Data::Entropy for Perl 0.007 and earlier use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-4100-1 libdata-entropy-perl security update
EUVD EUVD EUVD-2025-8533 Data::Entropy for Perl 0.007 and earlier use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.
Fixes

Solution

Version 0.008 was released to address the issue and this module has been marked as deprecated. Users should upgrade and plan to migrate to a different module.


Workaround

No workaround given by the vendor.

History

Fri, 05 Sep 2025 13:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-331

Mon, 12 May 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 02 Apr 2025 22:45:00 +0000

Type Values Removed Values Added
References

Fri, 28 Mar 2025 01:15:00 +0000

Type Values Removed Values Added
Description Data::Entropy for Perl 0.007 and earlier use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.
Title Data::Entropy for Perl uses insecure rand() function for cryptographic functions
Weaknesses CWE-338
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2025-09-05T13:20:15.508Z

Reserved: 2025-03-03T00:08:28.075Z

Link: CVE-2025-1860

cve-icon Vulnrichment

Updated: 2025-04-02T22:03:16.908Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-03-28T01:15:16.063

Modified: 2025-09-05T14:15:43.357

Link: CVE-2025-1860

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses