CVE-2021-39365

NameCVE-2021-39365
DescriptionIn GNOME grilo though 0.3.13, grl-net-wc.c does not enable TLS certificate verification on the SoupSessionAsync objects it creates, leaving users vulnerable to network MITM attacks. NOTE: this is similar to CVE-2016-20011.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2762-1, DSA-4964-1
Debian Bugs992971

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
grilo (PTS)buster, buster (security)0.3.7-1+deb10u1fixed
bullseye (security), bullseye0.3.13-1+deb11u1fixed
bookworm0.3.15-1fixed
sid, trixie0.3.16-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
grilosourcestretch0.3.2-2+deb9u1DLA-2762-1
grilosourcebuster0.3.7-1+deb10u1DSA-4964-1
grilosourcebullseye0.3.13-1+deb11u1DSA-4964-1
grilosource(unstable)0.3.13-1.1992971

Notes

https://blogs.gnome.org/mcatanzaro/2021/05/25/reminder-soupsessionsync-and-soupsessionasync-default-to-no-tls-certificate-verification/
https://gitlab.gnome.org/GNOME/grilo/-/issues/146

Search for package or bug name: Reporting problems