CVE-2026-47373
Publication date 21 May 2026
Last updated 22 May 2026
Ubuntu priority
Description
Crypt::SaltedHash versions through 0.09 for Perl is susceptible to timing attacks. These versions use Perl's built-in eq comparison. Discrepencies in timing could be used to guess the underlying hash.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| libcrypt-saltedhash-perl | 26.04 LTS resolute |
Needs evaluation
|
| 25.10 questing |
Needs evaluation
|
|
| 24.04 LTS noble |
Needs evaluation
|
|
| 22.04 LTS jammy |
Needs evaluation
|
|
| 20.04 LTS focal |
Needs evaluation
|
|
| 18.04 LTS bionic |
Needs evaluation
|
References
Other references
- https://www.cve.org/CVERecord?id=CVE-2026-47373
- https://lists.security.metacpan.org/cve-announce/msg/40249915/
- https://github.com/robrwo/perl-Crypt-SaltedHash/commit/c07bfc5c23185b0667233d0f2e1252d81f1f027a.patch
- https://metacpan.org/release/RRWO/Crypt-SaltedHash-0.10/changes
- http://www.openwall.com/lists/oss-security/2026/05/20/21