Bug#1109439: libcatalyst-plugin-session-perl: CVE-2025-40924

Salvatore Bonaccorso carnil at debian.org
Thu Jul 17 22:54:32 BST 2025


Source: libcatalyst-plugin-session-perl
Version: 0.43-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/perl-catalyst/Catalyst-Plugin-Session/pull/5
X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>

Hi,

The following vulnerability was published for libcatalyst-plugin-session-perl.

CVE-2025-40924[0]:
| Catalyst::Plugin::Session before version 0.44 for Perl generates
| session ids insecurely.  The session id is generated from a (usually
| SHA-1) hash of a simple counter, the epoch time, the built-in rand
| function, the PID and the current Catalyst context. This information
| is of low entropy. The PID will come from a small set of numbers,
| and the epoch time may be guessed, if it is not leaked from the HTTP
| Date header. The built-in rand function is unsuitable for
| cryptographic usage.  Predicable session ids could allow an attacker
| to gain access to systems.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-40924
    https://www.cve.org/CVERecord?id=CVE-2025-40924
[1] https://github.com/perl-catalyst/Catalyst-Plugin-Session/pull/5

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



More information about the pkg-perl-maintainers mailing list