0.007 Low
EPSS
Percentile
80.6%
A design flaw was found in the libgcrypt PRNG (Pseudo-Random Number Generator). An attacker able to obtain the first 580 bytes of the PRNG output could predict the following 20 bytes.
bugzilla.redhat.com/show_bug.cgi?id=1366105
lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html