[Bug 743567] CVE-2011-3599 perl-Crypt-DSA: Cryptographically insecure method used for random numbers generation on systems without /dev/random
bugzilla at redhat.com
bugzilla at redhat.com
Tue Sep 3 09:03:03 UTC 2013
https://bugzilla.redhat.com/show_bug.cgi?id=743567
Petr Pisar <ppisar at redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |ppisar at redhat.com
--- Comment #6 from Petr Pisar <ppisar at redhat.com> ---
Does SELinux policy deny access to /dev/random in some cases? If yes, then such
process would be affected.
I can imagine an administrator will confine a third-party application by
assigning a dedicated label to increase security. Because default policy is to
deny, the DSA generation will get doomed.
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=5nPGcPjISh&a=cc_unsubscribe
More information about the perl-devel
mailing list