The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-600-1 | libgcrypt11 security update |
Debian DLA |
DLA-602-1 | gnupg security and hardening update |
Debian DSA |
DSA-3649-1 | gnupg security update |
Debian DSA |
DSA-3650-1 | libgcrypt20 security update |
EUVD |
EUVD-2016-7242 | The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits. |
Ubuntu USN |
USN-3064-1 | GnuPG vulnerability |
Ubuntu USN |
USN-3065-1 | Libgcrypt vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T01:29:18.219Z
Reserved: 2016-07-26T00:00:00
Link: CVE-2016-6313
No data.
Status : Deferred
Published: 2016-12-13T20:59:04.267
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-6313
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN