Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-3349

Опубликовано: 01 фев. 2021
Источник: ubuntu
Приоритет: medium
CVSS2: 2.1
CVSS3: 3.3

Описание

GNOME Evolution through 3.38.3 produces a "Valid signature" message for an unknown identifier on a previously trusted key because Evolution does not retrieve enough information from the GnuPG API. NOTE: third parties dispute the significance of this issue, and dispute whether Evolution is the best place to change this behavior

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

disputed
esm-apps/bionic

not-affected

disputed
esm-apps/focal

not-affected

disputed
esm-apps/jammy

not-affected

disputed
esm-apps/noble

not-affected

disputed
esm-apps/xenial

not-affected

disputed
esm-infra-legacy/trusty

DNE

focal

not-affected

disputed
groovy

ignored

end of life

Показывать по

2.1 Low

CVSS2

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 2.9
redhat
около 5 лет назад

GNOME Evolution through 3.38.3 produces a "Valid signature" message for an unknown identifier on a previously trusted key because Evolution does not retrieve enough information from the GnuPG API. NOTE: third parties dispute the significance of this issue, and dispute whether Evolution is the best place to change this behavior

CVSS3: 3.3
nvd
около 5 лет назад

GNOME Evolution through 3.38.3 produces a "Valid signature" message for an unknown identifier on a previously trusted key because Evolution does not retrieve enough information from the GnuPG API. NOTE: third parties dispute the significance of this issue, and dispute whether Evolution is the best place to change this behavior

CVSS3: 3.3
debian
около 5 лет назад

GNOME Evolution through 3.38.3 produces a "Valid signature" message fo ...

CVSS3: 3.3
github
больше 3 лет назад

** DISPUTED ** GNOME Evolution through 3.38.3 produces a "Valid signature" message for an unknown identifier on a previously trusted key because Evolution does not retrieve enough information from the GnuPG API. NOTE: third parties dispute the significance of this issue, and dispute whether Evolution is the best place to change this behavior.

2.1 Low

CVSS2

3.3 Low

CVSS3