Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-34903

Опубликовано: 01 июл. 2022
Источник: debian
EPSS Низкий

Описание

GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gnupg2fixed2.2.35-3package

Примечания

  • https://dev.gnupg.org/T6027

  • https://www.openwall.com/lists/oss-security/2022/06/30/1

  • https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=34c649b3601383cd11dbc76221747ec16fd68e1b

EPSS

Процентиль: 77%
0.0112
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
почти 3 года назад

GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.

CVSS3: 5.9
redhat
почти 3 года назад

GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.

CVSS3: 6.5
nvd
почти 3 года назад

GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.

CVSS3: 6.5
msrc
почти 3 года назад

Описание отсутствует

suse-cvrf
почти 3 года назад

Security update for gpg2

EPSS

Процентиль: 77%
0.0112
Низкий