Login
Newsletter
Werbung

Sicherheit: Verwendung unsicherer Zufallszahlen in perl-Crypt-DSA
Aktuelle Meldungen Distributionen
Name: Verwendung unsicherer Zufallszahlen in perl-Crypt-DSA
ID: FEDORA-2013-15755
Distribution: Fedora
Plattformen: Fedora 18
Datum: Fr, 13. September 2013, 08:36
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3599
Applikationen: perl-Crypt-DSA

Originalnachricht

Name        : perl-Crypt-DSA
Product : Fedora 18
Version : 1.17
Release : 10.fc18
URL : http://search.cpan.org/dist/Crypt-DSA/
Summary : Perl module for DSA signatures and key generation
Description :
Crypt::DSA is an implementation of the DSA (Digital Signature Algorithm)
signature verification system. This package provides DSA signing, signature
verification, and key generation.

-------------------------------------------------------------------------------
-
Update Information:

As taught by the '09 Debian PGP disaster relating to DSA, the randomness
source is extremely important. On systems without /dev/random, Crypt::DSA falls back to using Data::Random. Data::Random uses rand(), about which the perldoc says "rand() is not cryptographically secure. You should not rely on it in security-sensitive situations." In the case of DSA, this is even worse. Using improperly secure randomness sources can compromise the signing key upon signature of a message.

See: http://rdist.root.org/2010/11/19/dsa-requirements-for-random-k-value/

It might seem that this would not affect Linux since /dev/random is always
available and so the fall back to Data::Random would never happen. However, if an application is confined using a MAC system such as SELinux then access to /dev/random could be denied by policy and the fall back would be triggered.

-------------------------------------------------------------------------------
-
ChangeLog:

* Tue Sep 3 2013 Paul Howarth <paul@city-fan.org> - 1.17-10
- Remove the ability to fall back to the cryptographically-insecure
Data::Random
instead of using /dev/random (#743567, CPAN RT#71421, CVE-2011-3599)
- Don't need to remove empty directories from the buildroot
* Sat Aug 3 2013 Fedora Release Engineering
<rel-eng@lists.fedoraproject.org> - 1.17-9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild
* Wed Jul 31 2013 Petr Pisar <ppisar@redhat.com> - 1.17-8
- Perl 5.18 rebuild
* Thu Feb 14 2013 Fedora Release Engineering
<rel-eng@lists.fedoraproject.org> - 1.17-7
- Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #743567 - CVE-2011-3599 perl-Crypt-DSA: Cryptographically insecure
method used for random numbers generation on systems without /dev/random
https://bugzilla.redhat.com/show_bug.cgi?id=743567
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update perl-Crypt-DSA' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung