| From: |
| updates@fedoraproject.org |
| To: |
| package-announce@lists.fedoraproject.org |
| Subject: |
| [SECURITY] Fedora 19 Update: perl-Crypt-DSA-1.17-10.fc19 |
| Date: |
| Fri, 13 Sep 2013 01:10:36 +0000 |
| Message-ID: |
| <20130913011036.972032277F@bastion01.phx2.fedoraproject.org> |
| Archive-link: |
| Article, Thread
|
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2013-15786
2013-09-04 23:52:26
--------------------------------------------------------------------------------
Name : perl-Crypt-DSA
Product : Fedora 19
Version : 1.17
Release : 10.fc19
URL : http://search.cpan.org/dist/Crypt-DSA/
Summary : Perl module for DSA signatures and key generation
Description :
Crypt::DSA is an implementation of the DSA (Digital Signature Algorithm)
signature verification system. This package provides DSA signing, signature
verification, and key generation.
--------------------------------------------------------------------------------
Update Information:
As taught by the '09 Debian PGP disaster relating to DSA, the randomness source is extremely
important. On systems without /dev/random, Crypt::DSA falls back to using Data::Random.
Data::Random uses rand(), about which the perldoc says "rand() is not cryptographically secure. You
should not rely on it in security-sensitive situations." In the case of DSA, this is even worse.
Using improperly secure randomness sources can compromise the signing key upon signature of a
message.
See: http://rdist.root.org/2010/11/19/dsa-requirements-for-ran...
It might seem that this would not affect Linux since /dev/random is always available and so the
fall back to Data::Random would never happen. However, if an application is confined using a MAC
system such as SELinux then access to /dev/random could be denied by policy and the fall back would
be triggered.
--------------------------------------------------------------------------------
ChangeLog:
* Tue Sep 3 2013 Paul Howarth <paul@city-fan.org> - 1.17-10
- Remove the ability to fall back to the cryptographically-insecure Data::Random
instead of using /dev/random (#743567, CPAN RT#71421, CVE-2011-3599)
- Don't need to remove empty directories from the buildroot
* Sat Aug 3 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1.17-9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild
* Wed Jul 31 2013 Petr Pisar <ppisar@redhat.com> - 1.17-8
- Perl 5.18 rebuild
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #743567 - CVE-2011-3599 perl-Crypt-DSA: Cryptographically insecure method used for
random numbers generation on systems without /dev/random
https://bugzilla.redhat.com/show_bug.cgi?id=743567
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update perl-Crypt-DSA' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-...
(
Log in to post comments)