Security Advisories (3)
Fixed bug involving manually-specified IV not being used in some circumstances.
Crypt::CBC Perl module 2.16 and earlier, when running in RandomIV mode, uses an initialization vector (IV) of 8 bytes, which results in weaker encryption when used with a cipher that requires a larger block size than 8 bytes, such as Rijndael.
- https://metacpan.org/changes/distribution/Crypt-CBC
- http://www.securityfocus.com/bid/16802
- http://secunia.com/advisories/18755
- http://www.debian.org/security/2006/dsa-996
- http://secunia.com/advisories/19187
- http://www.gentoo.org/security/en/glsa/glsa-200603-15.xml
- http://secunia.com/advisories/19303
- http://www.novell.com/linux/security/advisories/2006_38_security.html
- http://secunia.com/advisories/20899
- http://securityreason.com/securityalert/488
- http://www.redhat.com/support/errata/RHSA-2008-0261.html
- http://secunia.com/advisories/31493
- http://rhn.redhat.com/errata/RHSA-2008-0630.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24954
- http://www.securityfocus.com/archive/1/425966/100/0/threaded
Crypt::CBC versions between 1.21 and 3.04 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. This issue affects operating systems where "/dev/urandom'" is unavailable. In that case, Crypt::CBC will fallback to use the insecure rand() function.
Changes for version 2.09 - 2004-05-27
- -Quenched uninitialized variable warnings
Modules
Examples
Other files
Module Install Instructions
To install Crypt::CBC, copy and paste the appropriate command in to your terminal.
cpanm Crypt::CBC
perl -MCPAN -e shell
install Crypt::CBC
For more information on module installation, please visit the detailed CPAN module installation guide.