Security Advisories (1)
CVE-2018-25107

In versions prior to 0.13, rand could be used as a result of calling get_weak, or get, if no random device was available. This implies that not explicitly asking for get_strong on a non POSIX operating system (e.g. Win32 without the Win32 backend) could have resulted in non cryptographically random data.

NAME

Crypt::Random::Source::Base::RandomDevice - Base class for random devices

SYNOPSIS

use Moose;

extends qw(Crypt::Random::Source::Base::RandomDevice);

sub default_path { "/dev/myrandom" }

DESCRIPTION

This is a base class for random device sources.

See Crypt::Random::Source::Strong::devrandom and Crypt::Random::Source::Weak::devurandom for actual implementations.

AUTHOR

Yuval Kogman <nothingmuch@woobling.org>

COPYRIGHT AND LICENSE

This software is copyright (c) 2011 by Yuval Kogman.

This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself.