For example, if Crypt::SecretBuffer was used to store and compare plaintext passwords, then discrepencies in timing could be used to guess the secret password.
No advisories yet.
Solution
Upgrade to version 0.019 or later.
Workaround
No workaround given by the vendor.
Wed, 15 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 14 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nerdvana
Nerdvana crypt::secretbuffer |
|
| Vendors & Products |
Nerdvana
Nerdvana crypt::secretbuffer |
Tue, 14 Apr 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 13 Apr 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Crypt::SecretBuffer versions before 0.019 for Perl is suseceptible to timing attacks. For example, if Crypt::SecretBuffer was used to store and compare plaintext passwords, then discrepencies in timing could be used to guess the secret password. | |
| Title | Crypt::SecretBuffer versions before 0.019 for Perl is suseceptible to timing attacks | |
| Weaknesses | CWE-208 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2026-04-15T20:03:28.442Z
Reserved: 2026-03-28T19:22:27.564Z
Link: CVE-2026-5086
Updated: 2026-04-14T01:34:38.681Z
Status : Received
Published: 2026-04-13T23:16:27.990
Modified: 2026-04-15T20:16:37.690
Link: CVE-2026-5086
No data.
OpenCVE Enrichment
Updated: 2026-04-16T02:45:06Z