Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4100-1 | libdata-entropy-perl security update |
EUVD |
EUVD-2025-8533 | Data::Entropy for Perl 0.007 and earlier use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. |
Solution
Version 0.008 was released to address the issue and this module has been marked as deprecated. Users should upgrade and plan to migrate to a different module.
Workaround
No workaround given by the vendor.
Fri, 05 Sep 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-331 |
Mon, 12 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 02 Apr 2025 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 28 Mar 2025 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Data::Entropy for Perl 0.007 and earlier use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. | |
| Title | Data::Entropy for Perl uses insecure rand() function for cryptographic functions | |
| Weaknesses | CWE-338 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2025-09-05T13:20:15.508Z
Reserved: 2025-03-03T00:08:28.075Z
Link: CVE-2025-1860
Updated: 2025-04-02T22:03:16.908Z
Status : Awaiting Analysis
Published: 2025-03-28T01:15:16.063
Modified: 2025-09-05T14:15:43.357
Link: CVE-2025-1860
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD