It was discovered that missing input sanitising in the implementation of the OIDCStripCookie option in mod_auth_openidc could result in denial of service.
For the stable distribution (bullseye), this problem has been fixed in version 2.4.9.4-0+deb11u3.
We recommend that you upgrade your libapache2-mod-auth-openidc packages.
For the detailed security status of libapache2-mod-auth-openidc please refer to its security tracker page at: \ https://security-tracker.debian.org/tracker/libapache2-mod-auth-openidc