it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
[IT-SecNots] [SECURITY] [DSA 5917-1] libapache2-mod-auth-openidc security update
Chronologisch Thread
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5917-1] libapache2-mod-auth-openidc security update
- Date: Thu, 8 May 2025 21:01:50 +0000
- List-archive: https://lists.debian.org/msgid-search/aB0bvvPhQzDUoJJe AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From:Date :Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=8SxAafNuP66O2pTLY1JMfZlaMwOklHpsodrr7/gjdQQ=; b=X4 0DPpfh2D2QlaoGCtOfG38xjlWXH36Y4stV2P29BnqIx/I6lMdPnIJmi5kGXrXtBtQxlerHlRA5tkW 1hsbu30aiEC6FYWZEGBuroTvbU1xaA45/lp+p2nUKQdUQFkoDdBZ1Wf1JFQEDljM++FyMvwe2pVAT hCOuZr5SFNS7ZOrJpFvpQ/0FJKg7HRuDrTD95yI8w2YBmfxqSrn6y/vU+LdbM0l1l7NvVxc7xzMYe jMUuFVW16iMaitRGnL6vMmiD+Oz2ARMD6Pxq/pK8BOoPxYYSR6WeMVCVDq2UjqUVOLTJ118ClHVCT IMhVe6EaXl9OCLh/x11uBNIStVl0x1cg==;
- Old-return-path: <jmm AT seger.debian.org>
- Priority: urgent
- Resent-date: Thu, 8 May 2025 21:02:10 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <XhOvSL8CiOC.A.QpVK.SvRHoB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5917-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
May 08, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libapache2-mod-auth-openidc
CVE ID : CVE-2025-3891
A vulnerability has been discovered in mod_auth_openidc, an OpenID
Certified authentication and authorization module for the Apache HTTP
server that implements the OpenID Connect Relying Party functionality:
An unauthenticated attacker could crash the Apache httpd process by
sending a POST request without a Content-Type header if the
'OIDCPreservePost' directive is enabled, resulting in denial of
service.
For the stable distribution (bookworm), this problem has been fixed in
version 2.4.12.3-2+deb12u4.
We recommend that you upgrade your libapache2-mod-auth-openidc packages.
For the detailed security status of libapache2-mod-auth-openidc please refer
to
its security tracker page at:
https://security-tracker.debian.org/tracker/libapache2-mod-auth-openidc
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=GWXH
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5917-1] libapache2-mod-auth-openidc security update, Moritz Muehlenhoff, 08.05.2025
Archiv bereitgestellt durch MHonArc 2.6.19+.