{"id":"UBUNTU-CVE-2016-6313","details":"The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.","modified":"2026-02-04T04:00:48.244498Z","published":"2016-08-17T00:00:00Z","related":["USN-3064-1","USN-3065-1"],"upstream":["CVE-2016-6313"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-6313"},{"type":"REPORT","url":"https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3065-1"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3064-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2016-6313"}],"affected":[{"package":{"name":"gnupg","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/gnupg@1.4.16-1ubuntu2.4?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.16-1ubuntu2.4"}]}],"versions":["1.4.14-1ubuntu2","1.4.15-1.1ubuntu1","1.4.15-1.1ubuntu2","1.4.15-2ubuntu1","1.4.16-1ubuntu1","1.4.16-1ubuntu2","1.4.16-1ubuntu2.1","1.4.16-1ubuntu2.3"],"ecosystem_specific":{"binaries":[{"binary_version":"1.4.16-1ubuntu2.4","binary_name":"gnupg"},{"binary_version":"1.4.16-1ubuntu2.4","binary_name":"gnupg-curl"},{"binary_version":"1.4.16-1ubuntu2.4","binary_name":"gpgv"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-6313.json"}},{"package":{"name":"libgcrypt11","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/libgcrypt11@1.5.3-2ubuntu4.4?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.5.3-2ubuntu4.4"}]}],"versions":["1.5.0-3ubuntu3","1.5.3-2ubuntu1","1.5.3-2ubuntu4","1.5.3-2ubuntu4.1","1.5.3-2ubuntu4.2","1.5.3-2ubuntu4.3"],"ecosystem_specific":{"binaries":[{"binary_version":"1.5.3-2ubuntu4.4","binary_name":"libgcrypt11"},{"binary_version":"1.5.3-2ubuntu4.4","binary_name":"libgcrypt11-dev"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-6313.json"}},{"package":{"name":"gnupg","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/gnupg@1.4.20-1ubuntu3.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.20-1ubuntu3.1"}]}],"versions":["1.4.18-7ubuntu1","1.4.19-6ubuntu1","1.4.20-1ubuntu1","1.4.20-1ubuntu2","1.4.20-1ubuntu3"],"ecosystem_specific":{"binaries":[{"binary_version":"1.4.20-1ubuntu3.1","binary_name":"gnupg"},{"binary_version":"1.4.20-1ubuntu3.1","binary_name":"gnupg-curl"},{"binary_version":"1.4.20-1ubuntu3.1","binary_name":"gpgv"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-6313.json"}},{"package":{"name":"libgcrypt20","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/libgcrypt20@1.6.5-2ubuntu0.2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.6.5-2ubuntu0.2"}]}],"versions":["1.6.3-2ubuntu1","1.6.4-3","1.6.4-4","1.6.4-5","1.6.5-2"],"ecosystem_specific":{"binaries":[{"binary_version":"1.5.4-3+really1.6.5-2ubuntu0.2","binary_name":"libgcrypt11-dev"},{"binary_version":"1.6.5-2ubuntu0.2","binary_name":"libgcrypt20"},{"binary_version":"1.6.5-2ubuntu0.2","binary_name":"libgcrypt20-dev"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-6313.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"high"}]}