| Name | CVE-2026-5091 |
| Description | Catalyst::Plugin::Authentication versions through 0.10024 for Perl is susceptible to timing attacks. These versions use Perl's built-in eq comparison. Discrepencies in timing could be used to guess the underlying hash or password. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| Debian Bugs | 1137325 |
Vulnerable and fixed packages
The table below lists information on source packages.
The information below is based on the following data on fixed versions.
Notes
[trixie] - libcatalyst-plugin-authentication-perl <no-dsa> (Minor issue)
[bookworm] - libcatalyst-plugin-authentication-perl <no-dsa> (Minor issue)
[bullseye] - libcatalyst-plugin-authentication-perl <postponed> (Minor issue, side channel)
https://lists.security.metacpan.org/cve-announce/msg/40281889/
https://github.com/perl-catalyst/Catalyst-Plugin-Authentication/commit/b0515f492257438cf07082acf1e10d06e8088a5e (v0.10_025)