CVE-2026-47373

NameCVE-2026-47373
DescriptionCrypt::SaltedHash versions through 0.09 for Perl is susceptible to timing attacks. These versions use Perl's built-in eq comparison. Discrepencies in timing could be used to guess the underlying hash.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libcrypt-saltedhash-perl (PTS)bullseye0.09-1.1vulnerable
forky, bookworm, trixie0.09-3vulnerable
sid0.11-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libcrypt-saltedhash-perlsource(unstable)0.11-1

Notes

https://lists.security.metacpan.org/cve-announce/msg/40249915/
Fixed by: https://github.com/robrwo/perl-Crypt-SaltedHash/commit/c07bfc5c23185b0667233d0f2e1252d81f1f027a (0.10)

Search for package or bug name: Reporting problems