Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-34903

Опубликовано: 01 июл. 2022
Источник: debian
EPSS Низкий

Описание

GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gnupg2fixed2.2.35-3package

Примечания

  • https://dev.gnupg.org/T6027

  • https://www.openwall.com/lists/oss-security/2022/06/30/1

  • https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=34c649b3601383cd11dbc76221747ec16fd68e1b

EPSS

Процентиль: 85%
0.02397
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 3 лет назад

GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.

CVSS3: 5.9
redhat
больше 3 лет назад

GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.

CVSS3: 6.5
nvd
больше 3 лет назад

GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.

CVSS3: 6.5
msrc
больше 3 лет назад

GnuPG through 2.3.6 in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g. use of GPGME) are met allows signature forgery via injection into the status line.

suse-cvrf
больше 3 лет назад

Security update for gpg2

EPSS

Процентиль: 85%
0.02397
Низкий