drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Verwendung unsicherer Zufallszahlen in perl-Crypt-DSA
Name: |
Verwendung unsicherer Zufallszahlen in perl-Crypt-DSA |
|
ID: |
FEDORA-2013-15755 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 18 |
|
Datum: |
Fr, 13. September 2013, 08:36 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3599 |
|
Applikationen: |
perl-Crypt-DSA |
|
Originalnachricht |
Name : perl-Crypt-DSA Product : Fedora 18 Version : 1.17 Release : 10.fc18 URL : http://search.cpan.org/dist/Crypt-DSA/ Summary : Perl module for DSA signatures and key generation Description : Crypt::DSA is an implementation of the DSA (Digital Signature Algorithm) signature verification system. This package provides DSA signing, signature verification, and key generation.
------------------------------------------------------------------------------- - Update Information:
As taught by the '09 Debian PGP disaster relating to DSA, the randomness source is extremely important. On systems without /dev/random, Crypt::DSA falls back to using Data::Random. Data::Random uses rand(), about which the perldoc says "rand() is not cryptographically secure. You should not rely on it in security-sensitive situations." In the case of DSA, this is even worse. Using improperly secure randomness sources can compromise the signing key upon signature of a message.
See: http://rdist.root.org/2010/11/19/dsa-requirements-for-random-k-value/
It might seem that this would not affect Linux since /dev/random is always available and so the fall back to Data::Random would never happen. However, if an application is confined using a MAC system such as SELinux then access to /dev/random could be denied by policy and the fall back would be triggered.
------------------------------------------------------------------------------- - ChangeLog:
* Tue Sep 3 2013 Paul Howarth <paul@city-fan.org> - 1.17-10 - Remove the ability to fall back to the cryptographically-insecure Data::Random instead of using /dev/random (#743567, CPAN RT#71421, CVE-2011-3599) - Don't need to remove empty directories from the buildroot * Sat Aug 3 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1.17-9 - Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild * Wed Jul 31 2013 Petr Pisar <ppisar@redhat.com> - 1.17-8 - Perl 5.18 rebuild * Thu Feb 14 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1.17-7 - Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #743567 - CVE-2011-3599 perl-Crypt-DSA: Cryptographically insecure method used for random numbers generation on systems without /dev/random https://bugzilla.redhat.com/show_bug.cgi?id=743567 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update perl-Crypt-DSA' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|