Sicherheit: Verwendung unsicherer Zufallszahlen in perl-Crypt-DSA
Aktuelle Meldungen Distributionen
Name: Verwendung unsicherer Zufallszahlen in perl-Crypt-DSA
ID: FEDORA-2013-15786
Distribution: Fedora
Plattformen: Fedora 19
Datum: Fr, 13. September 2013, 08:36
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3599
Applikationen: perl-Crypt-DSA


Name        : perl-Crypt-DSA
Product : Fedora 19
Version : 1.17
Release : 10.fc19
URL : http://search.cpan.org/dist/Crypt-DSA/
Summary : Perl module for DSA signatures and key generation
Description :
Crypt::DSA is an implementation of the DSA (Digital Signature Algorithm)
signature verification system. This package provides DSA signing, signature
verification, and key generation.

Update Information:

As taught by the '09 Debian PGP disaster relating to DSA, the randomness
source is extremely important. On systems without /dev/random, Crypt::DSA falls back to using Data::Random. Data::Random uses rand(), about which the perldoc says "rand() is not cryptographically secure. You should not rely on it in security-sensitive situations." In the case of DSA, this is even worse. Using improperly secure randomness sources can compromise the signing key upon signature of a message.

See: http://rdist.root.org/2010/11/19/dsa-requirements-for-random-k-value/

It might seem that this would not affect Linux since /dev/random is always
available and so the fall back to Data::Random would never happen. However, if an application is confined using a MAC system such as SELinux then access to /dev/random could be denied by policy and the fall back would be triggered.


* Tue Sep 3 2013 Paul Howarth <paul@city-fan.org> - 1.17-10
- Remove the ability to fall back to the cryptographically-insecure
instead of using /dev/random (#743567, CPAN RT#71421, CVE-2011-3599)
- Don't need to remove empty directories from the buildroot
* Sat Aug 3 2013 Fedora Release Engineering
<rel-eng@lists.fedoraproject.org> - 1.17-9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild
* Wed Jul 31 2013 Petr Pisar <ppisar@redhat.com> - 1.17-8
- Perl 5.18 rebuild

[ 1 ] Bug #743567 - CVE-2011-3599 perl-Crypt-DSA: Cryptographically insecure
method used for random numbers generation on systems without /dev/random

This update can be installed with the "yum" update program. Use
su -c 'yum update perl-Crypt-DSA' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list
Traut euch!
Neue Nachrichten