Security Vulnerabilities fixed in cjose RHSA-2022:1823

description-logoDescription

The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. Security Fix(es): mod_auth_openidc: open redirect in oidc_validate_redirect_url() (CVE-2021-32786) mod_auth_openidc: hardcoded static IV and AAD with a reused key in AES GCM encryption (CVE-2021-32791) mod_auth_openidc: XSS when using OIDCPreservePost On (CVE-2021-32792) mod_auth_openidc: open redirect due to target_link_uri parameter not validated (CVE-2021-39191) mod_auth_openidc: open redirect in oidc_validate_redirect_url() (CVE-2021-32786) mod_auth_openidc: hardcoded static IV and AAD with a reused key in AES GCM encryption (CVE-2021-32791) mod_auth_openidc: XSS when using OIDCPreservePost On (CVE-2021-32792) mod_auth_openidc: open redirect due to target_link_uri parameter not validated (CVE-2021-39191) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section. SolutionFor details on how to apply this update, which includes the changes described in this advisory, refer to:https://access.redhat.com/articles/11258

affected-products-logoAffected Applications

cjose