CVE-2024-13939

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-13939
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-13939.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-13939
Related
Published
2025-03-28T03:15:15Z
Modified
2025-04-14T05:46:47.713999Z
Summary
[none]
Details

String::Compare::ConstantTime for Perl through 0.321 is vulnerable to timing attacks that allow an attacker to guess the length of a secret string.

As stated in the documentation: "If the lengths of the strings are different, because equals returns false right away the size of the secret string may be leaked (but not its contents)."

This is similar to CVE-2020-36829

References

Affected packages

Debian:11 / libstring-compare-constanttime-perl

Package

Name
libstring-compare-constanttime-perl
Purl
pkg:deb/debian/libstring-compare-constanttime-perl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.321-1
0.321-2
0.321-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / libstring-compare-constanttime-perl

Package

Name
libstring-compare-constanttime-perl
Purl
pkg:deb/debian/libstring-compare-constanttime-perl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.321-2
0.321-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / libstring-compare-constanttime-perl

Package

Name
libstring-compare-constanttime-perl
Purl
pkg:deb/debian/libstring-compare-constanttime-perl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.321-3

Affected versions

0.*

0.321-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}