Bug 2184118 (CVE-2023-28625) - CVE-2023-28625 mod_auth_openidc: NULL pointer dereference when OIDCStripCookies is set and a crafted Cookie header is supplied
Summary: CVE-2023-28625 mod_auth_openidc: NULL pointer dereference when OIDCStripCooki...
Keywords:
Status: NEW
Alias: CVE-2023-28625
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2184119 2184144 2184145
Blocks: 2184121
TreeView+ depends on / blocked
 
Reported: 2023-04-03 17:20 UTC by Pedro Sampaio
Modified: 2023-11-14 15:17 UTC (History)
3 users (show)

Fixed In Version: mod_auth_openidc 2.4.13.2
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in mod_auth_openidc, an OpenID Certified™ authentication and authorization module for the Apache HTTP server. It is possible to trigger a NULL pointer dereference when `OIDCStripCookies` is set and a crafted `Cookie` header is supplied, leading to a segmentation fault and a denial of service.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:6365 0 None None None 2023-11-07 08:14:30 UTC
Red Hat Product Errata RHSA-2023:6940 0 None None None 2023-11-14 15:17:08 UTC

Description Pedro Sampaio 2023-04-03 17:20:49 UTC
mod_auth_openidc is an authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In versions 2.0.0 through 2.4.13.1, when `OIDCStripCookies` is set and a crafted cookie supplied, a NULL pointer dereference would occur, resulting in a segmentation fault. This could be used in a Denial-of-Service attack and thus presents an availability risk. Version 2.4.13.2 contains a patch for this issue. As a workaround, avoid using `OIDCStripCookies`.

References:

https://github.com/OpenIDC/mod_auth_openidc/releases/tag/v2.4.13.2
https://github.com/OpenIDC/mod_auth_openidc/commit/c0e1edac3c4c19988ccdc7713d7aebfce6ff916a
https://github.com/OpenIDC/mod_auth_openidc/security/advisories/GHSA-f5xw-rvfr-24qr
https://github.com/OpenIDC/mod_auth_openidc/blame/3f11976dab56af0a46a7dddb7a275cc16d6eb726/src/mod_auth_openidc.c#L178-L179

Comment 1 Pedro Sampaio 2023-04-03 17:21:02 UTC
Created mod_auth_openidc tracking bugs for this issue:

Affects: fedora-all [bug 2184119]

Comment 4 errata-xmlrpc 2023-11-07 08:14:29 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:6365 https://access.redhat.com/errata/RHSA-2023:6365

Comment 5 errata-xmlrpc 2023-11-14 15:17:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:6940 https://access.redhat.com/errata/RHSA-2023:6940


Note You need to log in before you can comment on or make changes to this bug.