Crypt::SecretBuffer versions before 0.019 for Perl is suseceptible to timing attacks.
For example, if Crypt::SecretBuffer was used to store and compare plaintext passwords, then discrepencies in timing could be used to guess the secret password.
For example, if Crypt::SecretBuffer was used to store and compare plaintext passwords, then discrepencies in timing could be used to guess the secret password.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
Upgrade to version 0.019 or later.
Workaround
No workaround given by the vendor.
References
History
Tue, 14 Apr 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 13 Apr 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Crypt::SecretBuffer versions before 0.019 for Perl is suseceptible to timing attacks. For example, if Crypt::SecretBuffer was used to store and compare plaintext passwords, then discrepencies in timing could be used to guess the secret password. | |
| Title | Crypt::SecretBuffer versions before 0.019 for Perl is suseceptible to timing attacks | |
| Weaknesses | CWE-208 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2026-04-14T01:34:38.681Z
Reserved: 2026-03-28T19:22:27.564Z
Link: CVE-2026-5086
No data.
Status : Received
Published: 2026-04-13T23:16:27.990
Modified: 2026-04-14T02:16:05.917
Link: CVE-2026-5086
No data.
OpenCVE Enrichment
No data.
Weaknesses