Bug 1219911 (CVE-2024-24814) - VUL-0: CVE-2024-24814: apache2-mod_auth_openidc: denial of service when using `OIDCSessionType client-cookie` and manipulating cookies
Summary: VUL-0: CVE-2024-24814: apache2-mod_auth_openidc: denial of service when using...
Status: NEW
Alias: CVE-2024-24814
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/393987/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-24814:7.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-02-14 10:23 UTC by SMASH SMASH
Modified: 2024-07-04 12:30 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-02-14 10:23:11 UTC
mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In affected versions missing input validation on mod_auth_openidc_session_chunks cookie value makes the server vulnerable to a denial of service (DoS) attack. An internal security audit has been conducted and the reviewers found that if they manipulated the value of the mod_auth_openidc_session_chunks cookie to a very large integer, like 99999999, the server struggles with the request for a long time and finally gets back with a 500 error. Making a few requests of this kind caused our server to become unresponsive. Attackers can craft requests that would make the server work very hard (and possibly become unresponsive) and/or crash with minimal effort. This issue has been addressed in version 2.4.15.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24814
https://www.cve.org/CVERecord?id=CVE-2024-24814
https://github.com/OpenIDC/mod_auth_openidc/commit/4022c12f314bd89d127d1be008b1a80a08e1203d
https://github.com/OpenIDC/mod_auth_openidc/security/advisories/GHSA-hxr6-w4gc-7vvv
https://bugzilla.redhat.com/show_bug.cgi?id=2264092

Patch:
https://github.com/OpenIDC/mod_auth_openidc/commit/4022c12f314bd89d127d1be008b1a80a08e1203d
Comment 1 Andrea Mattiazzo 2024-02-14 10:25:25 UTC
Tracking as affected:
- SUSE:SLE-12-SP4:Update/apache2-mod_auth_openidc  
- SUSE:SLE-15-SP1:Update/apache2-mod_auth_openidc  
- openSUSE:Factory/apache2-mod_auth_openidc
Comment 3 OBSbugzilla Bot 2024-02-19 09:15:04 UTC
This is an autogenerated message for OBS integration:
This bug (1219911) was mentioned in
https://build.opensuse.org/request/show/1147523 Factory / apache2-mod_auth_openidc
Comment 5 Maintenance Automation 2024-03-05 12:30:05 UTC
SUSE-SU-2024:0758-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1219911
CVE References: CVE-2024-24814
Sources used:
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): apache2-mod_auth_openidc-2.4.0-7.12.2
SUSE Linux Enterprise Server 12 SP5 (src): apache2-mod_auth_openidc-2.4.0-7.12.2
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): apache2-mod_auth_openidc-2.4.0-7.12.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 6 Maintenance Automation 2024-03-05 12:30:06 UTC
SUSE-SU-2024:0757-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1219911
CVE References: CVE-2024-24814
Sources used:
SUSE Manager Proxy 4.3 (src): apache2-mod_auth_openidc-2.3.8-150100.3.28.1
SUSE Manager Retail Branch Server 4.3 (src): apache2-mod_auth_openidc-2.3.8-150100.3.28.1
SUSE Manager Server 4.3 (src): apache2-mod_auth_openidc-2.3.8-150100.3.28.1
SUSE Enterprise Storage 7.1 (src): apache2-mod_auth_openidc-2.3.8-150100.3.28.1
openSUSE Leap 15.5 (src): apache2-mod_auth_openidc-2.3.8-150100.3.28.1
Server Applications Module 15-SP5 (src): apache2-mod_auth_openidc-2.3.8-150100.3.28.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): apache2-mod_auth_openidc-2.3.8-150100.3.28.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): apache2-mod_auth_openidc-2.3.8-150100.3.28.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src): apache2-mod_auth_openidc-2.3.8-150100.3.28.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src): apache2-mod_auth_openidc-2.3.8-150100.3.28.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): apache2-mod_auth_openidc-2.3.8-150100.3.28.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): apache2-mod_auth_openidc-2.3.8-150100.3.28.1
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src): apache2-mod_auth_openidc-2.3.8-150100.3.28.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): apache2-mod_auth_openidc-2.3.8-150100.3.28.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): apache2-mod_auth_openidc-2.3.8-150100.3.28.1
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src): apache2-mod_auth_openidc-2.3.8-150100.3.28.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 ming li 2024-07-02 03:50:19 UTC
I found a bug while testing S:M:34510:336979, see https://bugzilla.suse.com/show_bug.cgi?id=1227261, this issue exists in the default software version of SLE15SP6, and it also exists in S:M:34510:336979
Comment 14 Maintenance Automation 2024-07-04 12:30:04 UTC
SUSE-SU-2024:2299-1: An update that solves one vulnerability and has one security fix can now be installed.

Category: security (important)
Bug References: 1219911, 1227261
CVE References: CVE-2024-24814
Maintenance Incident: [SUSE:Maintenance:34510](https://smelt.suse.de/incident/34510/)
Sources used:
openSUSE Leap 15.6 (src):
 apache2-mod_auth_openidc-2.3.8-150600.16.5.1
Server Applications Module 15-SP6 (src):
 apache2-mod_auth_openidc-2.3.8-150600.16.5.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.