mod_auth_openidc:2.3 security update

エラータID: AXSA:2023-7316:01

Release date: 
Wednesday, December 27, 2023 - 03:32
Subject: 
mod_auth_openidc:2.3 security update
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
Moderate
Description: 

The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.

Security Fix(es):

* mod_auth_openidc: Open Redirect in oidc_validate_redirect_url() using tab character (CVE-2022-23527)
* mod_auth_openidc: NULL pointer dereference when OIDCStripCookies is set and a crafted Cookie header is supplied (CVE-2023-28625)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2022-23527
mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server. Versions prior to 2.4.12.2 are vulnerable to Open Redirect. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect. This issue has been patched in version 2.4.12.2. Users unable to upgrade can mitigate the issue by configuring mod_auth_openidc to only allow redirection when the destination matches a given regular expression with OIDCRedirectURLsAllowed.
CVE-2023-28625
mod_auth_openidc is an authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In versions 2.0.0 through 2.4.13.1, when `OIDCStripCookies` is set and a crafted cookie supplied, a NULL pointer dereference would occur, resulting in a segmentation fault. This could be used in a Denial-of-Service attack and thus presents an availability risk. Version 2.4.13.2 contains a patch for this issue. As a workaround, avoid using `OIDCStripCookies`.

Modularity name: "mod_auth_openidc"
Stream name: "2.3"

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. cjose-0.6.1-4.module+el8+1698+832e3207.src.rpm
    MD5: f0efc81f057f274ff7f9424de46cdced
    SHA-256: 68c5ac2041ae31f91ac81b9b4eeb51d24dfc7b0ab713451239af56c84b54bc64
    Size: 1.52 MB
  2. mod_auth_openidc-2.4.9.4-5.module+el8+1698+832e3207.src.rpm
    MD5: 7209dc615139e2c13b92d5eb1d79b424
    SHA-256: 5f75fde33b4cc82eec34152a92b889f6a9f809a9a2a64e80744b75690148dd3c
    Size: 271.69 kB

Asianux Server 8 for x86_64
  1. cjose-0.6.1-4.module+el8+1698+832e3207.x86_64.rpm
    MD5: 0b61d1f4352e8386e90932ec4bdd47a5
    SHA-256: c73b5b3a0a337921841a794f8770418e2ce0a233d681d9c2e28e76163093d492
    Size: 183.40 kB
  2. cjose-debugsource-0.6.1-4.module+el8+1698+832e3207.x86_64.rpm
    MD5: 4356187b8dba19e13be9fcd78a717856
    SHA-256: 42c48ca8e3a8b16a36f3cbbf0200d920619dcd7cfaaa5bcc03ba30b273869593
    Size: 41.52 kB
  3. cjose-devel-0.6.1-4.module+el8+1698+832e3207.x86_64.rpm
    MD5: 1b9a7086f0a5e9b14c5ed7b321d846cf
    SHA-256: 02a36aba8febd0557d96d674a6f0be9ee8415bccfbfc89a9b459889d6c86d258
    Size: 17.64 kB
  4. mod_auth_openidc-2.4.9.4-5.module+el8+1698+832e3207.x86_64.rpm
    MD5: 486768359e54ad66070a30bd831a4f00
    SHA-256: 5bcfba413b9a5b8246af33a4ea1ccb0e0633e5670b98997c5733bad2dc458aa2
    Size: 196.04 kB
  5. mod_auth_openidc-debugsource-2.4.9.4-5.module+el8+1698+832e3207.x86_64.rpm
    MD5: a7d7268b0f37e915cd6d33c0cd489060
    SHA-256: 276b4c6794762001bd8089b84b58a76c4ace25c7e440bcd283c4cf167cefa7d1
    Size: 149.95 kB