Количество 17
Количество 17
CVE-2018-12020
mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.
CVE-2018-12020
mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.
CVE-2018-12020
mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.
CVE-2018-12020
mainproc.c in GnuPG before 2.2.8 mishandles the original filename duri ...
openSUSE-SU-2018:1724-1
Security update for gpg2
openSUSE-SU-2018:1722-1
Security update for python-python-gnupg
SUSE-SU-2018:1814-1
Security update for gpg2
SUSE-SU-2018:1698-2
Security update for gpg2
SUSE-SU-2018:1698-1
Security update for gpg2
SUSE-SU-2018:1696-1
Security update for gpg2
GHSA-678p-6r6j-65f9
mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.
ELSA-2018-2181
ELSA-2018-2181: gnupg2 security update (IMPORTANT)
ELSA-2018-2180
ELSA-2018-2180: gnupg2 security update (IMPORTANT)
BDU:2019-00237
Уязвимость процесса mainproc.c программы шифрования информации и создания электронных цифровых подписей GNU Privacy Guard, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
openSUSE-SU-2018:1708-1
Security update for enigmail
openSUSE-SU-2018:1706-1
Security update for enigmail
SUSE-SU-2018:2243-1
Security update for enigmail
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2018-12020 mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes. | CVSS3: 7.5 | 2% Низкий | больше 7 лет назад | |
CVE-2018-12020 mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes. | CVSS3: 7.5 | 2% Низкий | больше 7 лет назад | |
CVE-2018-12020 mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes. | CVSS3: 7.5 | 2% Низкий | больше 7 лет назад | |
CVE-2018-12020 mainproc.c in GnuPG before 2.2.8 mishandles the original filename duri ... | CVSS3: 7.5 | 2% Низкий | больше 7 лет назад | |
openSUSE-SU-2018:1724-1 Security update for gpg2 | 2% Низкий | больше 7 лет назад | ||
openSUSE-SU-2018:1722-1 Security update for python-python-gnupg | 2% Низкий | больше 7 лет назад | ||
SUSE-SU-2018:1814-1 Security update for gpg2 | 2% Низкий | больше 7 лет назад | ||
SUSE-SU-2018:1698-2 Security update for gpg2 | 2% Низкий | около 7 лет назад | ||
SUSE-SU-2018:1698-1 Security update for gpg2 | 2% Низкий | больше 7 лет назад | ||
SUSE-SU-2018:1696-1 Security update for gpg2 | 2% Низкий | больше 7 лет назад | ||
GHSA-678p-6r6j-65f9 mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes. | CVSS3: 7.5 | 2% Низкий | больше 3 лет назад | |
ELSA-2018-2181 ELSA-2018-2181: gnupg2 security update (IMPORTANT) | больше 7 лет назад | |||
ELSA-2018-2180 ELSA-2018-2180: gnupg2 security update (IMPORTANT) | больше 7 лет назад | |||
BDU:2019-00237 Уязвимость процесса mainproc.c программы шифрования информации и создания электронных цифровых подписей GNU Privacy Guard, позволяющая нарушителю оказать воздействие на целостность защищаемой информации | CVSS3: 7.5 | 2% Низкий | больше 7 лет назад | |
openSUSE-SU-2018:1708-1 Security update for enigmail | больше 7 лет назад | |||
openSUSE-SU-2018:1706-1 Security update for enigmail | больше 7 лет назад | |||
SUSE-SU-2018:2243-1 Security update for enigmail | больше 7 лет назад |
Уязвимостей на страницу