First published: Tue Dec 13 2016(Updated: )
The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GnuPG Libgcrypt | <=1.5.3 | |
GnuPG Libgcrypt | =1.6.0 | |
GnuPG Libgcrypt | =1.6.1 | |
GnuPG Libgcrypt | =1.6.2 | |
GnuPG Libgcrypt | =1.6.3 | |
GnuPG Libgcrypt | =1.6.4 | |
GnuPG Libgcrypt | =1.6.5 | |
GnuPG Libgcrypt | =1.7.0 | |
GnuPG Libgcrypt | =1.7.1 | |
GnuPG Libgcrypt | =1.7.2 | |
Debian Debian Linux | =8.0 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Gnupg Gnupg | <=1.4.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.