CVE-2011-3599

Publication date 10 October 2011

Last updated 24 July 2024


Ubuntu priority

Negligible

Why this priority?

The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine the signing key of a signed message, via a brute-force attack.

Read the notes from the security team

Status

Package Ubuntu Release Status
libcrypt-dsa-perl 11.04 natty Not in release
10.10 maverick Not in release
10.04 LTS lucid Not in release
8.04 LTS hardy Not in release

Notes


sbeattie

all our kernels have /dev/random on them, thus not affected by fallback code