CVE-2017-5361

NameCVE-2017-5361
DescriptionRequest Tracker (RT) 4.x before 4.0.25, 4.2.x before 4.2.14, and 4.4.x before 4.4.2 does not use a constant-time comparison algorithm for secrets, which makes it easier for remote attackers to obtain sensitive user password information via a timing side-channel attack.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-987-1, DLA-988-1, DSA-3882-1, DSA-3883-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
request-tracker4 (PTS)bullseye (security), bullseye4.4.4+dfsg-2+deb11u3fixed
bookworm, bookworm (security)4.4.6+dfsg-1.1+deb12u1fixed
sid, trixie4.4.7+dfsg-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
request-tracker4sourcewheezy4.0.7-5+deb7u5DLA-987-1
request-tracker4sourcejessie4.2.8-3+deb8u2DSA-3882-1
request-tracker4sourcestretch4.4.1-3+deb9u1DSA-3882-1
request-tracker4source(unstable)4.4.1-4
rt-authen-externalauthsourcewheezy0.10-4+deb7u1DLA-988-1
rt-authen-externalauthsourcejessie0.25-1+deb8u1DSA-3883-1
rt-authen-externalauthsource(unstable)(unfixed)

Notes

https://github.com/bestpractical/rt-authen-externalauth/commit/436255c04b4881bb6d8eec9a57b8593033d863a9

Search for package or bug name: Reporting problems