https://bugzilla.redhat.com/show_bug.cgi?id=1475072
Bug ID: 1475072 Summary: CVE-2017-5361 rt: timing side-channel attack in secrets constant-time comparison algorithm Product: Security Response Component: vulnerability Keywords: Security Severity: low Priority: low Assignee: security-response-t...@redhat.com Reporter: psamp...@redhat.com CC: perl-devel@lists.fedoraproject.org, rc040...@freenet.de, ti...@math.uh.edu It was discovered that RT::Authen::ExternalAuth, an external authentication module for Request Tracker, is vulnerable to timing side-channel attacks for user passwords. Only ExternalAuth in DBI (database) mode is vulnerable. Upstream patch: https://forum.bestpractical.com/t/security-vulnerabilities-in-rt-2017-06-15/32016 References: https://www.debian.org/security/2017/dsa-3882 https://www.debian.org/security/2017/dsa-3883 -- You are receiving this mail because: You are on the CC list for the bug. _______________________________________________ perl-devel mailing list -- perl-devel@lists.fedoraproject.org To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org