Hi Cedric, the vulnerability affects the Shibboleth SAML SP software, not the IDP software included in your Gluu Server.
If your organization is using the Shibboleth SP software, or any of your application partners are using the Shibboleth SP software, it should be upgraded immediately and the affected processes should be restarted (e.g. shibd, Apache, etc.).
The [Shibboleth advisory](https://shibboleth.net/community/advisories/secadv_20180227.txt) has links for patched versions of the SP software.
BTW, if you should be associated with your organizations support account, you should request your colleage, Stephane, update your privileges so you can open private tickets with us.
Thanks,
Will