OESA-2022-2005

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-2005
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2022-2005.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2022-2005
Upstream
Published
2022-10-21T11:04:26Z
Modified
2025-08-12T05:08:46.008476Z
Summary
mailman security update
Details

This is GNU Mailman, a mailing list management system distributed under the terms of the GNU General Public License (GPL) version 3 or later. The name of this software is spelled 'Mailman' with a leading capital 'M' but with a lower case second `m'. Any other spelling is incorrect. Security Fix(es):

Check the REST API password in a way that is resistant to timing attacks. Using basic string equality is vulnerable to timing attacks as it will short circuit at the first wrong character. Using hmac.compare_digest avoids that issue and will take the same time, regardless of whether the value is correct or not. This is only exploitable if an attacker can talk directly to the REST API, which by default is bound to localhost.

Reference:

https://bugs.gentoo.org/828115(CVE-2021-34337)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:22.03-LTS / mailman

Package

Name
mailman
Purl
pkg:rpm/openEuler/mailman&distro=openEuler-22.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.2-5.oe2203

Ecosystem specific

{
    "noarch": [
        "mailman-3.3.2-5.oe2203.noarch.rpm"
    ],
    "src": [
        "mailman-3.3.2-5.oe2203.src.rpm"
    ]
}