The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-600-1 | libgcrypt11 security update |
![]() |
DLA-602-1 | gnupg security and hardening update |
![]() |
DSA-3649-1 | gnupg security update |
![]() |
DSA-3650-1 | libgcrypt20 security update |
![]() |
EUVD-2016-7242 | The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits. |
![]() |
USN-3064-1 | GnuPG vulnerability |
![]() |
USN-3065-1 | Libgcrypt vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 13 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T01:29:18.219Z
Reserved: 2016-07-26T00:00:00
Link: CVE-2016-6313

No data.

Status : Deferred
Published: 2016-12-13T20:59:04.267
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-6313


No data.