CVE-2025-27552 Affecting libdbix-class-encodedcolumn-perl package, versions <0.00020-3


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-LIBDBIXCLASSENCODEDCOLUMNPERL-9519406
  • published27 Mar 2025
  • disclosed26 Mar 2025

Introduced: 26 Mar 2025

NewCVE-2025-27552  (opens in a new tab)

How to fix?

Upgrade Debian:unstable libdbix-class-encodedcolumn-perl to version 0.00020-3 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libdbix-class-encodedcolumn-perl package and not the libdbix-class-encodedcolumn-perl package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

DBIx::Class::EncodedColumn use the rand() function, which is not cryptographically secure to salt password hashes.

This vulnerability is associated with program files Crypt/Eksblowfish/Bcrypt.pm.

This issue affects DBIx::Class::EncodedColumn until 0.00032.