[Bug 743567] perl-Crypt-DSA: Cryptographically insecure method used for random numbers generation on systems without /dev/random

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=743567

--- Comment #2 from Jan Lieskovsky <jlieskov@xxxxxxxxxx> 2011-10-05 08:08:34 EDT ---
This issue affects the versions of the perl-Crypt-DSA package, as shipped with
Fedora release of 14, 15, and as shipped within EPEL-4, EPEL-5 and EPEL-6
repositories.

Under 'affects' I mean that the relevant code part / fallback is present in the
code. 

Though obviously on Fedora and EPEL systems, the safer /dev/random code branch
would be used for DSA key generation. Thus this deficiency would not show and I
will leave the decision to the perl-Crypt-DSA module developers, if it's worthy
to schedule new Fedora / EPEL updates or not.

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Legacy Announce]     [Fedora PHP Devel]     [Kernel Devel]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Big List of Linux Books]     [Gimp]     [Yosemite Information]
  Powered by Linux