Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2008-1530 (GCVE-0-2008-1530)
Vulnerability from cvelistv5 – Published: 2008-03-27 23:00 – Updated: 2024-08-07 08:24- n/a
| URL | Tags |
|---|---|
| http://www.vupen.com/english/advisories/2008/1056… | vdb-entryx_refsource_VUPEN |
| http://lists.gnupg.org/pipermail/gnupg-announce/2… | mailing-listx_refsource_MLIST |
| https://exchange.xforce.ibmcloud.com/vulnerabilit… | vdb-entryx_refsource_XF |
| http://www.ocert.org/advisories/ocert-2008-1.html | x_refsource_MISC |
| http://www.securityfocus.com/bid/28487 | vdb-entryx_refsource_BID |
| https://bugs.g10code.com/gnupg/issue894 | x_refsource_CONFIRM |
| https://bugs.gentoo.org/show_bug.cgi?id=214990 | x_refsource_CONFIRM |
| http://secunia.com/advisories/29568 | third-party-advisoryx_refsource_SECUNIA |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:24:42.576Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2008-1056",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/1056/references"
},
{
"name": "[Announce] 20080326 GnuPG 1.4.9 released",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.gnupg.org/pipermail/gnupg-announce/2008q1/000272.html"
},
{
"name": "gnupg-keys-code-execution(41547)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41547"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.ocert.org/advisories/ocert-2008-1.html"
},
{
"name": "28487",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28487"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugs.g10code.com/gnupg/issue894"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugs.gentoo.org/show_bug.cgi?id=214990"
},
{
"name": "29568",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29568"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-03-27T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers \"memory corruption around deduplication of user IDs.\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-07T12:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2008-1056",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/1056/references"
},
{
"name": "[Announce] 20080326 GnuPG 1.4.9 released",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.gnupg.org/pipermail/gnupg-announce/2008q1/000272.html"
},
{
"name": "gnupg-keys-code-execution(41547)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41547"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.ocert.org/advisories/ocert-2008-1.html"
},
{
"name": "28487",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28487"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugs.g10code.com/gnupg/issue894"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugs.gentoo.org/show_bug.cgi?id=214990"
},
{
"name": "29568",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29568"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-1530",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers \"memory corruption around deduplication of user IDs.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2008-1056",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1056/references"
},
{
"name": "[Announce] 20080326 GnuPG 1.4.9 released",
"refsource": "MLIST",
"url": "http://lists.gnupg.org/pipermail/gnupg-announce/2008q1/000272.html"
},
{
"name": "gnupg-keys-code-execution(41547)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41547"
},
{
"name": "http://www.ocert.org/advisories/ocert-2008-1.html",
"refsource": "MISC",
"url": "http://www.ocert.org/advisories/ocert-2008-1.html"
},
{
"name": "28487",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28487"
},
{
"name": "https://bugs.g10code.com/gnupg/issue894",
"refsource": "CONFIRM",
"url": "https://bugs.g10code.com/gnupg/issue894"
},
{
"name": "https://bugs.gentoo.org/show_bug.cgi?id=214990",
"refsource": "CONFIRM",
"url": "https://bugs.gentoo.org/show_bug.cgi?id=214990"
},
{
"name": "29568",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29568"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-1530",
"datePublished": "2008-03-27T23:00:00.000Z",
"dateReserved": "2008-03-27T00:00:00.000Z",
"dateUpdated": "2024-08-07T08:24:42.576Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2008-1530",
"date": "2026-05-17",
"epss": "0.03697",
"percentile": "0.88066"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.4.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC6150E3-1D7C-44DA-BA57-35AB26F881B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:2.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90B62D8E-3A37-4D7A-B674-06FFD80B86FB\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers \\\"memory corruption around deduplication of user IDs.\\\"\"}, {\"lang\": \"es\", \"value\": \"GnuPG (gpg) 1.4.8 y 2.0.8 permite a atacantes remotos provocar una denegaci\\u00f3n de servicio (ca\\u00edda) y posiblemente ejecutar c\\u00f3digo de su elecci\\u00f3n a trav\\u00e9s de claves duplicadas manipuladas que son importadas de un servidor de claves, lo cual dispara \\\"corrupci\\u00f3n de memoria en torno a la duplicaci\\u00f3n de identificadores de usuario\\\".\\r\\n\"}]",
