CVE-2024-58135

NameCVE-2024-58135
DescriptionMojolicious versions from 7.28 for Perl will generate weak HMAC sessio ...
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1104633

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libmojolicious-perl (PTS)bullseye8.71+dfsg-1vulnerable
bookworm9.31+dfsg-1vulnerable
trixie9.39+dfsg-1vulnerable
forky, sid9.42+dfsg-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libmojolicious-perlsource(unstable)(unfixed)1104633

Notes

[trixie] - libmojolicious-perl <no-dsa> (Minor issue)
[bookworm] - libmojolicious-perl <no-dsa> (Minor issue)
[bullseye] - libmojolicious-perl <postponed> (Minor issue)
https://lists.security.metacpan.org/cve-announce/msg/29241187/
https://github.com/mojolicious/mojo/commit/c82071556c569a251152892c8cc2fd0ad5a4be54 (v9.39)
The problem does not occur if the user has configured a cryptographically
secure HMAC session secret, and upstream expects users to already be doing
that for production deployments. The fix automatically generates a secure
session secret. It requires libcryptx-perl >=0.080, but they say this is
only because that is the only release they tested. I.e., it is likely that
the fix works fine with older CryptX: https://github.com/mojolicious/mojo/discussions/2255
As per upstream mojolicious/v9.39 will still be considered vulnerable to the
CVE since the CryptX is not a required dependency.

Search for package or bug name: Reporting problems