diff options
author | Rodrigo Osorio <rodrigo@FreeBSD.org> | 2025-08-13 10:37:28 +0200 |
---|---|---|
committer | Rodrigo Osorio <rodrigo@FreeBSD.org> | 2025-08-13 11:19:28 +0200 |
commit | 0f0638d4ab0bdc81a39a423f27f62fa3386e45b7 (patch) | |
tree | 49b10c4334bf46e675aa9d584b96553cb3b98647 | |
parent | security/p5-Authen-SASL: update to 2.1900 (diff) |
security/vuxml: add security/p5-Authen-SASL
-rw-r--r-- | security/vuxml/vuln/2025.xml | 32 |
1 files changed, 32 insertions, 0 deletions
diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml index 479b1cbd8d4d..95e0daf3107f 100644 --- a/security/vuxml/vuln/2025.xml +++ b/security/vuxml/vuln/2025.xml @@ -1,3 +1,35 @@ + <vuln vid="defe9a20-781e-11f0-97c4-40b034429ecf"> + <topic>p5-Authen-SASL -- Insecure source of randomness</topic> + <affects> + <package> + <name>p5-Authen-SASL</name> + <range><lt>2.1900</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>p5-Authen-SASL project reports:</p> + <blockquote cite="https://github.com/advisories/GHSA-496q-8ph2-c4fj"> + <p>Authen::SASL::Perl::DIGEST_MD5 versions 2.04 through 2.1800 for Perl generates the cnonce insecurely.</p> + <p>The cnonce (client nonce) is generated from an MD5 hash of the PID, the epoch time and the built-in rand function. + The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. + The built-in rand function is unsuitable for cryptographic usage.</p> + <p>According to RFC 2831, The cnonce-value is an opaque quoted string value provided by the client and used by both client and server + to avoid chosen plaintext attacks, and to provide mutual authentication. The security of the implementation depends on a good choice. + It is RECOMMENDED that it contain at least 64 bits of entropy.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2025-40918</cvename> + <url>https://nvd.nist.gov/vuln/detail/CVE-2025-40918</url> + </references> + <dates> + <discovery>2025-07-16</discovery> + <entry>2025-08-13</entry> + </dates> + </vuln> + <vuln vid="15fd1321-768a-11f0-b3f7-a8a1599412c6"> <topic>chromium -- multiple security fixes</topic> <affects> |