Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-40194

Опубликовано: 10 апр. 2026
Источник: debian
EPSS Низкий

Описание

phpseclib is a PHP secure communications library. Prior to 3.0.51, 2.0.53, and 1.0.28, phpseclib\Net\SSH2::get_binary_packet() uses PHP's != operator to compare a received SSH packet HMAC against the locally computed HMAC. != on equal-length binary strings in PHP uses memcmp(), which short-circuits on the first differing byte. This is a real variable-time comparison (CWE-208), proven by scaling benchmarks. This vulnerability is fixed in 3.0.51, 2.0.53, and 1.0.28.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php-phpseclib3fixed3.0.51-1package
php-phpseclib3no-dsatrixiepackage
php-phpseclib3no-dsabookwormpackage
php-phpseclibfixed2.0.53-1package
php-phpseclibno-dsatrixiepackage
php-phpseclibno-dsabookwormpackage
phpseclibunfixedpackage
phpseclibno-dsatrixiepackage
phpseclibno-dsabookwormpackage
phpseclibpostponedbullseyepackage

Примечания

  • https://github.com/phpseclib/phpseclib/security/advisories/GHSA-r854-jrxh-36qx

  • Fixed by: https://github.com/phpseclib/phpseclib/commit/ffe48b6b1b1af6963327f0a5330e3aa004a194ac (3.0.51, 2.0.53, 1.0.28)

EPSS

Процентиль: 1%
0.0001
Низкий

Связанные уязвимости

CVSS3: 3.7
ubuntu
2 дня назад

phpseclib is a PHP secure communications library. Prior to 3.0.51, 2.0.53, and 1.0.28, phpseclib\Net\SSH2::get_binary_packet() uses PHP's != operator to compare a received SSH packet HMAC against the locally computed HMAC. != on equal-length binary strings in PHP uses memcmp(), which short-circuits on the first differing byte. This is a real variable-time comparison (CWE-208), proven by scaling benchmarks. This vulnerability is fixed in 3.0.51, 2.0.53, and 1.0.28.

CVSS3: 3.7
nvd
5 дней назад

phpseclib is a PHP secure communications library. Prior to 3.0.51, 2.0.53, and 1.0.28, phpseclib\Net\SSH2::get_binary_packet() uses PHP's != operator to compare a received SSH packet HMAC against the locally computed HMAC. != on equal-length binary strings in PHP uses memcmp(), which short-circuits on the first differing byte. This is a real variable-time comparison (CWE-208), proven by scaling benchmarks. This vulnerability is fixed in 3.0.51, 2.0.53, and 1.0.28.

CVSS3: 3.7
github
5 дней назад

phpseclib has a variable-time HMAC comparison in SSH2::get_binary_packet() using != instead of hash_equals()

EPSS

Процентиль: 1%
0.0001
Низкий