From 5fbd97f9cc99b08ebee07dee21cded16c7c2715d Mon Sep 17 00:00:00 2001 From: Vendeta Date: Sat, 16 May 2026 15:44:28 +0300 Subject: [PATCH] Improve GHSA-r2q3-hjc8-7x6q --- .../GHSA-r2q3-hjc8-7x6q.json | 39 ++++++++++++++++--- 1 file changed, 34 insertions(+), 5 deletions(-) diff --git a/advisories/unreviewed/2026/05/GHSA-r2q3-hjc8-7x6q/GHSA-r2q3-hjc8-7x6q.json b/advisories/unreviewed/2026/05/GHSA-r2q3-hjc8-7x6q/GHSA-r2q3-hjc8-7x6q.json index 3a899406a6028..5923b8d20627f 100644 --- a/advisories/unreviewed/2026/05/GHSA-r2q3-hjc8-7x6q/GHSA-r2q3-hjc8-7x6q.json +++ b/advisories/unreviewed/2026/05/GHSA-r2q3-hjc8-7x6q/GHSA-r2q3-hjc8-7x6q.json @@ -1,14 +1,43 @@ { "schema_version": "1.4.0", "id": "GHSA-r2q3-hjc8-7x6q", - "modified": "2026-05-16T03:31:27Z", + "modified": "2026-05-16T03:32:33Z", "published": "2026-05-16T00:31:11Z", "aliases": [ "CVE-2026-8700" ], - "details": "Crypt::DSA versions before 1.20 for Perl generate seeds using rand.\n\nSeeds were generated using Perl's built-in rand function, which is predictable and unsuitable for security usage.", - "severity": [], - "affected": [], + "summary": "Crypt::DSA Uses Predictable Random Number Generator for Seed Generation", + "details": "### Summary\nVersions of the `Crypt::DSA` module for Perl prior to 1.20 generate cryptographic seeds using Perl's built-in `rand()` function. The `rand()` function is a pseudo-random number generator (PRNG) that is deterministic, predictable, and not designed or intended for use in cryptographic contexts.\n\n### Impact\nAn attacker can exploit the predictability of the `rand()` seed generation logic to reproduce or guess the keys generated by the `Crypt::DSA::KeyChain` engine. This significantly decreases the entropy of the resulting Digital Signature Algorithm (DSA) private keys, allowing a remote or local adversary to potentially recover private signing keys, forge signatures, or decrypt intercepted traffic that relies on these keys.\n\n### Remediation\nUpgrade the `Crypt::DSA` Perl module to version **1.20** or later. Version 1.20 replaces the usage of `rand()` with a cryptographically secure random number generator (CSPRNG) interface during internal seed setup.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Packagist", + "name": "Crypt::DSA" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "= 1.20" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "< 1.20" + } + } + ], "references": [ { "type": "ADVISORY", @@ -31,7 +60,7 @@ "cwe_ids": [ "CWE-331" ], - "severity": null, + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-05-15T22:16:57Z"