String::Compare::ConstantTime for Perl through 0.321 is vulnerable to timing attacks that allow an attacker to guess the length of a secret string. As stated in the documentation: "If the lengths of the strings are different, because equals returns false right away the size of the secret string may be leaked (but not its contents)." This is similar to CVE-2020-36829
I think this is not bug because it's a documented behavior. Though I understand that it's desirable to improve the code to remove that problematic feature.
I sent a fix upstream <https://github.com/hoytech/String-Compare-ConstantTime/pull/21>.
FEDORA-2025-ce51c124a5 (perl-String-Compare-ConstantTime-0.321-22.fc42) has been pushed to the Fedora 42 stable repository. If problem still persists, please make note of it in this bug report.
FEDORA-2025-e6f5710dba (perl-String-Compare-ConstantTime-0.321-19.fc40) has been pushed to the Fedora 40 stable repository. If problem still persists, please make note of it in this bug report.
FEDORA-2025-5d61874568 (perl-String-Compare-ConstantTime-0.321-21.fc41) has been pushed to the Fedora 41 stable repository. If problem still persists, please make note of it in this bug report.