CVE-2016-6313

The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:libgcrypt:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:libgcrypt:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:libgcrypt:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:libgcrypt:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:libgcrypt:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:libgcrypt:1.6.5:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:libgcrypt:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:libgcrypt:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:libgcrypt:1.7.2:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

Configuration 4 (hide)

cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:55

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2016-2674.html - () http://rhn.redhat.com/errata/RHSA-2016-2674.html -
References () http://www.debian.org/security/2016/dsa-3649 - Third Party Advisory () http://www.debian.org/security/2016/dsa-3649 - Third Party Advisory
References () http://www.debian.org/security/2016/dsa-3650 - Third Party Advisory () http://www.debian.org/security/2016/dsa-3650 - Third Party Advisory
References () http://www.securityfocus.com/bid/92527 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/92527 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1036635 - () http://www.securitytracker.com/id/1036635 -
References () http://www.ubuntu.com/usn/USN-3064-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-3064-1 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-3065-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-3065-1 - Third Party Advisory
References () https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=blob_plain%3Bf=NEWS - () https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=blob_plain%3Bf=NEWS -
References () https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html - Mailing List, Vendor Advisory () https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html - Mailing List, Vendor Advisory
References () https://security.gentoo.org/glsa/201610-04 - () https://security.gentoo.org/glsa/201610-04 -
References () https://security.gentoo.org/glsa/201612-01 - () https://security.gentoo.org/glsa/201612-01 -

07 Nov 2023, 02:33

Type Values Removed Values Added
References
  • {'url': 'https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob_plain;f=NEWS', 'name': 'https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob_plain;f=NEWS', 'tags': ['Vendor Advisory'], 'refsource': 'CONFIRM'}
  • () https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=blob_plain%3Bf=NEWS -

Information

Published : 2016-12-13 20:59

Updated : 2024-11-21 02:55


NVD link : CVE-2016-6313

Mitre link : CVE-2016-6313

CVE.ORG link : CVE-2016-6313


JSON object : View

Products Affected

debian

  • debian_linux

canonical

  • ubuntu_linux

gnupg

  • gnupg
  • libgcrypt
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor