First published: Wed Oct 05 2011(Updated: )
It has been reported that Crypt::DSA, a Perl module for DSA signatures and key generation, used cryptographically weak / insecure method for random numbers generation on systems, where /dev/random file was not present. Due this flaw an attacker could be able to discover some portions of / whole secret DSA key, which has been created on such system. References: [1] <a href="http://secunia.com/advisories/46275/">http://secunia.com/advisories/46275/</a> [2] <a href="https://rt.cpan.org/Public/Bug/Display.html?id=71421">https://rt.cpan.org/Public/Bug/Display.html?id=71421</a> Proposed upstream patch is to remove the affected fallback code part: [3] <a href="https://rt.cpan.org/Public/Bug/Display.html?id=71421#txn-984052">https://rt.cpan.org/Public/Bug/Display.html?id=71421#txn-984052</a> (though not approved yet)
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/perl-Crypt-DSA-1.17 | <10. | 10. |
Adam Kennedy Crypt-dsa | <=1.17 | |
Adam Kennedy Crypt-dsa | =0.01 | |
Adam Kennedy Crypt-dsa | =0.02 | |
Adam Kennedy Crypt-dsa | =0.03 | |
Adam Kennedy Crypt-dsa | =0.10 | |
Adam Kennedy Crypt-dsa | =0.11 | |
Adam Kennedy Crypt-dsa | =0.12 | |
Adam Kennedy Crypt-dsa | =0.13 | |
Adam Kennedy Crypt-dsa | =0.14 | |
Adam Kennedy Crypt-dsa | =0.15_01 | |
Adam Kennedy Crypt-dsa | =1.16 | |
Perl Perl |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.