LWN.net Logo

Mageia alert MGASA-2013-0289 (perl-Crypt-DSA)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2013-0289: Updated perl-Crypt-DSA package fixes security vulnerability
Date:  Tue, 24 Sep 2013 23:40:57 +0200
Message-ID:  <20130924214057.82EC55B13F@valstar.mageia.org>
Archive-link:  Article, Thread

MGASA-2013-0289 - Updated perl-Crypt-DSA package fixes security vulnerability Publication date: 24 Sep 2013 URL: http://advisories.mageia.org/MGASA-2013-0289.html Type: security Affected Mageia releases: 2, 3 CVE: CVE-2011-3599 Description: The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine the signing key of a signed message, via a brute-force attack (CVE-2011-3599). This update removes the fallback to Data::Random. References: - https://bugs.mageia.org/show_bug.cgi?id=11226 - https://lists.fedoraproject.org/pipermail/package-announc... - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3599 SRPMS: - 3/core/perl-Crypt-DSA-1.170.0-2.1.mga3 - 2/core/perl-Crypt-DSA-1.170.0-1.1.mga2


(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds