First published: Tue Dec 13 2016(Updated: )
The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Libgcrypt | <=1.5.3 | |
GNU Libgcrypt | =1.6.0 | |
GNU Libgcrypt | =1.6.1 | |
GNU Libgcrypt | =1.6.2 | |
GNU Libgcrypt | =1.6.3 | |
GNU Libgcrypt | =1.6.4 | |
GNU Libgcrypt | =1.6.5 | |
GNU Libgcrypt | =1.7.0 | |
GNU Libgcrypt | =1.7.1 | |
GNU Libgcrypt | =1.7.2 | |
Debian Debian Linux | =8.0 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
GnuPG GnuPG | <=1.4.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.