{"id":"UBUNTU-CVE-2021-32921","details":"An issue was discovered in Prosody before 0.11.9. It does not use a constant-time algorithm for comparing certain secret strings when running under Lua 5.2 or later. This can potentially be used in a timing attack to reveal the contents of secret strings to an attacker.","modified":"2025-10-24T04:50:21Z","published":"2021-05-13T16:15:00Z","upstream":["CVE-2021-32921"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-32921"},{"type":"REPORT","url":"https://www.openwall.com/lists/oss-security/2021/05/13/1"},{"type":"REPORT","url":"https://prosody.im/security/advisory_20210512.txt"},{"type":"REPORT","url":"https://hg.prosody.im/trunk/rev/c98aebe601f9"},{"type":"REPORT","url":"https://hg.prosody.im/trunk/rev/13b84682518e"},{"type":"REPORT","url":"https://hg.prosody.im/trunk/rev/6f56170ea986"},{"type":"REPORT","url":"https://blog.prosody.im/prosody-0.11.9-released/"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2021-32921"}],"affected":[{"package":{"name":"prosody","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/prosody@0.9.10-1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.9.8-1","0.9.9-1","0.9.10-1"],"ecosystem_specific":{"binaries":[{"binary_version":"0.9.10-1","binary_name":"prosody"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-32921.json"}},{"package":{"name":"prosody","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/prosody@0.10.0-1ubuntu0.1~esm1?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.9.12-2","0.10.0-1","0.10.0-1build1","0.10.0-1ubuntu0.1~esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"0.10.0-1ubuntu0.1~esm1","binary_name":"prosody"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-32921.json"}},{"package":{"name":"prosody","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/prosody@0.11.4-1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.11.2-1","0.11.3-1","0.11.4-1"],"ecosystem_specific":{"binaries":[{"binary_version":"0.11.4-1","binary_name":"prosody"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-32921.json"}},{"package":{"name":"prosody","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/prosody@0.11.13-1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.11.10-1","0.11.10-1build1","0.11.10-1build2","0.11.11-1","0.11.11-2","0.11.12-1","0.11.13-1"],"ecosystem_specific":{"binaries":[{"binary_version":"0.11.13-1","binary_name":"prosody"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-32921.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}]}