Debian Package Tracker
Register | Log in
Subscribe

libscram-java

Salted Challenge Response Authentication Mechanism

Choose email to subscribe with

general
  • source: libscram-java (main)
  • version: 3.2-1
  • maintainer: Debian Java Maintainers (archive) (DMD)
  • uploaders: Christoph Berg [DMD]
  • arch: all
  • std-ver: 4.7.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.0.0~beta.2-3
  • oldstable: 2.1-1
  • stable: 3.1-1
  • testing: 3.2-1
  • unstable: 3.2-1
versioned links
  • 1.0.0~beta.2-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.2-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libscram-java
action needed
1 low-priority security issue in trixie low

There is 1 open security issue in trixie.

1 issue left for the package maintainer to handle:
  • CVE-2025-59432: (needs triaging) SCRAM (Salted Challenge Response Authentication Mechanism) is part of the family of Simple Authentication and Security Layer (SASL, RFC 4422) authentication mechanisms. Prior to version 3.2, a timing attack vulnerability exists in the SCRAM Java implementation. The issue arises because Arrays.equals was used to compare secret values such as client proofs and server signatures. Since Arrays.equals performs a short-circuit comparison, the execution time varies depending on how many leading bytes match. This behavior could allow an attacker to perform a timing side-channel attack and potentially infer sensitive authentication material. All users relying on SCRAM authentication are impacted. This vulnerability has been patched in version 3.1 by replacing Arrays.equals with MessageDigest.isEqual, which ensures constant-time comparison.

You can find information about how to handle this issue in the security team's documentation.

Created: 2025-09-23 Last update: 2025-09-29 05:30
1 low-priority security issue in bookworm low

There is 1 open security issue in bookworm.

1 issue left for the package maintainer to handle:
  • CVE-2025-59432: (needs triaging) SCRAM (Salted Challenge Response Authentication Mechanism) is part of the family of Simple Authentication and Security Layer (SASL, RFC 4422) authentication mechanisms. Prior to version 3.2, a timing attack vulnerability exists in the SCRAM Java implementation. The issue arises because Arrays.equals was used to compare secret values such as client proofs and server signatures. Since Arrays.equals performs a short-circuit comparison, the execution time varies depending on how many leading bytes match. This behavior could allow an attacker to perform a timing side-channel attack and potentially infer sensitive authentication material. All users relying on SCRAM authentication are impacted. This vulnerability has been patched in version 3.1 by replacing Arrays.equals with MessageDigest.isEqual, which ensures constant-time comparison.

You can find information about how to handle this issue in the security team's documentation.

Created: 2025-09-23 Last update: 2025-09-29 05:30
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.7.0).
Created: 2025-02-21 Last update: 2025-09-23 23:33
news
[rss feed]
  • [2025-09-29] libscram-java 3.2-1 MIGRATED to testing (Debian testing watch)
  • [2025-09-23] Accepted libscram-java 3.2-1 (source) into unstable (Christoph Berg)
  • [2025-02-15] libscram-java 3.1-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-10] Accepted libscram-java 3.1-1 (source) into unstable (Emmanuel Bourg)
  • [2021-08-21] libscram-java 2.1-1 MIGRATED to testing (Debian testing watch)
  • [2021-04-23] Accepted libscram-java 2.1-1 (source) into unstable (Christoph Berg)
  • [2019-02-28] libscram-java 1.0.0~beta.2-3 MIGRATED to testing (Debian testing watch)
  • [2019-02-18] Accepted libscram-java 1.0.0~beta.2-3 (source) into unstable (Christoph Berg)
  • [2018-06-04] libscram-java 1.0.0~beta.2-2 MIGRATED to testing (Debian testing watch)
  • [2018-05-29] Accepted libscram-java 1.0.0~beta.2-2 (source) into unstable (Christoph Berg)
  • [2018-05-13] libscram-java 1.0.0~beta.2-1 MIGRATED to testing (Debian testing watch)
  • [2018-05-08] Accepted libscram-java 1.0.0~beta.2-1 (source all) into unstable, unstable (Christoph Berg)
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 3.1-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing