{"schema_version": "1.3.1", "id": "RLSA-2022:1934", "modified": "2023-02-02T13:42:31.173848Z", "published": "2022-05-10T08:08:25Z", "related": ["CVE-2021-3639"], "summary": "Moderate: mod_auth_mellon security update", "details": "The mod_auth_mellon module for the Apache HTTP Server is an authentication service that implements the SAML 2.0 federation protocol. The module grants access based on the attributes received in assertions generated by an IdP server.\n\nSecurity Fix(es):\n\n* mod_auth_mellon: Open Redirect vulnerability in logout URLs (CVE-2021-3639)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.", "severity": [{"type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}], "affected": [{"package": {"ecosystem": "Rocky Linux:8", "name": "mod_auth_mellon", "purl": "pkg:rpm/rocky-linux/mod_auth_mellon?distro=rocky-linux-8&epoch=0"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "0:0.14.0-12.el8.1"}], "database_specific": {"yum_repository": "AppStream"}}]}], "references": [{"type": "ADVISORY", "url": "https://errata.rockylinux.org/RLSA-2022:1934"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980648"}], "credits": [{"name": "Rocky Enterprise Software Foundation"}, {"name": "Red Hat"}]}