Search for packages
Package details: pkg:deb/debian/gnupg1@1.4.23-1
purl pkg:deb/debian/gnupg1@1.4.23-1
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-7hrs-wfbd-bbcf libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used. CVE-2017-7526
VCID-p6xn-vjxt-3qcu mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes. CVE-2018-12020

Date Actor Action Vulnerability Source VulnerableCode Version
2025-08-01T19:14:43.093979+00:00 Debian Oval Importer Fixing VCID-p6xn-vjxt-3qcu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:20:16.247609+00:00 Debian Oval Importer Fixing VCID-7hrs-wfbd-bbcf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0