Upstream information

CVE-2021-32791 at MITRE

Description

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In mod_auth_openidc before version 2.4.9, the AES GCM encryption in mod_auth_openidc uses a static IV and AAD. It is important to fix because this creates a static nonce and since aes-gcm is a stream cipher, this can lead to known cryptographic issues, since the same key is being reused. From 2.4.9 onwards this has been patched to use dynamic values through usage of cjose AES encryption routines.

SUSE information

Overall state of this security issue: Running

This issue is currently rated as having moderate severity.

CVSS v3 Scores
  SUSE
Base Score 5.9
Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Access Vector Network
Access Complexity High
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Impact High
Integrity Impact None
Availability Impact None
CVSSv3 Version 3.1
SUSE Bugzilla entry: 1188849 [NEW]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Module for Server Applications 15 SP2
  • apache2-mod_auth_openidc >= 2.3.8-3.15.1
Patchnames:
SUSE-SLE-Module-Server-Applications-15-SP2-2021-3020
SUSE Linux Enterprise Module for Server Applications 15 SP3
  • apache2-mod_auth_openidc >= 2.3.8-3.15.1
Patchnames:
SUSE-SLE-Module-Server-Applications-15-SP3-2021-3020
openSUSE Leap 15.2
  • apache2-mod_auth_openidc >= 2.3.8-lp152.5.6.1
  • apache2-mod_auth_openidc-debuginfo >= 2.3.8-lp152.5.6.1
  • apache2-mod_auth_openidc-debugsource >= 2.3.8-lp152.5.6.1
Patchnames:
openSUSE-2021-1277
openSUSE Leap 15.3
  • apache2-mod_auth_openidc >= 2.3.8-3.15.1
Patchnames:
openSUSE-SLE-15.3-2021-3020


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
SUSE CaaS Platform 4.0 apache2-mod_auth_openidc In progress
SUSE Enterprise Storage 6 apache2-mod_auth_openidc In progress
SUSE Linux Enterprise High Performance Computing 12 SP5 apache2-mod_auth_openidc In progress
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS apache2-mod_auth_openidc In progress
SUSE Linux Enterprise Module for Server Applications 15 SP2 apache2-mod_auth_openidc Released
SUSE Linux Enterprise Module for Server Applications 15 SP3 apache2-mod_auth_openidc Released
SUSE Linux Enterprise Server 12 SP4 ESPOS apache2-mod_auth_openidc In progress
SUSE Linux Enterprise Server 12 SP4 LTSS apache2-mod_auth_openidc In progress
SUSE Linux Enterprise Server 12 SP5 apache2-mod_auth_openidc In progress
SUSE Linux Enterprise Server 15 SP1 Business Critical Linux apache2-mod_auth_openidc In progress
SUSE Linux Enterprise Server 15 SP1 LTSS apache2-mod_auth_openidc In progress
SUSE Linux Enterprise Server for SAP Applications 12 SP4 apache2-mod_auth_openidc In progress
SUSE Linux Enterprise Server for SAP Applications 12 SP5 apache2-mod_auth_openidc In progress
SUSE Linux Enterprise Server for SAP Applications 15 SP1 apache2-mod_auth_openidc In progress
SUSE Manager Proxy 4.0 apache2-mod_auth_openidc In progress
SUSE Manager Retail Branch Server 4.0 apache2-mod_auth_openidc In progress
SUSE Manager Server 4.0 apache2-mod_auth_openidc In progress
SUSE OpenStack Cloud 9 apache2-mod_auth_openidc In progress
SUSE OpenStack Cloud Crowbar 9 apache2-mod_auth_openidc In progress