Bug 1997161 (CVE-2021-39365)

Summary: CVE-2021-39365 grilo: missing TLS certificate verification
Product: [Other] Security Response Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: bnocera, gnome-sig, klember, victortoso
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-11-10 01:24:31 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1997162, 1997232, 1997233, 1997234    
Bug Blocks: 1997163    

Description Guilherme de Almeida Suckevicz 2021-08-24 14:17:57 UTC
In GNOME grilo though 0.3.13, grl-net-wc.c does not enable TLS certificate verification on the SoupSessionAsync objects it creates, leaving users vulnerable to network MITM attacks. NOTE: this is similar to CVE-2016-20011.


Comment 1 Guilherme de Almeida Suckevicz 2021-08-24 14:18:12 UTC
Created grilo tracking bugs for this issue:

Affects: fedora-all [bug 1997162]

Comment 2 Bastien Nocera 2021-08-24 15:35:41 UTC
Fedora 33 update:

That was the last supported version of Fedora to be potentially vulnerable.

Comment 3 Garrett Tucker 2021-08-24 16:53:59 UTC
RHEL 9 is not affected as the patch listed above has been applied. However, RHEL 8.5.0 and below is affected by this and should have the patch applied but is delegated to the engineering teams.

Comment 5 errata-xmlrpc 2021-11-09 18:19:38 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:4339 https://access.redhat.com/errata/RHSA-2021:4339

Comment 6 Product Security DevOps Team 2021-11-10 01:24:29 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):