First published: Thu May 13 2021(Updated: )
An issue was discovered in Prosody before 0.11.9. It does not use a constant-time algorithm for comparing certain secret strings when running under Lua 5.2 or later. This can potentially be used in a timing attack to reveal the contents of secret strings to an attacker.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/prosody | 0.11.2-1+deb10u4 0.11.9-2+deb11u2 0.12.3-1 0.12.4-1 | |
Prosody Prosody | <0.11.9 | |
Lua Lua | >=5.2.0 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32921 is a vulnerability in Prosody before version 0.11.9 that allows for a timing attack to reveal the contents of secret strings.
CVE-2021-32921 has a severity rating of medium with a CVSS score of 5.9.
Versions 0.11.2-1+deb10u4, 0.11.9-2+deb11u2, 0.12.3-1, and 0.12.4-1 of the Prosody package in Debian are affected by CVE-2021-32921.
To fix CVE-2021-32921, upgrade to Prosody version 0.11.9 or later.
You can find more information about CVE-2021-32921 at the following references: [Reference 1](http://www.openwall.com/lists/oss-security/2021/05/13/1), [Reference 2](http://www.openwall.com/lists/oss-security/2021/05/14/2), [Reference 3](https://blog.prosody.im/prosody-0.11.9-released/)