An update for mailman is now available for openEuler-22.03-LTS
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2022-2005
Final
1.0
1.0
2022-10-21
Initial
2022-10-21
2022-10-21
openEuler SA Tool V1.0
2022-10-21
mailman security update
An update for mailman is now available for openEuler-22.03-LTS.
This is GNU Mailman, a mailing list management system distributed under the terms of the GNU General Public License (GPL) version 3 or later. The name of this software is spelled 'Mailman' with a leading capital 'M' but with a lower case second `m'. Any other spelling is incorrect. Security Fix(es):
Check the REST API password in a way that is resistant to timing attacks. Using basic string equality is vulnerable to timing attacks as it will short circuit at the first wrong character. Using hmac.compare_digest avoids that issue and will take the same time, regardless of whether the value is correct or not. This is only exploitable if an attacker can talk directly to the REST API, which by default is bound to localhost.
Reference:
https://bugs.gentoo.org/828115(CVE-2021-34337)
An update for mailman is now available for openEuler-22.03-LTS.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
mailman
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2005
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-34337
https://nvd.nist.gov/vuln/detail/CVE-2021-34337
openEuler-22.03-LTS
mailman-3.3.2-5.oe2203.noarch.rpm
mailman-3.3.2-5.oe2203.src.rpm
Check the REST API password in a way that is resistant to timing attacks. Using basic string equality is vulnerable to timing attacks as it will short circuit at the first wrong character. Using hmac.compare_digest avoids that issue and will take the same time, regardless of whether the value is correct or not. This is only exploitable if an attacker can talk directly to the REST API, which by default is bound to localhost.Reference:https://bugs.gentoo.org/828115
2022-10-21
CVE-2021-34337
openEuler-22.03-LTS
High
7.4
AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
mailman security update
2022-10-21
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2005