{"id":"USN-3064-1","summary":"gnupg vulnerability","details":"Felix Dörre and Vladimir Klebanov discovered that GnuPG incorrectly handled\nmixing functions in the random number generator. An attacker able to obtain\n4640 bits from the RNG can trivially predict the next 160 bits of output.\n","modified":"2026-02-10T04:41:01Z","published":"2016-08-18T18:28:52Z","related":["UBUNTU-CVE-2016-6313"],"upstream":["CVE-2016-6313","UBUNTU-CVE-2016-6313"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3064-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-6313"}],"affected":[{"package":{"name":"gnupg","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/gnupg@1.4.16-1ubuntu2.4?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.16-1ubuntu2.4"}]}],"versions":["1.4.14-1ubuntu2","1.4.15-1.1ubuntu1","1.4.15-1.1ubuntu2","1.4.15-2ubuntu1","1.4.16-1ubuntu1","1.4.16-1ubuntu2","1.4.16-1ubuntu2.1","1.4.16-1ubuntu2.3"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"gnupg","binary_version":"1.4.16-1ubuntu2.4"},{"binary_name":"gnupg-curl","binary_version":"1.4.16-1ubuntu2.4"},{"binary_name":"gpgv","binary_version":"1.4.16-1ubuntu2.4"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3064-1.json","cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"id":"CVE-2016-6313","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]}]}}},{"package":{"name":"gnupg","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/gnupg@1.4.20-1ubuntu3.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.20-1ubuntu3.1"}]}],"versions":["1.4.18-7ubuntu1","1.4.19-6ubuntu1","1.4.20-1ubuntu1","1.4.20-1ubuntu2","1.4.20-1ubuntu3"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"gnupg","binary_version":"1.4.20-1ubuntu3.1"},{"binary_name":"gnupg-curl","binary_version":"1.4.20-1ubuntu3.1"},{"binary_name":"gpgv","binary_version":"1.4.20-1ubuntu3.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3064-1.json","cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"id":"CVE-2016-6313","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.3"}