mod_auth_openidc-2.4.9.4-4.el9
エラータID: AXSA:2023-6773:01
リリース日:
2023/12/07 Thursday - 17:42
題名:
mod_auth_openidc-2.4.9.4-4.el9
影響のあるチャネル:
MIRACLE LINUX 9 for x86_64
Severity:
Moderate
Description:
以下項目について対処しました。
[Security Fix]
- mod_auth_openidc の oidc_validate_redirect_url() 関数には、\t で
始まる URL を適切にチェックできない問題があるため、リモートの
攻撃者により、細工された URL を介して、オープンリダイレクト
攻撃を可能とする脆弱性が存在します。(CVE-2022-23527)
- mod_auth_openidc には、OIDCStripCookies が設定された環境に
おける NULL ポインタデリファレンスの問題があるため、リモート
の攻撃者により、細工された Cookie を介して、セグメンテーション
フォルトの発生とこれに起因するサービス拒否攻撃を可能とする
脆弱性が存在します。(CVE-2023-28625)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2022-23527
mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server. Versions prior to 2.4.12.2 are vulnerable to Open Redirect. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect. This issue has been patched in version 2.4.12.2. Users unable to upgrade can mitigate the issue by configuring mod_auth_openidc to only allow redirection when the destination matches a given regular expression with OIDCRedirectURLsAllowed.
mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server. Versions prior to 2.4.12.2 are vulnerable to Open Redirect. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect. This issue has been patched in version 2.4.12.2. Users unable to upgrade can mitigate the issue by configuring mod_auth_openidc to only allow redirection when the destination matches a given regular expression with OIDCRedirectURLsAllowed.
CVE-2023-28625
mod_auth_openidc is an authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In versions 2.0.0 through 2.4.13.1, when `OIDCStripCookies` is set and a crafted cookie supplied, a NULL pointer dereference would occur, resulting in a segmentation fault. This could be used in a Denial-of-Service attack and thus presents an availability risk. Version 2.4.13.2 contains a patch for this issue. As a workaround, avoid using `OIDCStripCookies`.
mod_auth_openidc is an authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In versions 2.0.0 through 2.4.13.1, when `OIDCStripCookies` is set and a crafted cookie supplied, a NULL pointer dereference would occur, resulting in a segmentation fault. This could be used in a Denial-of-Service attack and thus presents an availability risk. Version 2.4.13.2 contains a patch for this issue. As a workaround, avoid using `OIDCStripCookies`.
追加情報:
N/A
ダウンロード:
SRPMS
- mod_auth_openidc-2.4.9.4-4.el9.src.rpm
MD5: 1d9e221b4a8f7e7049bc32b061bce828
SHA-256: 2f0576d7d429c78a2aa98f9dc1987ca503d5341b7d115d9fa0326912fe274129
Size: 269.10 kB
Asianux Server 9 for x86_64
- mod_auth_openidc-2.4.9.4-4.el9.x86_64.rpm
MD5: 74f78724e3306020b4b52b66f991688b
SHA-256: 223278a95a10c6533ff3f0de16500233adecbf5d7766dcef648490e27893ba59
Size: 193.40 kB