Latest gnupg gnupg Vulnerabilities

A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specia...
Gnupg Libksba<1.6.3
Gpg4win Gpg4win>=2.0.0<4.1.0
Gnupg Vs-desktop>=3.1.16<3.1.26
Gnupg Gnupg>=2.1.0<2.2.41
Gnupg Gnupg>=2.3.0<2.4.0
redhat/libksba<0:1.3.0-6.el7_9
and 5 more
GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB; see $URL and the surrounding email...
Gnupg Gnupg
GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery v...
debian/gnupg2
Gnupg Gnupg<=2.3.6
Fedoraproject Fedora=35
Fedoraproject Fedora=36
Debian Debian Linux=10.0
Debian Debian Linux=11.0
and 2 more
GnuPG 2.2.21 and 2.2.22 (and Gpg4win 3.1.12) has an array overflow, leading to a crash or possibly unspecified other impact, when a victim imports an attacker's OpenPGP key, and this key has AEAD pref...
Gnupg Gnupg=2.2.21
Gnupg Gnupg=2.2.22
Gpg4win Gpg4win=3.1.12
A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issu...
ubuntu/gnupg2<2.2.4-1ubuntu1.3
ubuntu/gnupg2<2.2.19-1
<2.2.18
=30
=31
=18.04
and 6 more
Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determin...
Gnupg Gnupg<1.4.19
GnuPG Libgcrypt<1.6.3
Debian Debian Linux=7.0
Debian Debian Linux=8.0
The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during mod...
Gnupg Gnupg<1.4.19
GnuPG Libgcrypt<1.6.3
Debian Debian Linux=7.0
Debian Debian Linux=8.0
dirmngr before 2.1.0 improperly handles certain system calls, which allows remote attackers to cause a denial of service (DOS) via a specially-crafted certificate.
Gnupg Gnupg<2.1.0
Redhat Enterprise Linux=6.0
Debian Debian Linux=8.0
debian/dirmngr
The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.
Gnupg Gnupg<2.1.2
Debian Debian Linux=7.0
Debian Debian Linux=8.0
kbx/keybox-search.c in GnuPG before 1.4.19, 2.0.x before 2.0.27, and 2.1.x before 2.1.2 does not properly handle bitwise left-shifts, which allows remote attackers to cause a denial of service (invali...
Gnupg Gnupg<1.4.19
Gnupg Gnupg>=2.0<2.0.27
Gnupg Gnupg>=2.1.0<2.1.2
Canonical Ubuntu Linux=10.04
Canonical Ubuntu Linux=12.04
Canonical Ubuntu Linux=14.04
and 1 more
Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the ...
Gnupg Gnupg<=2.2.16
Sks Keyserver Project Sks Keyserver<=1.2.0
Fedoraproject Fedora=29
Fedoraproject Fedora=30
openSUSE Leap=15.0
openSUSE Leap=15.1
and 1 more
GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be ex...
debian/gnupg1
debian/gnupg2
Gnupg Gnupg>=2.1.12<=2.2.11
Canonical Ubuntu Linux=18.04
Canonical Ubuntu Linux=18.10
ubuntu/gnupg2<2.2.12-1
and 2 more
GnuPG before version 2.2.8 does not properly sanitize original filenames of signed or encrypted messages allowing for the insertion of line feeds and other control characters. An attacker could exploi...
Redhat Enterprise Linux Desktop=6.0
Redhat Enterprise Linux Desktop=7.0
Redhat Enterprise Linux Server=6.0
Redhat Enterprise Linux Server=7.0
Redhat Enterprise Linux Server Aus=7.6
Redhat Enterprise Linux Server Eus=7.5
and 44 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203