Permalink
CVE-2024-13939
7.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): NONE
- Availability impact (A): NONE
String::Compare::ConstantTime for Perl through 0.321 is vulnerable to timing attacks that allow an attacker to guess the length of a secret string
String::Compare::ConstantTime for Perl through 0.321 is vulnerable to timing attacks that allow an attacker to guess the length of a secret string. As stated in the documentation: "If the lengths of the strings are different, because equals returns false right away the size of the secret string may be leaked (but not its contents)." This is similar to CVE-2020-36829
Affected products
String-Compare-ConstantTime
- =<0.321
Matching in nixpkgs
pkgs.perlPackages.StringCompareConstantTime
Timing side-channel protected string compare
-
nixos-unstable -
- nixpkgs-unstable 0.321
pkgs.perl538Packages.StringCompareConstantTime
Timing side-channel protected string compare
-
nixos-unstable -
- nixpkgs-unstable 0.321
pkgs.perl540Packages.StringCompareConstantTime
Timing side-channel protected string compare
-
nixos-unstable -
- nixpkgs-unstable 0.321