{"affected":[{"ecosystem_specific":{"binaries":[{"apache2-mod_auth_openidc":"2.3.8-lp152.5.6.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.2","name":"apache2-mod_auth_openidc","purl":"pkg:rpm/opensuse/apache2-mod_auth_openidc&distro=openSUSE%20Leap%2015.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.3.8-lp152.5.6.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for apache2-mod_auth_openidc fixes the following issues:\n\n- CVE-2021-32785: format string bug via hiredis (bsc#1188638)\n- CVE-2021-32786: open redirect in logout functionality (bsc#1188639)\n- CVE-2021-32791: Hardcoded static IV and AAD with a reused key in AES GCM encryption (bsc#1188849)\n- CVE-2021-32792: XSS when using OIDCPreservePost On (bsc#1188848)\n\nThis update was imported from the SUSE:SLE-15-SP1:Update update project.","id":"openSUSE-SU-2021:1277-1","modified":"2021-09-16T10:07:24Z","published":"2021-09-16T10:07:24Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4FGDDGUNYC724M4QGEPJORKASFRVKJ5V/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1188638"},{"type":"REPORT","url":"https://bugzilla.suse.com/1188639"},{"type":"REPORT","url":"https://bugzilla.suse.com/1188848"},{"type":"REPORT","url":"https://bugzilla.suse.com/1188849"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-32785"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-32786"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-32791"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-32792"}],"related":["CVE-2021-32785","CVE-2021-32786","CVE-2021-32791","CVE-2021-32792"],"summary":"Security update for apache2-mod_auth_openidc","upstream":["CVE-2021-32785","CVE-2021-32786","CVE-2021-32791","CVE-2021-32792"]}