First published: Sun Aug 22 2021(Updated: )
In GNOME grilo though 0.3.13, grl-net-wc.c does not enable TLS certificate verification on the SoupSessionAsync objects it creates, leaving users vulnerable to network MITM attacks. NOTE: this is similar to CVE-2016-20011.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/grilo | <=0.3.13-1<=0.3.7-1 | 0.3.13-1+deb11u1 0.3.7-1+deb10u1 0.3.13-1.1 |
GNOME grilo | <=0.3.13 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
debian/grilo | 0.3.7-1+deb10u1 0.3.13-1+deb11u1 0.3.15-1 0.3.16-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39365 is a vulnerability in GNOME grilo where grl-net-wc.c does not enable TLS certificate verification on SoupSessionAsync objects, leaving users vulnerable to network MITM attacks.
CVE-2021-39365 affects users by leaving them vulnerable to network MITM attacks.
CVE-2021-39365 has a severity rating of medium.
The affected software for CVE-2021-39365 includes GNOME grilo versions up to 0.3.13 and Debian Debian Linux versions 9.0, 10.0, and 11.0.
Users can fix CVE-2021-39365 by updating to the patched versions of GNOME grilo (0.3.13-1+deb11u1 or 0.3.7-1+deb10u1) or Debian Debian Linux (9.0, 10.0, or 11.0) using the provided remedies.