跳转到帖子

Rocky Linux: CVE-2023-37464: mod_auth_openidc-2.3 (RLSA-2023-4418)

recommended_posts

发布于
  • Members

Rocky Linux: CVE-2023-37464: mod_auth_openidc-2.3 (RLSA-2023-4418)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:C/A:N)
Published
07/14/2023
Created
03/07/2024
Added
03/05/2024
Modified
01/28/2025

Description

OpenIDC/cjose is a C library implementing the Javascript Object Signing and Encryption (JOSE). The AES GCM decryption routine incorrectly uses the Tag length from the actual Authentication Tag provided in the JWE. The specsays that a fixed length of 16 octets must be applied. Therefore this bug allows an attacker to provide a truncated Authentication Tag and to modify the JWE accordingly. Users should upgrade to a version >= 0.6.2.2. Users unable to upgrade should avoid using AES GCM encryption and replace it with another encryption algorithm (e.g. AES CBC).

Solution(s)

  • rocky-upgrade-cjose
  • rocky-upgrade-cjose-debuginfo
  • rocky-upgrade-cjose-debugsource
  • rocky-upgrade-cjose-devel
  • rocky-upgrade-mod_auth_openidc
  • rocky-upgrade-mod_auth_openidc-debuginfo
  • rocky-upgrade-mod_auth_openidc-debugsource

References

  • https://attackerkb.com/topics/cve-2023-37464
  • CVE - 2023-37464
  • https://errata.rockylinux.org/RLSA-2023:4418
  • 查看数 700
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…