Fedora Linux 8568 Published by

A mod_auth_openidc security update has been released for Fedora 36.



SECURITY: Fedora 36 Update: mod_auth_openidc-2.4.9.4-1.fc36


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-814ee0c43b
2022-05-07 04:08:14.309728
--------------------------------------------------------------------------------

Name : mod_auth_openidc
Product : Fedora 36
Version : 2.4.9.4
Release : 1.fc36
URL :   https://github.com/zmartzone/mod_auth_openidc
Summary : OpenID Connect auth module for Apache HTTP Server
Description :
This module enables an Apache 2.x web server to operate as
an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.

--------------------------------------------------------------------------------
Update Information:

mod_auth_openidc 2.4.9.4 security update CVE-2021-39191 mod_auth_openidc: open
redirect by supplying a crafted URL in the target_link_uri parameter
--------------------------------------------------------------------------------
ChangeLog:

* Thu Mar 31 2022 Tomas Halman - 2.4.9.4-1
- Resolves: rhbz#2001647 - CVE-2021-39191 mod_auth_openidc: open redirect
by supplying a crafted URL in the target_link_uri
parameter
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2069210 - mod_auth_openidc 2.4.9.4 security update not submitted to F36+
  https://bugzilla.redhat.com/show_bug.cgi?id=2069210
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-814ee0c43b' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________