Allocation of Resources Without Limits or Throttling Affecting golang-github-crewjam-saml package, versions *


Severity

Recommended
medium

Based on Ubuntu security rating.

Threat Intelligence

EPSS
0.19% (41st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UBUNTU2404-GOLANGGITHUBCREWJAMSAML-6699401
  • published25 Jun 2025
  • disclosed22 Mar 2023

Introduced: 22 Mar 2023

CVE-2023-28119  (opens in a new tab)
CWE-770  (opens in a new tab)

How to fix?

There is no fixed version for Ubuntu:24.04 golang-github-crewjam-saml.

NVD Description

Note: Versions mentioned in the description apply only to the upstream golang-github-crewjam-saml package and not the golang-github-crewjam-saml package as distributed by Ubuntu. See How to fix? for Ubuntu:24.04 relevant fixed versions and status.

The crewjam/saml go library contains a partial implementation of the SAML standard in golang. Prior to version 0.4.13, the package's use of flate.NewReader does not limit the size of the input. The user can pass more than 1 MB of data in the HTTP request to the processing functions, which will be decompressed server-side using the Deflate algorithm. Therefore, after repeating the same request multiple times, it is possible to achieve a reliable crash since the operating system kills the process. This issue is patched in version 0.4.13.

CVSS Base Scores

version 3.1