Debian Package Tracker
Register | Log in
Subscribe

libcatalyst-plugin-session-perl

generic Session plugin for Catalyst

Choose email to subscribe with

general
  • source: libcatalyst-plugin-session-perl (main)
  • version: 0.43-1
  • maintainer: Debian Perl Group (archive) (DMD) (LowNMU)
  • uploaders: Damyan Ivanov [DMD]
  • arch: all
  • std-ver: 4.6.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 0.41-1
  • stable: 0.43-1
  • testing: 0.43-1
  • unstable: 0.43-1
versioned links
  • 0.41-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.43-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libcatalyst-plugin-session-perl (1 bugs: 0, 0, 1, 0)
action needed
A new upstream version is available: 0.44 high
A new upstream version 0.44 is available, you should consider packaging it.
Created: 2025-07-19 Last update: 2025-07-24 18:00
1 security issue in trixie high

There is 1 open security issue in trixie.

1 important issue:
  • CVE-2025-40924: Catalyst::Plugin::Session before version 0.44 for Perl generates session ids insecurely. The session id is generated from a (usually SHA-1) hash of a simple counter, the epoch time, the built-in rand function, the PID and the current Catalyst context. This information is of low entropy. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems.
Created: 2025-07-17 Last update: 2025-07-18 19:02
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2025-40924: Catalyst::Plugin::Session before version 0.44 for Perl generates session ids insecurely. The session id is generated from a (usually SHA-1) hash of a simple counter, the epoch time, the built-in rand function, the PID and the current Catalyst context. This information is of low entropy. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems.
Created: 2025-07-17 Last update: 2025-07-18 19:02
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2025-01-06 Last update: 2025-07-24 22:01
1 low-priority security issue in bookworm low

There is 1 open security issue in bookworm.

1 issue left for the package maintainer to handle:
  • CVE-2025-40924: (needs triaging) Catalyst::Plugin::Session before version 0.44 for Perl generates session ids insecurely. The session id is generated from a (usually SHA-1) hash of a simple counter, the epoch time, the built-in rand function, the PID and the current Catalyst context. This information is of low entropy. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems.

You can find information about how to handle this issue in the security team's documentation.

Created: 2025-07-17 Last update: 2025-07-18 19:02
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.6.1).
Created: 2022-12-17 Last update: 2025-02-27 13:25
news
[rss feed]
  • [2022-06-06] libcatalyst-plugin-session-perl 0.43-1 MIGRATED to testing (Debian testing watch)
  • [2022-06-03] Accepted libcatalyst-plugin-session-perl 0.43-1 (source) into unstable (gregor herrmann)
  • [2018-12-25] libcatalyst-plugin-session-perl 0.41-1 MIGRATED to testing (Debian testing watch)
  • [2018-12-22] Accepted libcatalyst-plugin-session-perl 0.41-1 (source) into unstable (gregor herrmann)
  • [2015-08-18] libcatalyst-plugin-session-perl 0.40-1 MIGRATED to testing (Britney)
  • [2015-08-12] Accepted libcatalyst-plugin-session-perl 0.40-1 (source all) into unstable (Lucas Kanashiro) (signed by: gregor herrmann)
  • [2014-05-22] libcatalyst-plugin-session-perl 0.39-2 MIGRATED to testing (Debian testing watch)
  • [2014-05-16] Accepted libcatalyst-plugin-session-perl 0.39-1 (source all) (Damyan Ivanov)
  • [2014-05-16] Accepted libcatalyst-plugin-session-perl 0.39-2 (source all) (Damyan Ivanov)
bugs [bug history graph]
  • all: 2
  • RC: 0
  • I&N: 1
  • M&W: 1
  • F&P: 0
  • patch: 1
links
  • homepage
  • lintian
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 0.43-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing