{"id":"CVE-2016-6313","details":"The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.","modified":"2026-03-20T11:12:42.606131Z","published":"2016-12-13T20:59:04.267Z","related":["MGASA-2016-0292","SUSE-SU-2016:2345-1","SUSE-SU-2016:2346-1","SUSE-SU-2017:2699-1","SUSE-SU-2017:2700-1","openSUSE-SU-2024:10037-1"],"references":[{"type":"WEB","url":"http://www.securitytracker.com/id/1036635"},{"type":"WEB","url":"https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=blob_plain%3Bf=NEWS"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3065-1"},{"type":"ADVISORY","url":"https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201610-04"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3649"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3064-1"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201612-01"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2674.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3650"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/92527"}],"affected":[{"ranges":[{"type":"GIT","repo":"git://git.gnupg.org/libgcrypt.git","events":[{"introduced":"0"},{"last_affected":"a3eabcb6e97a88031f8fd56b7b650447cdda4206"},{"introduced":"0"},{"last_affected":"0ea9731e1c93a962f6266004ab0e7418c19d6277"},{"introduced":"0"},{"last_affected":"8804b9ae40e8dd81ee46e18581da79cef7a4eaea"},{"introduced":"0"},{"last_affected":"b3936b691abddb835d17f279a57171d7589b9c6b"},{"introduced":"0"},{"last_affected":"0ff1a27a5ca2d99fc7a0f21aec093a0fdea10f8a"},{"introduced":"0"},{"last_affected":"72e8c2715dff99b63ef3c1541ae0dbfee4e99410"},{"introduced":"0"},{"last_affected":"92b33b9e3f016c83646f2e9360a403c853d48551"},{"introduced":"0"},{"last_affected":"795f9cb090c776658a0e3117996e3fb7e2ebd94a"},{"introduced":"0"},{"last_affected":"48aa6d6602564d6ba0cef10cf08f9fb0c59b3223"},{"introduced":"0"},{"last_affected":"be0bec7d9208b2f2d2ffce9cc2ca6154853e7e59"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.5.3"},{"introduced":"0"},{"last_affected":"1.6.0"},{"introduced":"0"},{"last_affected":"1.6.1"},{"introduced":"0"},{"last_affected":"1.6.2"},{"introduced":"0"},{"last_affected":"1.6.3"},{"introduced":"0"},{"last_affected":"1.6.4"},{"introduced":"0"},{"last_affected":"1.6.5"},{"introduced":"0"},{"last_affected":"1.7.0"},{"introduced":"0"},{"last_affected":"1.7.1"},{"introduced":"0"},{"last_affected":"1.7.2"}]}}],"versions":["DEVEL-BRANCH-1-1","V-0-2-8","V0-0-0","V0-1-0","V0-2-0","V0-2-10","V0-2-15","V0-2-17","V0-2-18","V0-2-19","V0-2-6","V0-3-0","V0-3-1","V0-3-2","V0-3-3","V0-3-4","V0-3-5","V0-4-0","V0-4-1","V0-4-2","V0-4-3","V0-4-4","V0-4-5","V0-9-0","V0-9-1","V0-9-10","V0-9-11","V0-9-2","V0-9-3","V0-9-4","V0-9-5","V0-9-6","V0-9-7","V0-9-8","V0-9-9","V1-0-0","V1-0-1","V1-0-1-ePit-1","V1-0-2","V1-0-3","V1-0-4","V1-1-0","V1-1-10","V1-1-11","V1-1-12","V1-1-2","V1-1-3","V1-1-4","V1-1-42","V1-1-43","V1-1-44","V1-1-5","V1-1-6","V1-1-7","V1-1-8","V1-1-9","V1-1-90","V1-1-91","V1-1-92","V1-1-93","V1-1-94","V1-2-0","V1-2-1","ecc-integration-done","last-gpl-version","libgcrypt-1.3.0","libgcrypt-1.3.1","libgcrypt-1.3.2","libgcrypt-1.4.0","libgcrypt-1.4.1","libgcrypt-1.4.1rc1","libgcrypt-1.4.2","libgcrypt-1.4.2rc1","libgcrypt-1.4.2rc2","libgcrypt-1.4.3","libgcrypt-1.4.4","libgcrypt-1.5.0","libgcrypt-1.5.0-beta1","libgcrypt-1.5.1","libgcrypt-1.5.2","libgcrypt-1.5.3","libgcrypt-1.6.0","marcus-after-thread-cbs","marcus-before-thread-cbs","now-less-freedom-protected","post-nuke-of-trailing-ws"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-6313.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"1.4.14"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}]}