Bug 2374378 (CVE-2025-6547) - CVE-2025-6547 pbkdf2: pbkdf2 silently returns static keys
Summary: CVE-2025-6547 pbkdf2: pbkdf2 silently returns static keys
Keywords:
Status: NEW
Alias: CVE-2025-6547
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL: https://github.com/browserify/pbkdf2/...
Whiteboard:
Depends On: 2374429 2374430 2374434 2374438 2374444 2374446 2374450 2374456 2374458 2374462 2374428 2374432 2374436 2374440 2374442 2374448 2374452 2374454 2374460
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-06-23 20:01 UTC by OSIDB Bzimport
Modified: 2025-06-24 12:33 UTC (History)
56 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-06-23 20:01:37 UTC
Improper Input Validation vulnerability in pbkdf2 allows Signature Spoofing by Improper Validation.This issue affects pbkdf2: <=3.1.2.

Comment 2 Petr Pisar 2025-06-24 07:06:53 UTC
The "pbkdf2: <=3.1.2" refers to pbkdf2 NPM package <https://github.com/browserify/pbkdf2>.

Comment 3 Petr Pisar 2025-06-24 07:30:32 UTC
This CVE-2025-6547 is about ignoring a password and a salt passed to a PBKDF2 function and returning a value as if an empty password and empty salt were given.

perl-PBKDF2-Tiny-0.005 is not affected:

$ perl -Ilib -MPBKDF2::Tiny=derive -e 'print derive(q{SHA-1}, q{password}, q{salt})' | hexdump -C
00000000  6e 88 be 8b ad 7e ae 9d  9e 10 aa 06 12 24 03 4f  |n....~.......$.O|
00000010  ed 48 d0 3f                                       |.H.?|
00000014
$ perl -Ilib -MPBKDF2::Tiny=derive -e 'print derive(q{SHA-1}, q{}, q{})' | hexdump -C
00000000  6e 40 91 0a c0 2e c8 9c  eb b9 d8 98 b1 3a 09 d1  |n@...........:..|
00000010  cd 7a df 6f                                       |.z.o|
00000014

What happens if no password or salt argument is specified:

$ perl -Ilib -MPBKDF2::Tiny=derive -e 'print derive(q{SHA-1})' | hexdump -C
00000000  6e 40 91 0a c0 2e c8 9c  eb b9 d8 98 b1 3a 09 d1  |n@...........:..|
00000010  cd 7a df 6f                                       |.z.o|
00000014

is documented in PBKDF2::Tiny:

    If a password or salt are not provided, they default to the empty
    string, so don't do that!


Note You need to log in before you can comment on or make changes to this bug.