CVE-2024-13939

NameCVE-2024-13939
DescriptionString::Compare::ConstantTime for Perl through 0.321 is vulnerable to timing attacks that allow an attacker to guess the length of a secret string. As stated in the documentation: "If the lengths of the strings are different, because equals returns false right away the size of the secret string may be leaked (but not its contents)." This is similar to CVE-2020-36829
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1101502

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libstring-compare-constanttime-perl (PTS)bullseye0.321-1vulnerable
sid, trixie, bookworm0.321-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libstring-compare-constanttime-perlsource(unstable)(unfixed)1101502

Notes

https://lists.security.metacpan.org/cve-announce/msg/28284732/
https://metacpan.org/release/FRACTAL/String-Compare-ConstantTime-0.321/view/lib/String/Compare/ConstantTime.pm#TIMING-SIDE-CHANNEL

Search for package or bug name: Reporting problems