https://bugzilla.redhat.com/show_bug.cgi?id=1475072 Bug ID: 1475072 Summary: CVE-2017-5361 rt: timing side-channel attack in secrets constant-time comparison algorithm Product: Security Response Component: vulnerability Keywords: Security Severity: low Priority: low Assignee: security-response-team@xxxxxxxxxx Reporter: psampaio@xxxxxxxxxx CC: perl-devel@xxxxxxxxxxxxxxxxxxxxxxx, rc040203@xxxxxxxxxx, tibbs@xxxxxxxxxxx It was discovered that RT::Authen::ExternalAuth, an external authentication module for Request Tracker, is vulnerable to timing side-channel attacks for user passwords. Only ExternalAuth in DBI (database) mode is vulnerable. Upstream patch: https://forum.bestpractical.com/t/security-vulnerabilities-in-rt-2017-06-15/32016 References: https://www.debian.org/security/2017/dsa-3882 https://www.debian.org/security/2017/dsa-3883 -- You are receiving this mail because: You are on the CC list for the bug. _______________________________________________ perl-devel mailing list -- perl-devel@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to perl-devel-leave@xxxxxxxxxxxxxxxxxxxxxxx