Bug#1102147: libnet-dropbox-api-perl: CVE-2024-58036

Salvatore Bonaccorso carnil at debian.org
Sat Apr 5 19:06:06 BST 2025


Source: libnet-dropbox-api-perl
Version: 1.9-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>

Hi,

The following vulnerability was published for libnet-dropbox-api-perl.

CVE-2024-58036[0]:
| Net::Dropbox::API 1.9 and earlier for Perl uses the rand() function
| as the default source of entropy, which is not cryptographically
| secure, for cryptographic functions.  Specifically Net::Dropbox::API
| uses the Data::Random library which specifically states that it is
| "Useful mostly for test programs". Data::Random uses the rand()
| function.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-58036
    https://www.cve.org/CVERecord?id=CVE-2024-58036
[1] https://lists.security.metacpan.org/cve-announce/msg/28504518/

Regards,
Salvatore



More information about the pkg-perl-maintainers mailing list