"id": "CVE-2008-1530",
"lastModified": "2024-11-21T00:44:44.733",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:C/I:C/A:C\", \"baseScore\": 9.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2008-03-27T23:44:00.000",
"references": "[{\"url\": \"http://lists.gnupg.org/pipermail/gnupg-announce/2008q1/000272.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/29568\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.ocert.org/advisories/ocert-2008-1.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/28487\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/1056/references\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://bugs.g10code.com/gnupg/issue894\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://bugs.gentoo.org/show_bug.cgi?id=214990\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/41547\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.gnupg.org/pipermail/gnupg-announce/2008q1/000272.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/29568\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.ocert.org/advisories/ocert-2008-1.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/28487\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/1056/references\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugs.g10code.com/gnupg/issue894\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugs.gentoo.org/show_bug.cgi?id=214990\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/41547\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vendorComments": "[{\"organization\": \"Red Hat\", \"comment\": \"Not vulnerable. This issue does not affect the versions of gnupg packages as shipped with Red Hat Enterprise Linux versions 2.1, 3, 4 or 5.\", \"lastModified\": \"2008-03-28T00:00:00\"}]",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-399\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2008-1530\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-03-27T23:44:00.000\",\"lastModified\":\"2026-04-23T00:35:47.467\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers \\\"memory corruption around deduplication of user IDs.\\\"\"},{\"lang\":\"es\",\"value\":\"GnuPG (gpg) 1.4.8 y 2.0.8 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de claves duplicadas manipuladas que son importadas de un servidor de claves, lo cual dispara \\\"corrupci\u00f3n de memoria en torno a la duplicaci\u00f3n de identificadores de usuario\\\".\\r\\n\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC6150E3-1D7C-44DA-BA57-35AB26F881B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90B62D8E-3A37-4D7A-B674-06FFD80B86FB\"}]}]}],\"references\":[{\"url\":\"http://lists.gnupg.org/pipermail/gnupg-announce/2008q1/000272.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/29568\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.ocert.org/advisories/ocert-2008-1.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/28487\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1056/references\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugs.g10code.com/gnupg/issue894\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugs.gentoo.org/show_bug.cgi?id=214990\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/41547\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.gnupg.org/pipermail/gnupg-announce/2008q1/000272.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/29568\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.ocert.org/advisories/ocert-2008-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/28487\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1056/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugs.g10code.com/gnupg/issue894\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugs.gentoo.org/show_bug.cgi?id=214990\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/41547\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Not vulnerable. This issue does not affect the versions of gnupg packages as shipped with Red Hat Enterprise Linux versions 2.1, 3, 4 or 5.\",\"lastModified\":\"2008-03-28T00:00:00\"}]}}"
}
}
FKIE_CVE-2008-1530
Vulnerability from fkie_nvd - Published: 2008-03-27 23:44 - Updated: 2026-04-23 00:35{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DC6150E3-1D7C-44DA-BA57-35AB26F881B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:2.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "90B62D8E-3A37-4D7A-B674-06FFD80B86FB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers \"memory corruption around deduplication of user IDs.\""
},
{
"lang": "es",
"value": "GnuPG (gpg) 1.4.8 y 2.0.8 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de claves duplicadas manipuladas que son importadas de un servidor de claves, lo cual dispara \"corrupci\u00f3n de memoria en torno a la duplicaci\u00f3n de identificadores de usuario\".\r\n"
}
],
"id": "CVE-2008-1530",
"lastModified": "2026-04-23T00:35:47.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2008-03-27T23:44:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://lists.gnupg.org/pipermail/gnupg-announce/2008q1/000272.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29568"
},
{
"source": "cve@mitre.org",
"url": "http://www.ocert.org/advisories/ocert-2008-1.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/28487"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2008/1056/references"
},
{
"source": "cve@mitre.org",
"url": "https://bugs.g10code.com/gnupg/issue894"
},
{
"source": "cve@mitre.org",
"url": "https://bugs.gentoo.org/show_bug.cgi?id=214990"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41547"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.gnupg.org/pipermail/gnupg-announce/2008q1/000272.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29568"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ocert.org/advisories/ocert-2008-1.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/28487"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/1056/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugs.g10code.com/gnupg/issue894"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugs.gentoo.org/show_bug.cgi?id=214990"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41547"
}
],
"sourceIdentifier": "cve@mitre.org",
"vendorComments": [
{
"comment": "Not vulnerable. This issue does not affect the versions of gnupg packages as shipped with Red Hat Enterprise Linux versions 2.1, 3, 4 or 5.",
"lastModified": "2008-03-28T00:00:00",
"organization": "Red Hat"
}
],
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2008-1530
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2008-1530",
"description": "GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers \"memory corruption around deduplication of user IDs.\"",
"id": "GSD-2008-1530",
"references": [
"https://www.suse.com/security/cve/CVE-2008-1530.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2008-1530"
],
"details": "GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers \"memory corruption around deduplication of user IDs.\"",
"id": "GSD-2008-1530",
"modified": "2023-12-13T01:23:03.411208Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-1530",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers \"memory corruption around deduplication of user IDs.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2008-1056",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1056/references"
},
{
"name": "[Announce] 20080326 GnuPG 1.4.9 released",
"refsource": "MLIST",
"url": "http://lists.gnupg.org/pipermail/gnupg-announce/2008q1/000272.html"
},
{
"name": "gnupg-keys-code-execution(41547)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41547"
},
{
"name": "http://www.ocert.org/advisories/ocert-2008-1.html",
"refsource": "MISC",
"url": "http://www.ocert.org/advisories/ocert-2008-1.html"
},
{
"name": "28487",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28487"
},
{
"name": "https://bugs.g10code.com/gnupg/issue894",
"refsource": "CONFIRM",
"url": "https://bugs.g10code.com/gnupg/issue894"
},
{
"name": "https://bugs.gentoo.org/show_bug.cgi?id=214990",
"refsource": "CONFIRM",
"url": "https://bugs.gentoo.org/show_bug.cgi?id=214990"
},
{
"name": "29568",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29568"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.4.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-1530"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers \"memory corruption around deduplication of user IDs.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.ocert.org/advisories/ocert-2008-1.html",
"refsource": "MISC",
"tags": [],
"url": "http://www.ocert.org/advisories/ocert-2008-1.html"
},
{
"name": "https://bugs.g10code.com/gnupg/issue894",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugs.g10code.com/gnupg/issue894"
},
{
"name": "https://bugs.gentoo.org/show_bug.cgi?id=214990",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugs.gentoo.org/show_bug.cgi?id=214990"
},
{
"name": "28487",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/28487"
},
{
"name": "[Announce] 20080326 GnuPG 1.4.9 released",
"refsource": "MLIST",
"tags": [],
"url": "http://lists.gnupg.org/pipermail/gnupg-announce/2008q1/000272.html"
},
{
"name": "29568",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29568"
},
{
"name": "ADV-2008-1056",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/1056/references"
},
{
"name": "gnupg-keys-code-execution(41547)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41547"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": true
}
},
"lastModifiedDate": "2017-08-08T01:30Z",
"publishedDate": "2008-03-27T23:44Z"
}
}
}
GHSA-9R93-HRX4-H834
Vulnerability from github – Published: 2022-05-01 23:41 – Updated: 2022-05-01 23:41GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers "memory corruption around deduplication of user IDs."
{
"affected": [],
"aliases": [
"CVE-2008-1530"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2008-03-27T23:44:00Z",
"severity": "HIGH"
},
"details": "GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers \"memory corruption around deduplication of user IDs.\"",
"id": "GHSA-9r93-hrx4-h834",
"modified": "2022-05-01T23:41:04Z",
"published": "2022-05-01T23:41:04Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1530"
},
{
"type": "WEB",
"url": "https://bugs.g10code.com/gnupg/issue894"
},
{
"type": "WEB",
"url": "https://bugs.gentoo.org/show_bug.cgi?id=214990"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41547"
},
{
"type": "WEB",
"url": "http://lists.gnupg.org/pipermail/gnupg-announce/2008q1/000272.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/29568"
},
{
"type": "WEB",
"url": "http://www.ocert.org/advisories/ocert-2008-1.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/28487"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/1056/references"
}
],
"schema_version": "1.4.0",
"severity": []
}
CERTA-2008-AVI-172
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans le logiciel GnuPG. Cette vulnérabilité peut être exploitée à distance afin de réaliser un déni de service ou d'exécuter du code arbitraire.
Description
Une vulnérabilité a été découverte dans le logiciel GnuPG. Cette vulnérabilité due à une erreur dans la gestion de clefs, lorsque celles-ci disposent de numéros d'identification dupliqués, provoquant une corruption de la mémoire.
Cette vulnérabilité peut être exploitée par un utilisateur malintentionné afin de réaliser un déni de service, ou d'exécuter du code arbitraire, à partir de la machine, ou via un serveur de clefs distant.
Solution
Mettre à jour vers les versions 1.4.8 ou 2.0.8 (cf. Documentation).
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GnuPG / gpg versions ant\u00e9rieures \u00e0 la version 1.4.9 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "GnuPG / gpg versions ant\u00e9rieures \u00e0 la version 2.0.9.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le logiciel GnuPG. Cette\nvuln\u00e9rabilit\u00e9 due \u00e0 une erreur dans la gestion de clefs, lorsque\ncelles-ci disposent de num\u00e9ros d\u0027identification dupliqu\u00e9s, provoquant\nune corruption de la m\u00e9moire.\n\nCette vuln\u00e9rabilit\u00e9 peut \u00eatre exploit\u00e9e par un utilisateur\nmalintentionn\u00e9 afin de r\u00e9aliser un d\u00e9ni de service, ou d\u0027ex\u00e9cuter du\ncode arbitraire, \u00e0 partir de la machine, ou via un serveur de clefs\ndistant.\n\n## Solution\n\nMettre \u00e0 jour vers les versions 1.4.8 ou 2.0.8 (cf. Documentation).\n",
"cves": [
{
"name": "CVE-2008-1530",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1530"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 de l\u0027oCERT num\u00e9ro 2008-01 :",
"url": "http://www.ocert.org/advisories/ocert-2008-1.html"
},
{
"title": "Annonce de mise \u00e0 jour GnuPG du 26 mars 2008 :",
"url": "ftp://ftp.gnupg.org/gcrypt/gnupg"
},
{
"title": "Annonce de mise \u00e0 jour GnuPG du 26 mars 2008 :",
"url": "http://lists.gnupg.org/pipermail/gnupg-announce/2008q1/000272.html"
}
],
"reference": "CERTA-2008-AVI-172",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-04-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le logiciel GnuPG. Cette\nvuln\u00e9rabilit\u00e9 peut \u00eatre exploit\u00e9e \u00e0 distance afin de r\u00e9aliser un d\u00e9ni de\nservice ou d\u0027ex\u00e9cuter du code arbitraire.\n",
"title": "Vuln\u00e9rabilit\u00e9 du logiciel GnuPG",
"vendor_advisories": [
{
"published_at": null,
"title": "Avis de mise \u00e0 jour GnuPG du 26 mars 2008",
"url": null
}
]
}
CERTA-2008-AVI-172
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans le logiciel GnuPG. Cette vulnérabilité peut être exploitée à distance afin de réaliser un déni de service ou d'exécuter du code arbitraire.
Description
Une vulnérabilité a été découverte dans le logiciel GnuPG. Cette vulnérabilité due à une erreur dans la gestion de clefs, lorsque celles-ci disposent de numéros d'identification dupliqués, provoquant une corruption de la mémoire.
Cette vulnérabilité peut être exploitée par un utilisateur malintentionné afin de réaliser un déni de service, ou d'exécuter du code arbitraire, à partir de la machine, ou via un serveur de clefs distant.
Solution
Mettre à jour vers les versions 1.4.8 ou 2.0.8 (cf. Documentation).
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GnuPG / gpg versions ant\u00e9rieures \u00e0 la version 1.4.9 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "GnuPG / gpg versions ant\u00e9rieures \u00e0 la version 2.0.9.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le logiciel GnuPG. Cette\nvuln\u00e9rabilit\u00e9 due \u00e0 une erreur dans la gestion de clefs, lorsque\ncelles-ci disposent de num\u00e9ros d\u0027identification dupliqu\u00e9s, provoquant\nune corruption de la m\u00e9moire.\n\nCette vuln\u00e9rabilit\u00e9 peut \u00eatre exploit\u00e9e par un utilisateur\nmalintentionn\u00e9 afin de r\u00e9aliser un d\u00e9ni de service, ou d\u0027ex\u00e9cuter du\ncode arbitraire, \u00e0 partir de la machine, ou via un serveur de clefs\ndistant.\n\n## Solution\n\nMettre \u00e0 jour vers les versions 1.4.8 ou 2.0.8 (cf. Documentation).\n",
"cves": [
{
"name": "CVE-2008-1530",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1530"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 de l\u0027oCERT num\u00e9ro 2008-01 :",
"url": "http://www.ocert.org/advisories/ocert-2008-1.html"
},
{
"title": "Annonce de mise \u00e0 jour GnuPG du 26 mars 2008 :",
"url": "ftp://ftp.gnupg.org/gcrypt/gnupg"
},
{
"title": "Annonce de mise \u00e0 jour GnuPG du 26 mars 2008 :",
"url": "http://lists.gnupg.org/pipermail/gnupg-announce/2008q1/000272.html"
}
],
"reference": "CERTA-2008-AVI-172",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-04-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le logiciel GnuPG. Cette\nvuln\u00e9rabilit\u00e9 peut \u00eatre exploit\u00e9e \u00e0 distance afin de r\u00e9aliser un d\u00e9ni de\nservice ou d\u0027ex\u00e9cuter du code arbitraire.\n",
"title": "Vuln\u00e9rabilit\u00e9 du logiciel GnuPG",
"vendor_advisories": [
{
"published_at": null,
"title": "Avis de mise \u00e0 jour GnuPG du 26 mars 2008",
"url": null
}
]
}
OPENSUSE-SU-2024:10815-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "dirmngr-2.2.27-2.4 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the dirmngr-2.2.27-2.4 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10815",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10815-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2006-0455 page",
"url": "https://www.suse.com/security/cve/CVE-2006-0455/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2006-3746 page",
"url": "https://www.suse.com/security/cve/CVE-2006-3746/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2006-6169 page",
"url": "https://www.suse.com/security/cve/CVE-2006-6169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-1530 page",
"url": "https://www.suse.com/security/cve/CVE-2008-1530/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12020 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12020/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-9234 page",
"url": "https://www.suse.com/security/cve/CVE-2018-9234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14855 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25125 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25125/"
}
],
"title": "dirmngr-2.2.27-2.4 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10815-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "dirmngr-2.2.27-2.4.aarch64",
"product": {
"name": "dirmngr-2.2.27-2.4.aarch64",
"product_id": "dirmngr-2.2.27-2.4.aarch64"
}
},
{
"category": "product_version",
"name": "gpg2-2.2.27-2.4.aarch64",
"product": {
"name": "gpg2-2.2.27-2.4.aarch64",
"product_id": "gpg2-2.2.27-2.4.aarch64"
}
},
{
"category": "product_version",
"name": "gpg2-lang-2.2.27-2.4.aarch64",
"product": {
"name": "gpg2-lang-2.2.27-2.4.aarch64",
"product_id": "gpg2-lang-2.2.27-2.4.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "dirmngr-2.2.27-2.4.ppc64le",
"product": {
"name": "dirmngr-2.2.27-2.4.ppc64le",
"product_id": "dirmngr-2.2.27-2.4.ppc64le"
}
},
{
"category": "product_version",
"name": "gpg2-2.2.27-2.4.ppc64le",
"product": {
"name": "gpg2-2.2.27-2.4.ppc64le",
"product_id": "gpg2-2.2.27-2.4.ppc64le"
}
},
{
"category": "product_version",
"name": "gpg2-lang-2.2.27-2.4.ppc64le",
"product": {
"name": "gpg2-lang-2.2.27-2.4.ppc64le",
"product_id": "gpg2-lang-2.2.27-2.4.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "dirmngr-2.2.27-2.4.s390x",
"product": {
"name": "dirmngr-2.2.27-2.4.s390x",
"product_id": "dirmngr-2.2.27-2.4.s390x"
}
},
{
"category": "product_version",
"name": "gpg2-2.2.27-2.4.s390x",
"product": {
"name": "gpg2-2.2.27-2.4.s390x",
"product_id": "gpg2-2.2.27-2.4.s390x"
}
},
{
"category": "product_version",
"name": "gpg2-lang-2.2.27-2.4.s390x",
"product": {
"name": "gpg2-lang-2.2.27-2.4.s390x",
"product_id": "gpg2-lang-2.2.27-2.4.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "dirmngr-2.2.27-2.4.x86_64",
"product": {
"name": "dirmngr-2.2.27-2.4.x86_64",
"product_id": "dirmngr-2.2.27-2.4.x86_64"
}
},
{
"category": "product_version",
"name": "gpg2-2.2.27-2.4.x86_64",
"product": {
"name": "gpg2-2.2.27-2.4.x86_64",
"product_id": "gpg2-2.2.27-2.4.x86_64"
}
},
{
"category": "product_version",
"name": "gpg2-lang-2.2.27-2.4.x86_64",
"product": {
"name": "gpg2-lang-2.2.27-2.4.x86_64",
"product_id": "gpg2-lang-2.2.27-2.4.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "dirmngr-2.2.27-2.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64"
},
"product_reference": "dirmngr-2.2.27-2.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dirmngr-2.2.27-2.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le"
},
"product_reference": "dirmngr-2.2.27-2.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dirmngr-2.2.27-2.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x"
},
"product_reference": "dirmngr-2.2.27-2.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dirmngr-2.2.27-2.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64"
},
"product_reference": "dirmngr-2.2.27-2.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpg2-2.2.27-2.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64"
},
"product_reference": "gpg2-2.2.27-2.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpg2-2.2.27-2.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le"
},
"product_reference": "gpg2-2.2.27-2.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpg2-2.2.27-2.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x"
},
"product_reference": "gpg2-2.2.27-2.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpg2-2.2.27-2.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64"
},
"product_reference": "gpg2-2.2.27-2.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpg2-lang-2.2.27-2.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64"
},
"product_reference": "gpg2-lang-2.2.27-2.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpg2-lang-2.2.27-2.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le"
},
"product_reference": "gpg2-lang-2.2.27-2.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpg2-lang-2.2.27-2.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x"
},
"product_reference": "gpg2-lang-2.2.27-2.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpg2-lang-2.2.27-2.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64"
},
"product_reference": "gpg2-lang-2.2.27-2.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-0455",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2006-0455"
}
],
"notes": [
{
"category": "general",
"text": "gpgv in GnuPG before 1.4.2.1, when using unattended signature verification, returns a 0 exit code in certain cases even when the detached signature file does not carry a signature, which could cause programs that use gpgv to assume that the signature verification has succeeded. Note: this also occurs when running the equivalent command \"gpg --verify\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2006-0455",
"url": "https://www.suse.com/security/cve/CVE-2006-0455"
},
{
"category": "external",
"summary": "SUSE Bug 150742 for CVE-2006-0455",
"url": "https://bugzilla.suse.com/150742"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2006-0455"
},
{
"cve": "CVE-2006-3746",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2006-3746"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in parse_comment in GnuPG (gpg) 1.4.4 allows remote attackers to cause a denial of service (segmentation fault) via a crafted message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2006-3746",
"url": "https://www.suse.com/security/cve/CVE-2006-3746"
},
{
"category": "external",
"summary": "SUSE Bug 195569 for CVE-2006-3746",
"url": "https://bugzilla.suse.com/195569"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2006-3746"
},
{
"cve": "CVE-2006-6169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2006-6169"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the ask_outfile_name function in openfile.c for GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow attackers to execute arbitrary code via messages with \"C-escape\" expansions, which cause the make_printable_string function to return a longer string than expected while constructing a prompt.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2006-6169",
"url": "https://www.suse.com/security/cve/CVE-2006-6169"
},
{
"category": "external",
"summary": "SUSE Bug 224108 for CVE-2006-6169",
"url": "https://bugzilla.suse.com/224108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2006-6169"
},
{
"cve": "CVE-2008-1530",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-1530"
}
],
"notes": [
{
"category": "general",
"text": "GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers \"memory corruption around deduplication of user IDs.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-1530",
"url": "https://www.suse.com/security/cve/CVE-2008-1530"
},
{
"category": "external",
"summary": "SUSE Bug 374254 for CVE-2008-1530",
"url": "https://bugzilla.suse.com/374254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2008-1530"
},
{
"cve": "CVE-2018-12020",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12020"
}
],
"notes": [
{
"category": "general",
"text": "mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the \"--status-fd 2\" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12020",
"url": "https://www.suse.com/security/cve/CVE-2018-12020"
},
{
"category": "external",
"summary": "SUSE Bug 1096745 for CVE-2018-12020",
"url": "https://bugzilla.suse.com/1096745"
},
{
"category": "external",
"summary": "SUSE Bug 1101134 for CVE-2018-12020",
"url": "https://bugzilla.suse.com/1101134"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-12020"
},
{
"cve": "CVE-2018-9234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-9234"
}
],
"notes": [
{
"category": "general",
"text": "GnuPG 2.2.4 and 2.2.5 does not enforce a configuration in which key certification requires an offline master Certify key, which results in apparently valid certifications that occurred only with access to a signing subkey.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-9234",
"url": "https://www.suse.com/security/cve/CVE-2018-9234"
},
{
"category": "external",
"summary": "SUSE Bug 1088255 for CVE-2018-9234",
"url": "https://bugzilla.suse.com/1088255"
},
{
"category": "external",
"summary": "SUSE Bug 1090647 for CVE-2018-9234",
"url": "https://bugzilla.suse.com/1090647"
},
{
"category": "external",
"summary": "SUSE Bug 1217431 for CVE-2018-9234",
"url": "https://bugzilla.suse.com/1217431"
},
{
"category": "external",
"summary": "SUSE Bug 1217437 for CVE-2018-9234",
"url": "https://bugzilla.suse.com/1217437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-9234"
},
{
"cve": "CVE-2019-14855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14855"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14855",
"url": "https://www.suse.com/security/cve/CVE-2019-14855"
},
{
"category": "external",
"summary": "SUSE Bug 1157900 for CVE-2019-14855",
"url": "https://bugzilla.suse.com/1157900"
},
{
"category": "external",
"summary": "SUSE Bug 1160243 for CVE-2019-14855",
"url": "https://bugzilla.suse.com/1160243"
},
{
"category": "external",
"summary": "SUSE Bug 1181233 for CVE-2019-14855",
"url": "https://bugzilla.suse.com/1181233"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-14855"
},
{
"cve": "CVE-2020-25125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25125"
}
],
"notes": [
{
"category": "general",
"text": "GnuPG 2.2.21 and 2.2.22 (and Gpg4win 3.1.12) has an array overflow, leading to a crash or possibly unspecified other impact, when a victim imports an attacker\u0027s OpenPGP key, and this key has AEAD preferences. The overflow is caused by a g10/key-check.c error. NOTE: GnuPG 2.3.x is unaffected. GnuPG 2.2.23 is a fixed version.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25125",
"url": "https://www.suse.com/security/cve/CVE-2020-25125"
},
{
"category": "external",
"summary": "SUSE Bug 1176034 for CVE-2020-25125",
"url": "https://bugzilla.suse.com/1176034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x",
"openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-25125"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.