[Bug 1475072] New: CVE-2017-5361 rt: timing side-channel attack in secrets constant-time comparison algorithm

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



https://bugzilla.redhat.com/show_bug.cgi?id=1475072

            Bug ID: 1475072
           Summary: CVE-2017-5361 rt: timing side-channel attack in
                    secrets constant-time comparison algorithm
           Product: Security Response
         Component: vulnerability
          Keywords: Security
          Severity: low
          Priority: low
          Assignee: security-response-team@xxxxxxxxxx
          Reporter: psampaio@xxxxxxxxxx
                CC: perl-devel@xxxxxxxxxxxxxxxxxxxxxxx,
                    rc040203@xxxxxxxxxx, tibbs@xxxxxxxxxxx



It was discovered that RT::Authen::ExternalAuth, an external authentication
module for Request Tracker, is vulnerable to timing side-channel attacks for
user passwords. Only ExternalAuth in DBI (database) mode is vulnerable.

Upstream patch:

https://forum.bestpractical.com/t/security-vulnerabilities-in-rt-2017-06-15/32016

References:

https://www.debian.org/security/2017/dsa-3882
https://www.debian.org/security/2017/dsa-3883

-- 
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
perl-devel mailing list -- perl-devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to perl-devel-leave@xxxxxxxxxxxxxxxxxxxxxxx




[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Legacy Announce]     [Fedora PHP Devel]     [Kernel Devel]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Big List of Linux Books]     [Gimp]     [Yosemite Information]

  Powered by Linux