Search CVE reports


Toggle filters

21 – 29 of 29 results


CVE-2013-4351

Low priority

Some fixes available 7 of 8

GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection...

2 affected packages

gnupg, gnupg2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
gnupg
gnupg2
Show less packages

CVE-2012-6085

Medium priority

Some fixes available 9 of 10

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash)...

2 affected packages

gnupg, gnupg2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
gnupg
gnupg2
Show less packages

CVE-2010-2547

Medium priority

Some fixes available 4 of 5

Use-after-free vulnerability in kbx/keybox-blob.c in GPGSM in GnuPG 2.x through 2.0.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a certificate with a large number of...

1 affected package

gnupg2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
gnupg2
Show less packages

CVE-2008-1530

Low priority
Not affected

GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers "memory corruption around...

2 affected packages

gnupg, gnupg2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
gnupg
gnupg2
Show less packages

CVE-2007-1263

Medium priority

Some fixes available 23 of 24

GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge...

3 affected packages

gnupg, gnupg2, gpgme1.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
gnupg
gnupg2
gpgme1.0
Show less packages

CVE-2006-6235

Medium priority

Some fixes available 15 of 16

A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function...

2 affected packages

gnupg, gnupg2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
gnupg
gnupg2
Show less packages

CVE-2006-6169

Medium priority

Some fixes available 10 of 11

Heap-based buffer overflow in the ask_outfile_name function in openfile.c for GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow attackers to execute arbitrary code via messages with "C-escape" expansions, which...

2 affected packages

gnupg, gnupg2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
gnupg
gnupg2
Show less packages

CVE-2006-3746

Medium priority

Some fixes available 15 of 16

Integer overflow in parse_comment in GnuPG (gpg) 1.4.4 allows remote attackers to cause a denial of service (segmentation fault) via a crafted message.

2 affected packages

gnupg, gnupg2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
gnupg
gnupg2
Show less packages

CVE-2006-3082

Medium priority

Some fixes available 15 of 16

parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string),...

2 affected packages

gnupg, gnupg2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
gnupg
gnupg2
Show less packages