LWN.net Logo

Fedora alert FEDORA-2013-15786 (perl-Crypt-DSA)

From:  updates@fedoraproject.org
To:  package-announce@lists.fedoraproject.org
Subject:  [SECURITY] Fedora 19 Update: perl-Crypt-DSA-1.17-10.fc19
Date:  Fri, 13 Sep 2013 01:10:36 +0000
Message-ID:  <20130913011036.972032277F@bastion01.phx2.fedoraproject.org>
Archive-link:  Article, Thread

-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2013-15786 2013-09-04 23:52:26 -------------------------------------------------------------------------------- Name : perl-Crypt-DSA Product : Fedora 19 Version : 1.17 Release : 10.fc19 URL : http://search.cpan.org/dist/Crypt-DSA/ Summary : Perl module for DSA signatures and key generation Description : Crypt::DSA is an implementation of the DSA (Digital Signature Algorithm) signature verification system. This package provides DSA signing, signature verification, and key generation. -------------------------------------------------------------------------------- Update Information: As taught by the '09 Debian PGP disaster relating to DSA, the randomness source is extremely important. On systems without /dev/random, Crypt::DSA falls back to using Data::Random. Data::Random uses rand(), about which the perldoc says "rand() is not cryptographically secure. You should not rely on it in security-sensitive situations." In the case of DSA, this is even worse. Using improperly secure randomness sources can compromise the signing key upon signature of a message. See: http://rdist.root.org/2010/11/19/dsa-requirements-for-ran... It might seem that this would not affect Linux since /dev/random is always available and so the fall back to Data::Random would never happen. However, if an application is confined using a MAC system such as SELinux then access to /dev/random could be denied by policy and the fall back would be triggered. -------------------------------------------------------------------------------- ChangeLog: * Tue Sep 3 2013 Paul Howarth <paul@city-fan.org> - 1.17-10 - Remove the ability to fall back to the cryptographically-insecure Data::Random instead of using /dev/random (#743567, CPAN RT#71421, CVE-2011-3599) - Don't need to remove empty directories from the buildroot * Sat Aug 3 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1.17-9 - Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild * Wed Jul 31 2013 Petr Pisar <ppisar@redhat.com> - 1.17-8 - Perl 5.18 rebuild -------------------------------------------------------------------------------- References: [ 1 ] Bug #743567 - CVE-2011-3599 perl-Crypt-DSA: Cryptographically insecure method used for random numbers generation on systems without /dev/random https://bugzilla.redhat.com/show_bug.cgi?id=743567 -------------------------------------------------------------------------------- This update can be installed with the "yum" update program. Use su -c 'yum update perl-Crypt-DSA' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/. All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-...


(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds