Medium severity5.3NVD Advisory· Published Dec 13, 2016· Updated May 6, 2026
CVE-2016-6313
CVE-2016-6313
Description
The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.
Affected products
15cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*+ 9 more
- cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*range: <=1.5.3
- cpe:2.3:a:gnupg:libgcrypt:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:libgcrypt:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:libgcrypt:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:libgcrypt:1.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:libgcrypt:1.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:libgcrypt:1.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:libgcrypt:1.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:libgcrypt:1.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:libgcrypt:1.7.2:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*+ 2 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- www.debian.org/security/2016/dsa-3649nvdThird Party Advisory
- www.debian.org/security/2016/dsa-3650nvdThird Party Advisory
- www.securityfocus.com/bid/92527nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-3064-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-3065-1nvdThird Party Advisory
- lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.htmlnvdMailing ListVendor Advisory
- rhn.redhat.com/errata/RHSA-2016-2674.htmlnvd
- www.securitytracker.com/id/1036635nvd
- security.gentoo.org/glsa/201610-04nvd
- security.gentoo.org/glsa/201612-01nvd
News mentions
0No linked articles in our index yet.