Search for packages
| purl | pkg:deb/debian/gnupg2@0?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-4fcw-qdwc-4ycd | security update |
CVE-2014-9087
|
| VCID-5tpu-zawb-f3as | Due to a design flaw, the output of GnuPG's Random Number Generator (RNG) is predictable. |
CVE-2016-6313
|
| VCID-79fy-gfr6-zkgq | GnuPG: GnuPG: Stack-based buffer overflow in tpm2daemon allows arbitrary code execution |
CVE-2026-24882
|
| VCID-bfu8-pr4x-guek | gnupg: AEAD preference list overflow |
CVE-2020-25125
|
| VCID-bwr1-kgn5-27f7 | GnuPG may erroneously report a modified or unsigned message has a valid digital signature. |
CVE-2006-0049
|
| VCID-j4gx-2342-mkdv | Applications relying on GnuPG to authenticate digital signatures may incorrectly believe a signature has been verified. |
CVE-2006-0455
|
| VCID-k6h1-5v39-jfeb | GnuPG: GnuPG: Remote code execution and denial of service via crafted CMS EnvelopedData message |
CVE-2026-24881
|
| VCID-sbp2-xwuf-wbgc | GnuPG: GnuPG: Denial of service due to specially crafted signature packet |
CVE-2026-24883
|
| VCID-xcyv-byj5-8fb3 | security update |
CVE-2017-7526
|