Description
The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-600-1 | libgcrypt11 security update |
Debian DLA |
DLA-602-1 | gnupg security and hardening update |
Debian DSA |
DSA-3649-1 | gnupg security update |
Debian DSA |
DSA-3650-1 | libgcrypt20 security update |
EUVD |
EUVD-2016-7242 | The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits. |
Ubuntu USN |
USN-3064-1 | GnuPG vulnerability |
Ubuntu USN |
USN-3065-1 | Libgcrypt vulnerability |
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T01:29:18.219Z
Reserved: 2016-07-26T00:00:00.000Z
Link: CVE-2016-6313
No data.
Status : Deferred
Published: 2016-12-13T20:59:04.267
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-6313
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN