First published: Fri Jun 17 2005(Updated: )
The send_pinentry_environment function in asshelp.c in gpg2 on SUSE Linux 9.3 does not properly handle certain options, which can prevent pinentry from being found and causes S/MIME signing to fail.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =9.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2023 is classified as a security vulnerability that can impact S/MIME signing operations.
To fix CVE-2005-2023, update to a version of GPG that properly handles the options in the send_pinentry_environment function.
CVE-2005-2023 affects GPG2 on SUSE Linux version 9.3.
CVE-2005-2023 can cause pinentry to not be found, resulting in the failure of S/MIME signing.
There may not be a reliable workaround for CVE-2005-2023, and the best course of action is to apply the recommended updates.