Debian Package Tracker
Register | Log in
Subscribe

libcrypt-urandom-perl

module that provides non blocking randomness

Choose email to subscribe with

general
  • source: libcrypt-urandom-perl (main)
  • version: 0.55-1
  • maintainer: Debian Perl Group (archive) (DMD) (LowNMU)
  • uploaders: Alexandre Mestiashvili [DMD]
  • arch: any
  • std-ver: 4.7.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 0.36-1.1
  • oldstable: 0.36-3
  • stable: 0.54-1
  • testing: 0.55-1
  • unstable: 0.55-1
versioned links
  • 0.36-1.1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.36-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.54-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.55-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libcrypt-urandom-perl (1 bugs: 0, 0, 1, 0)
action needed
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2026-02-20 Last update: 2026-03-01 07:17
1 low-priority security issue in trixie low

There is 1 open security issue in trixie.

1 issue left for the package maintainer to handle:
  • CVE-2026-2474: (needs triaging) Crypt::URandom versions from 0.41 before 0.55 for Perl is vulnerable to a heap buffer overflow in the XS function crypt_urandom_getrandom(). The function does not validate that the length parameter is non-negative. If a negative value (e.g. -1) is supplied, the expression length + 1u causes an integer wraparound, resulting in a zero-byte allocation. The subsequent call to getrandom(data, length, GRND_NONBLOCK) passes the original negative value, which is implicitly converted to a large unsigned value (typically SIZE_MAX). This can result in writes beyond the allocated buffer, leading to heap memory corruption and application crash (denial of service). In common usage, the length argument is typically hardcoded by the caller, which reduces the likelihood of attacker-controlled exploitation. Applications that pass untrusted input to this parameter may be affected.

You can find information about how to handle this issue in the security team's documentation.

Created: 2026-02-17 Last update: 2026-02-19 06:00
news
[rss feed]
  • [2026-02-19] libcrypt-urandom-perl 0.55-1 MIGRATED to testing (Debian testing watch)
  • [2026-02-16] Accepted libcrypt-urandom-perl 0.55-1 (source) into unstable (Samuel Young) (signed by: gregor herrmann)
  • [2025-03-25] libcrypt-urandom-perl 0.54-1 MIGRATED to testing (Debian testing watch)
  • [2025-03-22] Accepted libcrypt-urandom-perl 0.54-1 (source) into unstable (gregor herrmann)
  • [2025-02-24] libcrypt-urandom-perl 0.53-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-15] Accepted libcrypt-urandom-perl 0.53-1 (source) into unstable (gregor herrmann)
  • [2025-02-07] libcrypt-urandom-perl 0.52-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-01] Accepted libcrypt-urandom-perl 0.52-1 (source) into unstable (gregor herrmann)
  • [2024-03-06] libcrypt-urandom-perl 0.40-1 MIGRATED to testing (Debian testing watch)
  • [2024-03-06] libcrypt-urandom-perl 0.40-1 MIGRATED to testing (Debian testing watch)
  • [2024-03-02] Accepted libcrypt-urandom-perl 0.40-1 (source) into unstable (gregor herrmann)
  • [2023-10-29] libcrypt-urandom-perl 0.39-1 MIGRATED to testing (Debian testing watch)
  • [2023-10-26] Accepted libcrypt-urandom-perl 0.39-1 (source) into unstable (gregor herrmann)
  • [2022-10-24] libcrypt-urandom-perl 0.36-3 MIGRATED to testing (Debian testing watch)
  • [2022-10-22] Accepted libcrypt-urandom-perl 0.36-3 (source) into unstable (Jelmer Vernooij) (signed by: Jelmer Vernooij)
  • [2022-06-17] libcrypt-urandom-perl 0.36-2 MIGRATED to testing (Debian testing watch)
  • [2022-06-12] Accepted libcrypt-urandom-perl 0.36-2 (source) into unstable (Jelmer Vernooij) (signed by: Jelmer Vernooij)
  • [2021-01-05] libcrypt-urandom-perl 0.36-1.1 MIGRATED to testing (Debian testing watch)
  • [2021-01-02] Accepted libcrypt-urandom-perl 0.36-1.1 (source) into unstable (Holger Levsen)
  • [2015-07-04] libcrypt-urandom-perl 0.36-1 MIGRATED to testing (Britney)
  • [2015-06-28] Accepted libcrypt-urandom-perl 0.36-1 (source all) into unstable (gregor herrmann)
  • [2015-06-01] libcrypt-urandom-perl 0.35-1 MIGRATED to testing (Britney)
  • [2015-05-26] Accepted libcrypt-urandom-perl 0.35-1 (source all) into unstable (Alexandre Mestiashvili) (signed by: gregor herrmann)
  • [2013-06-05] libcrypt-urandom-perl 0.34-1 MIGRATED to testing (Debian testing watch)
  • [2013-05-25] Accepted libcrypt-urandom-perl 0.34-1 (source all) (Alexandre Mestiashvili) (signed by: gregor herrmann)
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 0
  • M&W: 1
  • F&P: 0
  • patch: 1
links
  • homepage
  • lintian
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 0.54-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing