CVE-2021-39365

NameCVE-2021-39365
DescriptionIn GNOME grilo though 0.3.13, grl-net-wc.c does not enable TLS certificate verification on the SoupSessionAsync objects it creates, leaving users vulnerable to network MITM attacks. NOTE: this is similar to CVE-2016-20011.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-4964-1
NVD severitymedium
Debian Bugs992971

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
grilo (PTS)stretch0.3.2-2vulnerable
buster0.3.7-1vulnerable
buster (security)0.3.7-1+deb10u1fixed
bullseye0.3.13-1vulnerable
bullseye (security)0.3.13-1+deb11u1fixed
bookworm, sid0.3.13-1.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
grilosourcebuster0.3.7-1+deb10u1DSA-4964-1
grilosourcebullseye0.3.13-1+deb11u1DSA-4964-1
grilosource(unstable)0.3.13-1.1992971

Notes

https://blogs.gnome.org/mcatanzaro/2021/05/25/reminder-soupsessionsync-and-soupsessionasync-default-to-no-tls-certificate-verification/
https://gitlab.gnome.org/GNOME/grilo/-/issues/146

Search for package or bug name: Reporting problems