Apache Hive cookie signature verification used a non constant time comparison which is known to be vulnerable to timing attacks. This could allow recovery of another users cookie signature. The issue was addressed in Apache Hive 2.3.8
References
Link | Resource |
---|---|
https://issues.apache.org/jira/browse/HIVE-22708 | Issue Tracking Patch Vendor Advisory |
https://lists.apache.org/thread.html/rd186eedff68102ba1e68059a808101c5aa587e11542c7dcd26e7b9d7%40%3Cuser.hive.apache.org%3E | Mailing List Patch Vendor Advisory |
https://issues.apache.org/jira/browse/HIVE-22708 | Issue Tracking Patch Vendor Advisory |
https://lists.apache.org/thread.html/rd186eedff68102ba1e68059a808101c5aa587e11542c7dcd26e7b9d7%40%3Cuser.hive.apache.org%3E | Mailing List Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 05:11
Type | Values Removed | Values Added |
---|---|---|
References | () https://issues.apache.org/jira/browse/HIVE-22708 - Issue Tracking, Patch, Vendor Advisory | |
References | () https://lists.apache.org/thread.html/rd186eedff68102ba1e68059a808101c5aa587e11542c7dcd26e7b9d7%40%3Cuser.hive.apache.org%3E - Mailing List, Patch, Vendor Advisory |
Information
Published : 2021-03-16 13:15
Updated : 2024-11-21 05:11
NVD link : CVE-2020-1926
Mitre link : CVE-2020-1926
CVE.ORG link : CVE-2020-1926
JSON object : View
Products Affected
apache
- hive