An issue was discovered in Prosody before 0.11.9. It does not use a constant-time algorithm for comparing certain secret strings when running under Lua 5.2 or later. This can potentially be used in a timing attack to reveal the contents of secret strings to an attacker.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2021-05-13 09:15
Updated : 2022-05-16 12:50
NVD link : CVE-2021-32921
Mitre link : CVE-2021-32921
JSON object : View
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Products Affected
debian
- debian_linux
lua
- lua
prosody
- prosody
fedoraproject
- fedora