It was discovered that Prosody does not use a constant-time algorithm for comparing certain secret strings when running under Lua 5.2 or later. This can potentially be used in a timing attack to reveal the contents of secret strings to an attacker. Reference: https://prosody.im/security/advisory_20210512/
Created prosody tracking bugs for this issue: Affects: fedora-all [bug 1960350]
Well, this also affects at least EPEL 8
Created prosody tracking bugs for this issue: Affects: epel-all [bug 1960358]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.