QID 751211
Date Published: 2021-10-14
QID 751211: SUSE Enterprise Linux Security Update for apache2-mod_auth_openidc (SUSE-SU-2021:3352-1)
This update for apache2-mod_auth_openidc fixes the following issues: - cve-2021-32785: format string bug via hiredis (bsc#1188638) - cve-2021-32786: open redirect in logout functionality (bsc#1188639) - cve-2021-32791: hardcoded static iv and aad with a reused key in aes gcm encryption (bsc#1188849) - cve-2021-32792: xss when using oidcpreservepost on (bsc#1188848) - cve-2021-39191: open redirect issue in target_link_uri parameter (bsc#1190223)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation allows attacker to compromise the system.
Solution
Upgrade to the latest package which contains the patch. To install this SUSE Security,
Update use YaST online_update. Alternatively you can run the command listed for your product.
To install packages using the command line interface, use command "yum update".
Refer to Suse security advisory: SUSE-SU-2021:3352-1 to address this issue and obtain further details.
Vendor References
- SUSE-SU-2021:3352-1 -
lists.suse.com/pipermail/sle-security-updates/2021-October/009576.html
CVEs related to QID 751211
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| SUSE-SU-2021:3352-1 | SUSE Enterprise Linux |
|