CVE-2019-1010263

NameCVE-2019-1010263
DescriptionPerl Crypt::JWT prior to 0.023 is affected by: Incorrect Access Control. The impact is: allow attackers to bypass authentication by providing a token by crafting with hmac(). The component is: JWT.pm, line 614. The attack vector is: network connectivity. The fixed version is: after commit b98a59b42ded9f9e51b2560410106207c2152d6c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libcrypt-jwt-perl (PTS)buster0.023-1fixed
bullseye0.032-1fixed
bookworm0.034-1fixed
sid, trixie0.035-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libcrypt-jwt-perlsource(unstable)(not affected)

Notes

- libcrypt-jwt-perl <not-affected> (Fixed with the initial upload to Debian)
https://github.com/DCIT/perl-Crypt-JWT/commit/b98a59b42ded9f9e51b2560410106207c2152d6c
https://www.openwall.com/lists/oss-security/2018/09/07/1

Search for package or bug name: Reporting problems