CPANSA-Smolder-2024-58041: Smolder vulnerability

Publisher giterlizzi Document category csaf_security_advisory
Initial release date 2026-02-24T00:00:00 Engine CSAF Perl Toolkit 0.26
Current release date 2026-02-24T00:00:00 Build Date
Current version 1 Status final
CVSS v3.1 Base Score 9.1 Severity
Original language Language en
Also referred to

Vulnerability Description

Smolder versions through 1.51 for Perl uses insecure rand() function for cryptographic functions. Smolder 1.51 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically Smolder::DB::Developer uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function.

Vulnerabilities

CVE-2024-58041

Vulnerability Description

Smolder versions through 1.51 for Perl uses insecure rand() function for cryptographic functions.

Smolder 1.51 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.

Specifically Smolder::DB::Developer uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function.

Weakness CWE-338 : Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

Product status

Known affected
Product Score
Smolder greater than 0
CVSS Version CVSS Vector CVSS Base Score CVSS Base Severity
3.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N 9.1 Critical

giterlizzi

Namespace: https://github.com/giterlizzi/

gdt@cpan.org

References

Revision history

Version Date of the revision Summary of the revision
1 Tue Feb 24 00:00:00 2026 First release

Sharing rules

TLP:WHITE
For the TLP version see: https://www.first.org/tlp/