Debian Package Tracker
Register | Log in
Subscribe

libcrypt-urandom-perl

module that provides non blocking randomness

Choose email to subscribe with

general
  • source: libcrypt-urandom-perl (main)
  • version: 0.55-1
  • maintainer: Debian Perl Group (archive) (DMD) (LowNMU)
  • uploaders: Alexandre Mestiashvili [DMD]
  • arch: any
  • std-ver: 4.7.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 0.36-1.1
  • oldstable: 0.36-3
  • stable: 0.54-1
  • testing: 0.54-1
  • unstable: 0.55-1
versioned links
  • 0.36-1.1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.36-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.54-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.55-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libcrypt-urandom-perl
action needed
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2026-2474: Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap buffer overflow in the XS function crypt_urandom_getrandom(). The function does not validate that the length parameter is non-negative. If a negative value (e.g. -1) is supplied, the expression length + 1u causes an integer wraparound, resulting in a zero-byte allocation. The subsequent call to getrandom(data, length, GRND_NONBLOCK) passes the original negative value, which is implicitly converted to a large unsigned value (typically SIZE_MAX). This can result in writes beyond the allocated buffer, leading to heap memory corruption and application crash (denial of service). In common usage, the length argument is typically hardcoded by the caller, which reduces the likelihood of attacker-controlled exploitation. Applications that pass untrusted input to this parameter may be affected.
Created: 2026-02-17 Last update: 2026-02-17 07:31
1 low-priority security issue in trixie low

There is 1 open security issue in trixie.

1 issue left for the package maintainer to handle:
  • CVE-2026-2474: (needs triaging) Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap buffer overflow in the XS function crypt_urandom_getrandom(). The function does not validate that the length parameter is non-negative. If a negative value (e.g. -1) is supplied, the expression length + 1u causes an integer wraparound, resulting in a zero-byte allocation. The subsequent call to getrandom(data, length, GRND_NONBLOCK) passes the original negative value, which is implicitly converted to a large unsigned value (typically SIZE_MAX). This can result in writes beyond the allocated buffer, leading to heap memory corruption and application crash (denial of service). In common usage, the length argument is typically hardcoded by the caller, which reduces the likelihood of attacker-controlled exploitation. Applications that pass untrusted input to this parameter may be affected.

You can find information about how to handle this issue in the security team's documentation.

Created: 2026-02-17 Last update: 2026-02-17 07:31
testing migrations
  • excuses:
    • Migration status for libcrypt-urandom-perl (0.54-1 to 0.55-1): Waiting for test results or another package, or too young (no action required now - check later)
    • Issues preventing migration:
    • ∙ ∙ Autopkgtest for lemonldap-ng/2.22.2+ds-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Autopkgtest for libapache-session-perl/1.94-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Autopkgtest for libauthen-sasl-perl/2.2000-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Autopkgtest for libauthen-scram-perl/0.011-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Autopkgtest for libauthen-webauthn-perl/0.005-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Autopkgtest for libbson-perl/1.12.2-3: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, riscv64: Failed (not a regression) ♻ (reference ♻), s390x: Test triggered
    • ∙ ∙ Autopkgtest for libcrypt-cbc-perl/3.07-1: amd64: Pass, arm64: Pass, i386: Failed (not a regression) ♻ (reference ♻), ppc64el: Test triggered, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Autopkgtest for libcrypt-dsa-perl/1.19-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Autopkgtest for libcrypt-urandom-perl/0.55-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Autopkgtest for libcrypt-urandom-token-perl/0.005-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Autopkgtest for libdancer2-perl/1.1.2+dfsg-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Autopkgtest for libdata-entropy-perl/0.008-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Autopkgtest for libdbix-class-encodedcolumn-perl/0.00020-3: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Autopkgtest for libfirefox-marionette-perl/1.70-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, riscv64: Failed (not a regression) ♻ (reference ♻), s390x: Test triggered
    • ∙ ∙ Autopkgtest for libnet-dropbox-api-perl/1.9-3: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Autopkgtest for libnet-oauth-perl/0.31-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Autopkgtest for libsession-storage-secure-perl/1.000-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Autopkgtest for libuuid-urandom-perl/0.001-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Too young, only 0 of 5 days old
    • Additional info (not blocking):
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/libc/libcrypt-urandom-perl.html
    • ∙ ∙ Reproducible on amd64
    • ∙ ∙ Reproducible on arm64
    • ∙ ∙ Reproducible on armhf
    • ∙ ∙ Reproducible on i386
    • ∙ ∙ Reproducibility check waiting for results on ppc64el
    • Not considered
news
[rss feed]
  • [2026-02-16] Accepted libcrypt-urandom-perl 0.55-1 (source) into unstable (Samuel Young) (signed by: gregor herrmann)
  • [2025-03-25] libcrypt-urandom-perl 0.54-1 MIGRATED to testing (Debian testing watch)
  • [2025-03-22] Accepted libcrypt-urandom-perl 0.54-1 (source) into unstable (gregor herrmann)
  • [2025-02-24] libcrypt-urandom-perl 0.53-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-15] Accepted libcrypt-urandom-perl 0.53-1 (source) into unstable (gregor herrmann)
  • [2025-02-07] libcrypt-urandom-perl 0.52-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-01] Accepted libcrypt-urandom-perl 0.52-1 (source) into unstable (gregor herrmann)
  • [2024-03-06] libcrypt-urandom-perl 0.40-1 MIGRATED to testing (Debian testing watch)
  • [2024-03-06] libcrypt-urandom-perl 0.40-1 MIGRATED to testing (Debian testing watch)
  • [2024-03-02] Accepted libcrypt-urandom-perl 0.40-1 (source) into unstable (gregor herrmann)
  • [2023-10-29] libcrypt-urandom-perl 0.39-1 MIGRATED to testing (Debian testing watch)
  • [2023-10-26] Accepted libcrypt-urandom-perl 0.39-1 (source) into unstable (gregor herrmann)
  • [2022-10-24] libcrypt-urandom-perl 0.36-3 MIGRATED to testing (Debian testing watch)
  • [2022-10-22] Accepted libcrypt-urandom-perl 0.36-3 (source) into unstable (Jelmer Vernooij) (signed by: Jelmer Vernooij)
  • [2022-06-17] libcrypt-urandom-perl 0.36-2 MIGRATED to testing (Debian testing watch)
  • [2022-06-12] Accepted libcrypt-urandom-perl 0.36-2 (source) into unstable (Jelmer Vernooij) (signed by: Jelmer Vernooij)
  • [2021-01-05] libcrypt-urandom-perl 0.36-1.1 MIGRATED to testing (Debian testing watch)
  • [2021-01-02] Accepted libcrypt-urandom-perl 0.36-1.1 (source) into unstable (Holger Levsen)
  • [2015-07-04] libcrypt-urandom-perl 0.36-1 MIGRATED to testing (Britney)
  • [2015-06-28] Accepted libcrypt-urandom-perl 0.36-1 (source all) into unstable (gregor herrmann)
  • [2015-06-01] libcrypt-urandom-perl 0.35-1 MIGRATED to testing (Britney)
  • [2015-05-26] Accepted libcrypt-urandom-perl 0.35-1 (source all) into unstable (Alexandre Mestiashvili) (signed by: gregor herrmann)
  • [2013-06-05] libcrypt-urandom-perl 0.34-1 MIGRATED to testing (Debian testing watch)
  • [2013-05-25] Accepted libcrypt-urandom-perl 0.34-1 (source all) (Alexandre Mestiashvili) (signed by: gregor herrmann)
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 0.54-1
  • 1 bug

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing