bindings ++ * ++ * If the message is signed, the Destination XML attribute in the root SAML element of the protocol ++ * message MUST contain the URL to which the sender has instructed the user agent to deliver the ++ * message. ++ */ ++ Assert::notNull($message->getDestination()); // Validation of the value must be done upstream ++ + if (!array_key_exists('SigAlg', $data)) { + throw new \Exception('Missing signature algorithm.'); + } +@@ -148,7 +183,7 @@ + $signData = [ + 'Signature' => $data['Signature'], + 'SigAlg' => $data['SigAlg'], +- 'Query' => $data['SignedQuery'], ++ 'Query' => $signedQuery, + ]; + + $message->addValidator([get_class($this), 'validateSignature'], $signData); +@@ -165,6 +200,7 @@ + * signed. + * + * @return array The query data that is signed. ++ * @throws \Exception + */ + private static function parseQuery() : array + { +@@ -186,7 +222,12 @@ + /* No value for this parameter. */ + $value = ''; + } ++ + $name = urldecode($name); ++ // Prevent keys from being set more than once ++ if (array_key_exists($name, $data)) { ++ throw new \Exception('Duplicate parameter.'); ++ } + $data[$name] = urldecode($value); + + switch ($name) { +@@ -202,6 +243,9 @@ + break; + } + } ++ if (array_key_exists('SAMLRequest', $data) && array_key_exists('SAMLResponse', $data)) { ++ throw new \Exception('Both SAMLRequest and SAMLResponse provided.'); ++ } + + $data['SignedQuery'] = $sigQuery.$relayState.$sigAlg; + diff -Nru simplesamlphp-1.19.7/debian/patches/series simplesamlphp-1.19.7/debian/patches/series --- simplesamlphp-1.19.7/debian/patches/series 2024-12-01 16:41:33.000000000 +0100 +++ simplesamlphp-1.19.7/debian/patches/series 2025-05-11 08:25:15.000000000 +0200 @@ -1,2 +1,3 @@ debian_config.patch CVE-2024-52596.patch +CVE-2025-27773.patchAttachment: signature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---
- To: 1086622-done@bugs.debian.org, 1098225-done@bugs.debian.org, 1098229-done@bugs.debian.org, 1098783-done@bugs.debian.org, 1100607-done@bugs.debian.org, 1100960-done@bugs.debian.org, 1101144-done@bugs.debian.org, 1102091-done@bugs.debian.org, 1102675-done@bugs.debian.org, 1102752-done@bugs.debian.org, 1103926-done@bugs.debian.org, 1103927-done@bugs.debian.org, 1104028-done@bugs.debian.org, 1104154-done@bugs.debian.org, 1104821-done@bugs.debian.org, 1104874-done@bugs.debian.org, 1104882-done@bugs.debian.org, 1105009-done@bugs.debian.org, 1105113-done@bugs.debian.org, 1105816-done@bugs.debian.org, 1105888-done@bugs.debian.org, 1105957-done@bugs.debian.org, 1105971-done@bugs.debian.org, 1105996-done@bugs.debian.org, 1106300-done@bugs.debian.org, 1106328-done@bugs.debian.org, 1106348-done@bugs.debian.org, 1106536-done@bugs.debian.org, 1106721-done@bugs.debian.org, 1106756-done@bugs.debian.org, 1106761-done@bugs.debian.org, 1106867-done@bugs.debian.org, 1107069-done@bugs.debian.org, 1107116-done@bugs.debian.org, 1107147-done@bugs.debian.org, 1107217-done@bugs.debian.org, 1107252-done@bugs.debian.org, 1107253-done@bugs.debian.org, 1107568-done@bugs.debian.org, 1107852-done@bugs.debian.org, 1107902-done@bugs.debian.org, 1108122-done@bugs.debian.org, 1108127-done@bugs.debian.org, 1108137-done@bugs.debian.org, 1108185-done@bugs.debian.org, 1108308-done@bugs.debian.org, 1108353-done@bugs.debian.org, 1108504-done@bugs.debian.org, 1108508-done@bugs.debian.org, 1108543-done@bugs.debian.org, 1108548-done@bugs.debian.org, 1108921-done@bugs.debian.org, 1109012-done@bugs.debian.org, 1109034-done@bugs.debian.org, 1109084-done@bugs.debian.org, 1109087-done@bugs.debian.org, 1109095-done@bugs.debian.org, 1109127-done@bugs.debian.org, 1109147-done@bugs.debian.org, 1109207-done@bugs.debian.org, 1109545-done@bugs.debian.org, 1109611-done@bugs.debian.org, 1109763-done@bugs.debian.org, 1109819-done@bugs.debian.org, 1109943-done@bugs.debian.org, 1109945-done@bugs.debian.org, 1109947-done@bugs.debian.org, 1109995-done@bugs.debian.org, 1110034-done@bugs.debian.org, 1110080-done@bugs.debian.org, 1110114-done@bugs.debian.org, 1110340-done@bugs.debian.org, 1110489-done@bugs.debian.org, 1110643-done@bugs.debian.org, 1110686-done@bugs.debian.org, 1110813-done@bugs.debian.org, 1111034-done@bugs.debian.org, 1111076-done@bugs.debian.org, 1111426-done@bugs.debian.org, 1111486-done@bugs.debian.org, 1111600-done@bugs.debian.org, 1111607-done@bugs.debian.org, 1111653-done@bugs.debian.org, 1111666-done@bugs.debian.org, 1111835-done@bugs.debian.org, 1111859-done@bugs.debian.org, 1111924-done@bugs.debian.org, 1111959-done@bugs.debian.org, 1111966-done@bugs.debian.org, 1111969-done@bugs.debian.org, 1111987-done@bugs.debian.org, 1111989-done@bugs.debian.org, 1112039-done@bugs.debian.org, 1112053-done@bugs.debian.org, 1112070-done@bugs.debian.org, 1112074-done@bugs.debian.org, 1112124-done@bugs.debian.org, 1112129-done@bugs.debian.org, 1112141-done@bugs.debian.org, 1112195-done@bugs.debian.org, 1112239-done@bugs.debian.org, 1112252-done@bugs.debian.org, 1112340-done@bugs.debian.org, 1112347-done@bugs.debian.org, 1112368-done@bugs.debian.org, 1112449-done@bugs.debian.org, 1112459-done@bugs.debian.org, 1112467-done@bugs.debian.org, 1112542-done@bugs.debian.org
- Subject: Closing p-u requests for fixes included in 12.12
- From: "Adam D. Barratt" <adam@adam-barratt.org.uk>
- Date: Sat, 06 Sep 2025 12:14:50 +0100
- Message-id: <ee4c0876608d99eb3f8b333b556fbd92e7a652eb.camel@adam-barratt.org.uk>
Package: release.debian.org Version: 12.12 Hi, Each of the updates referenced by these requests was included in today's 12.12 point release for bookworm. Regards, Adam
--- End Message ---