Source: sogo Version: 5.1.0-1 Severity: grave Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org> Control: found -1 5.0.1-4 Control: found -1 4.0.7-1+deb10u1 Control: found -1 4.0.7-1
Hi, The following vulnerability was published for sogo. CVE-2021-33054[0]: | SOGo 2.x before 2.4.1 and 3.x through 5.x before 5.1.1 does not | validate the signatures of any SAML assertions it receives. Any actor | with network access to the deployment could impersonate users when | SAML is the authentication method. (Only versions after 2.0.5a are | affected.) If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2021-33054 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33054 [1] https://github.com/inverse-inc/sogo/commit/e53636564680ac0df11ec898304bc442908ba746 Please adjust the affected versions in the BTS as needed. Regards, Salvatore