The mixing functions in the random number generator in Libgcrypt prior to 1.5.6, 1.6.x prior to 1.6.6, and 1.7.x prior to 1.7.3 and GnuPG prior to 1.4.21 make it easier for malicious users to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
gnupg libgcrypt 1.6.1 |
||
gnupg libgcrypt 1.7.0 |
||
gnupg libgcrypt 1.7.2 |
||
gnupg libgcrypt |
||
gnupg libgcrypt 1.6.3 |
||
gnupg libgcrypt 1.6.4 |
||
gnupg libgcrypt 1.6.2 |
||
gnupg libgcrypt 1.7.1 |
||
gnupg libgcrypt 1.6.5 |
||
gnupg libgcrypt 1.6.0 |
||
debian debian linux 8.0 |
||
canonical ubuntu linux 12.04 |
||
canonical ubuntu linux 16.04 |
||
canonical ubuntu linux 14.04 |
||
gnupg gnupg |