These versions use Perl's built-in eq comparison. Discrepencies in timing could be used to guess the underlying hash.
No advisories yet.
Solution
Upgrade to version 0.10 or later.
Workaround
No workaround given by the vendor.
Thu, 21 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 21 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rrwo
Rrwo crypt::saltedhash |
|
| Vendors & Products |
Rrwo
Rrwo crypt::saltedhash |
Wed, 20 May 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 20 May 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Crypt::SaltedHash versions through 0.09 for Perl is susceptible to timing attacks. These versions use Perl's built-in eq comparison. Discrepencies in timing could be used to guess the underlying hash. | |
| Title | Crypt::SaltedHash versions through 0.09 for Perl is susceptible to timing attacks | |
| Weaknesses | CWE-208 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2026-05-21T14:10:59.820Z
Reserved: 2026-05-19T16:17:52.856Z
Link: CVE-2026-47373
Updated: 2026-05-20T22:31:06.839Z
Status : Deferred
Published: 2026-05-20T21:16:17.853
Modified: 2026-05-21T16:04:53.813
Link: CVE-2026-47373
No data.
OpenCVE Enrichment
Updated: 2026-05-21T16:30:14Z