Security Advisories (1)
CVE-2018-25107

In versions prior to 0.13, rand could be used as a result of calling get_weak, or get, if no random device was available. This implies that not explicitly asking for get_strong on a non POSIX operating system (e.g. Win32 without the Win32 backend) could have resulted in non cryptographically random data.

NAME

Crypt::Random::Source::Base::Proc - Base class for helper processes (e.g. openssl)

SYNOPSIS

use Moose;

extends qw(Crypt::Random::Source::Base::Proc);

has '+command' => ( default => ... );

DESCRIPTION

This is a base class for using command line utilities which output random data on STDOUT as Crypt::Random::Source objects.

METHODS

command

An array reference or string that is the command to run.

open_handle

Opens a pipe for reading using command.