Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Version 0.008 was released to address the issue and this module has been marked as deprecated. Users should upgrade and plan to migrate to a different module.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4100-1 | libdata-entropy-perl security update |
EUVD |
EUVD-2025-8533 | Data::Entropy for Perl 0.007 and earlier use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. |
Fri, 05 Sep 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-331 |
Mon, 12 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 02 Apr 2025 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 28 Mar 2025 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Data::Entropy for Perl 0.007 and earlier use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. | |
| Title | Data::Entropy for Perl uses insecure rand() function for cryptographic functions | |
| Weaknesses | CWE-338 | |
| References |
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2025-09-05T13:20:15.508Z
Reserved: 2025-03-03T00:08:28.075Z
Link: CVE-2025-1860
Updated: 2025-04-02T22:03:16.908Z
Status : Deferred
Published: 2025-03-28T01:15:16.063
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-1860
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD