Design flaw in libgcrypt PRNG allows prediction of PRNG output
Reporter | Title | Published | Views | Family All 116 |
---|---|---|---|---|
![]() | Security fix for the ALT Linux 8 package gnupg version 1.4.21-alt1 | 28 Mar 201700:00 | – | altlinux |
![]() | Debian DLA-600-1 : libgcrypt11 security update | 24 Aug 201600:00 | – | nessus |
![]() | Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / 14.2 / current : libgcrypt (SSA:2016-236-02) | 24 Aug 201600:00 | – | nessus |
![]() | openSUSE Security Update : libgcrypt (openSUSE-2016-1042) | 1 Sep 201600:00 | – | nessus |
![]() | GLSA-201612-01 : GnuPG: RNG output is predictable | 5 Dec 201600:00 | – | nessus |
![]() | Fedora 23 : gnupg (2016-3a0195918f) | 15 Sep 201600:00 | – | nessus |
![]() | RHEL 6 / 7 : libgcrypt (RHSA-2016:2674) | 8 Nov 201600:00 | – | nessus |
![]() | Debian DLA-602-1 : gnupg security and hardening update | 30 Aug 201600:00 | – | nessus |
![]() | openSUSE Security Update : libgcrypt (openSUSE-2016-1138) | 3 Oct 201600:00 | – | nessus |
![]() | Fedora 25 : libgcrypt (2016-b66a0aef08) | 15 Nov 201600:00 | – | nessus |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo