Описание
ELSA-2016-2674: libgcrypt security update (MODERATE)
[1.5.3-13.1]
- fix CVE-2016-6313 - predictable PRNG output (#1366105)
[1.5.3-13]
- touch only urandom in the selftest and when /dev/random is unavailable for example by SELinux confinement
- fix the RSA selftest key (p q swap)
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
libgcrypt
1.4.5-12.el6_8
libgcrypt-devel
1.4.5-12.el6_8
Oracle Linux i686
libgcrypt
1.4.5-12.el6_8
libgcrypt-devel
1.4.5-12.el6_8
Oracle Linux sparc64
libgcrypt
1.4.5-12.el6_8
libgcrypt-devel
1.4.5-12.el6_8
Oracle Linux 7
Oracle Linux x86_64
libgcrypt
1.5.3-13.el7_3.1
libgcrypt-devel
1.5.3-13.el7_3.1
Связанные CVE
Связанные уязвимости
The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.
The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.
The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.
The mixing functions in the random number generator in Libgcrypt befor ...