RLSA-2020:3032

Source
https://errata.rockylinux.org/RLSA-2020:3032
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2020:3032.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2020:3032
Related
Published
2020-07-21T14:12:27Z
Modified
2023-02-02T13:07:15.838462Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Moderate: mod_auth_openidc:2.3 security and bug fix update
Details

The modauthopenidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.

Security Fix(es):

  • modauthopenidc: Open redirect in logout url when using URLs with leading slashes (CVE-2019-14857)

  • modauthopenidc: Open redirect issue exists in URLs with slash and backslash (CVE-2019-20479)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Module stream modauthopenidc:2.3 does not have correct module.md file (BZ#1844107)
References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:8 / cjose

Package

Name
cjose
Purl
pkg:rpm/rocky-linux/cjose?distro=rocky-linux-8&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:0.6.1-2.module+el8.3.0+129+2feafa46