CVE-2024-13939

NameCVE-2024-13939
DescriptionString::Compare::ConstantTime for Perl through 0.321 is vulnerable to timing attacks that allow an attacker to guess the length of a secret string. As stated in the documentation: "If the lengths of the strings are different, because equals returns false right away the size of the secret string may be leaked (but not its contents)." This is similar to CVE-2020-36829
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1101502

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libstring-compare-constanttime-perl (PTS)bullseye0.321-1vulnerable
bookworm0.321-2vulnerable
trixie, sid0.321-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libstring-compare-constanttime-perlsource(unstable)0.321-31101502

Notes

[bookworm] - libstring-compare-constanttime-perl <no-dsa> (Minor issue)
https://lists.security.metacpan.org/cve-announce/msg/28284732/
https://metacpan.org/release/FRACTAL/String-Compare-ConstantTime-0.321/view/lib/String/Compare/ConstantTime.pm#TIMING-SIDE-CHANNEL
Disputed upstream:
https://github.com/hoytech/String-Compare-ConstantTime/pull/21

Search for package or bug name: Reporting problems