CVE-2021-32921

Name
CVE-2021-32921
Description
An issue was discovered in Prosody before 0.11.9. It does not use a constant-time algorithm for comparing certain secret strings when running under Lua 5.2 or later. This can potentially be used in a timing attack to reveal the contents of secret strings to an attacker.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://blog.prosody.im/prosody-0.11.9-released/
MLIST http://www.openwall.com/lists/oss-security/2021/05/13/1
MLIST http://www.openwall.com/lists/oss-security/2021/05/14/2
DEBIAN https://www.debian.org/security/2021/dsa-4916
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6MFFBZWXKPZEVZNQSVJNCUE7WRF3T7DG/
Third Party Advisory https://security.gentoo.org/glsa/202105-15
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GUN63AHEWB2WRROJHU3BVJRWLONCT2B7/
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LWJ2DG2DFJOEFEWOUN26IMYYWGSA2ZEE/
Mailing List https://lists.debian.org/debian-lts-announce/2021/06/msg00016.html
MLIST https://lists.debian.org/debian-lts-announce/2021/06/msg00018.html

Match rules

CPE URI Source package Min version Max version

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
prosody 3.13-community 0.11.9-r0 Francesco Colista <fcolista@alpinelinux.org> fixed