Security Advisories (1)
CVE-2018-25107

In versions prior to 0.13, rand could be used as a result of calling get_weak, or get, if no random device was available. This implies that not explicitly asking for get_strong on a non POSIX operating system (e.g. Win32 without the Win32 backend) could have resulted in non cryptographically random data.

NAME

Crypt::Random::Source::Base::RandomDevice - Base class for random devices

SYNOPSIS

use Moose;

extends qw(Crypt::Random::Source::Base::RandomDevice);

sub default_path { "/dev/myrandom" }

DESCRIPTION

This is a base class for random device sources.

See Crypt::Random::Source::Strong::devrandom and Crypt::Random::Source::Weak::devurandom for actual implementations.