For example, if Crypt::SecretBuffer was used to store and compare plaintext passwords, then discrepencies in timing could be used to guess the secret password.
Project Subscriptions
No advisories yet.
Solution
Upgrade to version 0.019 or later.
Workaround
No workaround given by the vendor.
Wed, 06 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nerdvana crypt\
|
|
| CPEs | cpe:2.3:a:nerdvana:crypt\:\:secretbuffer:*:*:*:*:*:perl:*:* | |
| Vendors & Products |
Nerdvana crypt\
|
Wed, 15 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 14 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nerdvana
Nerdvana crypt::secretbuffer |
|
| Vendors & Products |
Nerdvana
Nerdvana crypt::secretbuffer |
Tue, 14 Apr 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 13 Apr 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Crypt::SecretBuffer versions before 0.019 for Perl is suseceptible to timing attacks. For example, if Crypt::SecretBuffer was used to store and compare plaintext passwords, then discrepencies in timing could be used to guess the secret password. | |
| Title | Crypt::SecretBuffer versions before 0.019 for Perl is suseceptible to timing attacks | |
| Weaknesses | CWE-208 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2026-04-15T20:03:28.442Z
Reserved: 2026-03-28T19:22:27.564Z
Link: CVE-2026-5086
Updated: 2026-04-14T01:34:38.681Z
Status : Analyzed
Published: 2026-04-13T23:16:27.990
Modified: 2026-05-06T17:16:49.683
Link: CVE-2026-5086
No data.
OpenCVE Enrichment
Updated: 2026-04-16T02:45:06Z