vulnerability

Oracle Linux: CVE-2016-6313: ELSA-2016-2674: libgcrypt security update (MODERATE) (Multiple Advisories)

Severity
4
CVSS
(AV:N/AC:H/Au:N/C:P/I:P/A:N)
Published
Aug 17, 2016
Added
Nov 9, 2016
Modified
Dec 6, 2024

Description

The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.
A design flaw was found in the libgcrypt PRNG (Pseudo-Random Number Generator). An attacker able to obtain the first 580 bytes of the PRNG output could predict the following 20 bytes.

Solution(s)

oracle-linux-upgrade-libgcryptoracle-linux-upgrade-libgcrypt-devel
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.