SUSE-SU-2021:3020-1

Source
https://www.suse.com/support/update/announcement/2021/suse-su-20213020-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3020-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2021:3020-1
Related
Published
2021-09-13T07:17:22Z
Modified
2021-09-13T07:17:22Z
Summary
Security update for apache2-mod_auth_openidc
Details

This update for apache2-modauthopenidc fixes the following issues:

  • CVE-2021-32785: format string bug via hiredis (bsc#1188638)
  • CVE-2021-32786: open redirect in logout functionality (bsc#1188639)
  • CVE-2021-32791: Hardcoded static IV and AAD with a reused key in AES GCM encryption (bsc#1188849)
  • CVE-2021-32792: XSS when using OIDCPreservePost On (bsc#1188848)
References

Affected packages

SUSE:Linux Enterprise Module for Server Applications 15 SP2 / apache2-mod_auth_openidc

Package

Name
apache2-mod_auth_openidc
Purl
pkg:rpm/suse/apache2-mod_auth_openidc&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.3.8-3.15.1

Ecosystem specific

{
    "binaries": [
        {
            "apache2-mod_auth_openidc": "2.3.8-3.15.1"
        }
    ]
}

SUSE:Linux Enterprise Module for Server Applications 15 SP3 / apache2-mod_auth_openidc

Package

Name
apache2-mod_auth_openidc
Purl
pkg:rpm/suse/apache2-mod_auth_openidc&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.3.8-3.15.1

Ecosystem specific

{
    "binaries": [
        {
            "apache2-mod_auth_openidc": "2.3.8-3.15.1"
        }
    ]
}