Hi both Moritz!

On Fri, Oct 18, 2019 at 09:33:47AM +0200, Moritz Mühlenhoff wrote:
> On Wed, Oct 16, 2019 at 11:19:36AM +0200, Moritz Schlarb wrote:
> > Hi everyone,
> > 
> > I have prepared a backport of the patches for the version packaged in
> > Buster:
> > https://salsa.debian.org/debian/libapache2-mod-auth-openidc/commit/17e31b94a71ef02d1417bee6b0ef7b7379b40375
> > 
> > If you deem necessary and sufficient, please release as a security
> > update or otherwise I'll try to get it in in proposed-updates.
> > 
> > Regards,
> > Moritz (another one)
> 
> Hi fellow Moritz,
> the target of the open redirect is under control of the IDP that the user
> logged into, while a malicious IDP could do much more harm to a user
> (like arbitrarily rejecting/terminating sessions etc). So I think we can
> certainly fix this via a point release, but I don't think this warrants
> a DSA.
> 
> But maybe I'm missing something, so please let me know if you disagree!

Following the above, I have now marked the issue as no-dsa in the
security-tracker. Moritz (Schlarb), can you prepare updates for
upcoming point release? For buster 10.2 happening tomorrow is clearly
to late.

Regards,
Salvatore

Reply via email to