[Bug 743567] CVE-2011-3599 perl-Crypt-DSA: Cryptographically insecure method used for random numbers generation on systems without /dev/random

bugzilla at redhat.com bugzilla at redhat.com
Tue Sep 3 09:03:03 UTC 2013


https://bugzilla.redhat.com/show_bug.cgi?id=743567

Petr Pisar <ppisar at redhat.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |ppisar at redhat.com



--- Comment #6 from Petr Pisar <ppisar at redhat.com> ---
Does SELinux policy deny access to /dev/random in some cases? If yes, then such
process would be affected.

I can imagine an administrator will confine a third-party application by
assigning a dedicated label to increase security. Because default policy is to
deny, the DSA generation will get doomed.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=5nPGcPjISh&a=cc_unsubscribe



More information about the perl-devel mailing list