CVE-2026-47372

NameCVE-2026-47372
DescriptionCrypt::SaltedHash versions through 0.09 for Perl generate insecure random values for salts. These versions use the built-in rand function, which is predictable and unsuitable for cryptography.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libcrypt-saltedhash-perl (PTS)bullseye0.09-1.1vulnerable
forky, bookworm, trixie0.09-3vulnerable
sid0.11-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libcrypt-saltedhash-perlsource(unstable)0.11-1

Notes

https://lists.security.metacpan.org/cve-announce/msg/40252126/
Fixed by: https://github.com/robrwo/perl-Crypt-SaltedHash/commit/9b68437d2cd420b819b3a795474c3870338d38d5 (0.10)

Search for package or bug name: Reporting problems