An update for mailman is now available for openEuler-22.03-LTS Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2022-2005 Final 1.0 1.0 2022-10-21 Initial 2022-10-21 2022-10-21 openEuler SA Tool V1.0 2022-10-21 mailman security update An update for mailman is now available for openEuler-22.03-LTS. This is GNU Mailman, a mailing list management system distributed under the terms of the GNU General Public License (GPL) version 3 or later. The name of this software is spelled 'Mailman' with a leading capital 'M' but with a lower case second `m'. Any other spelling is incorrect. Security Fix(es): Check the REST API password in a way that is resistant to timing attacks. Using basic string equality is vulnerable to timing attacks as it will short circuit at the first wrong character. Using hmac.compare_digest avoids that issue and will take the same time, regardless of whether the value is correct or not. This is only exploitable if an attacker can talk directly to the REST API, which by default is bound to localhost. Reference: https://bugs.gentoo.org/828115(CVE-2021-34337) An update for mailman is now available for openEuler-22.03-LTS. openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. High mailman https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2005 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-34337 https://nvd.nist.gov/vuln/detail/CVE-2021-34337 openEuler-22.03-LTS mailman-3.3.2-5.oe2203.noarch.rpm mailman-3.3.2-5.oe2203.src.rpm Check the REST API password in a way that is resistant to timing attacks. Using basic string equality is vulnerable to timing attacks as it will short circuit at the first wrong character. Using hmac.compare_digest avoids that issue and will take the same time, regardless of whether the value is correct or not. This is only exploitable if an attacker can talk directly to the REST API, which by default is bound to localhost.Reference:https://bugs.gentoo.org/828115 2022-10-21 CVE-2021-34337 openEuler-22.03-LTS High 7.4 AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H mailman security update 2022-10-21 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2005