Crypt::SaltedHash versions through 0.09 for Perl is susceptible to timing attacks.
These versions use Perl's built-in eq comparison. Discrepencies in timing could be used to guess the underlying hash.
These versions use Perl's built-in eq comparison. Discrepencies in timing could be used to guess the underlying hash.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
Upgrade to version 0.10 or later.
Workaround
No workaround given by the vendor.
References
History
Wed, 20 May 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 20 May 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Crypt::SaltedHash versions through 0.09 for Perl is susceptible to timing attacks. These versions use Perl's built-in eq comparison. Discrepencies in timing could be used to guess the underlying hash. | |
| Title | Crypt::SaltedHash versions through 0.09 for Perl is susceptible to timing attacks | |
| Weaknesses | CWE-208 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2026-05-20T22:31:06.839Z
Reserved: 2026-05-19T16:17:52.856Z
Link: CVE-2026-47373
No data.
Status : Received
Published: 2026-05-20T21:16:17.853
Modified: 2026-05-20T23:16:35.670
Link: CVE-2026-47373
No data.
OpenCVE Enrichment
Updated: 2026-05-20T23:00:15Z
Weaknesses