Apache Hive cookie signature verification used a non constant time comparison which is known to be vulnerable to timing attacks. This could allow recovery of another users cookie signature. The issue was addressed in Apache Hive 2.3.8
{ "versions": [ { "introduced": "0" }, { "fixed": "2.3.8" } ] }
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-1926.json"