CVE-2024-57868

NameCVE-2024-57868
DescriptionWeb::API 2.8 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically Web::API uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1102148

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libweb-api-perl (PTS)bullseye2.7-1vulnerable
bookworm2.7-2vulnerable
sid, trixie2.8-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libweb-api-perlsource(unstable)(unfixed)1102148

Notes

https://lists.security.metacpan.org/cve-announce/msg/28503730/

Search for package or bug name: Reporting problems