First published: Tue Dec 13 2016(Updated: )
The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libgcrypt | <=1.5.3 | |
Libgcrypt | =1.6.0 | |
Libgcrypt | =1.6.1 | |
Libgcrypt | =1.6.2 | |
Libgcrypt | =1.6.3 | |
Libgcrypt | =1.6.4 | |
Libgcrypt | =1.6.5 | |
Libgcrypt | =1.7.0 | |
Libgcrypt | =1.7.1 | |
Libgcrypt | =1.7.2 | |
Debian | =8.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
GnuPG 2 (Gnu Privacy Guard) | <=1.4.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6313 is classified as a medium severity vulnerability due to its potential to weaken cryptographic processes.
To fix CVE-2016-6313, update Libgcrypt to version 1.5.6, 1.6.6 or later, or 1.7.3 or later.
CVE-2016-6313 affects Libgcrypt versions before 1.5.6, all 1.6.x versions before 1.6.6, and all 1.7.x versions before 1.7.3.
CVE-2016-6313 allows attackers to potentially predict random values generated by the random number generator, weakening security.
Yes, GnuPG versions before 1.4.21 are also affected by CVE-2016-6313 and should be updated.