-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.2602
                           lasso security update
                               3 August 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           lasso
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Reduced Security -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-28091  

Reference:         ESB-2021.2595
                   ESB-2021.2105

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2021:2989

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: lasso security update
Advisory ID:       RHSA-2021:2989-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:2989
Issue date:        2021-08-02
CVE Names:         CVE-2021-28091 
=====================================================================

1. Summary:

An update for lasso is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64

3. Description:

The lasso packages provide the Lasso library that implements the Liberty
Alliance Single Sign-On standards, including the SAML and SAML2
specifications. It allows handling of the whole life-cycle of SAML-based
federations and provides bindings for multiple languages.

Security Fix(es):

* lasso: XML signature wrapping vulnerability when parsing SAML responses
(CVE-2021-28091)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1940089 - CVE-2021-28091 lasso: XML signature wrapping vulnerability when parsing SAML responses

6. Package List:

Red Hat Enterprise Linux Server (v. 7):

Source:
lasso-2.5.1-8.el7_9.src.rpm

ppc64:
lasso-2.5.1-8.el7_9.ppc.rpm
lasso-2.5.1-8.el7_9.ppc64.rpm
lasso-debuginfo-2.5.1-8.el7_9.ppc.rpm
lasso-debuginfo-2.5.1-8.el7_9.ppc64.rpm
lasso-python-2.5.1-8.el7_9.ppc64.rpm

ppc64le:
lasso-2.5.1-8.el7_9.ppc64le.rpm
lasso-debuginfo-2.5.1-8.el7_9.ppc64le.rpm
lasso-python-2.5.1-8.el7_9.ppc64le.rpm

s390x:
lasso-2.5.1-8.el7_9.s390.rpm
lasso-2.5.1-8.el7_9.s390x.rpm
lasso-debuginfo-2.5.1-8.el7_9.s390.rpm
lasso-debuginfo-2.5.1-8.el7_9.s390x.rpm
lasso-python-2.5.1-8.el7_9.s390x.rpm

x86_64:
lasso-2.5.1-8.el7_9.i686.rpm
lasso-2.5.1-8.el7_9.x86_64.rpm
lasso-debuginfo-2.5.1-8.el7_9.i686.rpm
lasso-debuginfo-2.5.1-8.el7_9.x86_64.rpm
lasso-python-2.5.1-8.el7_9.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

ppc64:
lasso-debuginfo-2.5.1-8.el7_9.ppc.rpm
lasso-debuginfo-2.5.1-8.el7_9.ppc64.rpm
lasso-devel-2.5.1-8.el7_9.ppc.rpm
lasso-devel-2.5.1-8.el7_9.ppc64.rpm

ppc64le:
lasso-debuginfo-2.5.1-8.el7_9.ppc64le.rpm
lasso-devel-2.5.1-8.el7_9.ppc64le.rpm

s390x:
lasso-debuginfo-2.5.1-8.el7_9.s390.rpm
lasso-debuginfo-2.5.1-8.el7_9.s390x.rpm
lasso-devel-2.5.1-8.el7_9.s390.rpm
lasso-devel-2.5.1-8.el7_9.s390x.rpm

x86_64:
lasso-debuginfo-2.5.1-8.el7_9.i686.rpm
lasso-debuginfo-2.5.1-8.el7_9.x86_64.rpm
lasso-devel-2.5.1-8.el7_9.i686.rpm
lasso-devel-2.5.1-8.el7_9.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source:
lasso-2.5.1-8.el7_9.src.rpm

x86_64:
lasso-2.5.1-8.el7_9.i686.rpm
lasso-2.5.1-8.el7_9.x86_64.rpm
lasso-debuginfo-2.5.1-8.el7_9.i686.rpm
lasso-debuginfo-2.5.1-8.el7_9.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

x86_64:
lasso-debuginfo-2.5.1-8.el7_9.i686.rpm
lasso-debuginfo-2.5.1-8.el7_9.x86_64.rpm
lasso-devel-2.5.1-8.el7_9.i686.rpm
lasso-devel-2.5.1-8.el7_9.x86_64.rpm
lasso-python-2.5.1-8.el7_9.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-28091
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=C6lf
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYQjAzuNLKJtyKPYoAQijQA/+OIo+pq0tLUCYjhoE+dzCUCNpAZx38Vzw
AE/6ol3IN4O878SPDYoG5N8yJZaTKSEalQOL+FkVOcOAYp6QrJbLeYkGo3V5NtFt
KVFNdbhN832nRFtlxo6RXBT9/ud01hcJnJb/FWpCpEm3dl8BcRklDm5POZxzIpfF
2h4mC9TRZyBxfpO2l9/n2TaqRGhtVel2yCM4bAVr2Je3g4KZMn5tWqLl1g4KRe/X
iBg+jrt3OCxgg+1mZLt3OuV/QFDGk5ouIP+VqdRiCUvtIdw6CRi8zMt/+j/EoNDx
00libAf7uMx+RkG01pyeKbRyO9YwbndZ3FH0Vmmwu3FcvcR7o0v93Pvpgz8amaOC
SdLNXwhuCGG8rm7/bxKnRErYJBQ05QTOrWZ4xQj1q2Il1rwfgTl+MDicknY7qnSI
uIWNT8y7NMVsEnQGJmvNSasej/oYIhLdcLGCF/lpb0r3dhUt7YqW3gRnxlBpKtnV
BujIrPnyAL90kE4StO1NhkTRe0MC4GUiyKFl3sFbaxfse29wMDuoc92E/k13hJWf
JzkkqH7W7AeL47w8czpm8B04FzD85zLBzTIjos/5z2Aa6k3x4rA0eW6J3roX0tUo
8fW7823UPXIClXa5kZR7ptWyLo5qu8zxQfR9neePQY1zBHNYc3m0ROkc+fuUMXAh
ishk0mXLZhI=
=rYaC
-----END PGP SIGNATURE-----