Search for packages
| purl | pkg:deb/debian/gnupg@1.4.9-3%2Blenny1 |
| Next non-vulnerable version | 1.4.18-7+deb8u5 |
| Latest non-vulnerable version | 1.4.18-7+deb8u5 |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-1zf7-khmk-6kax
Aliases: CVE-2013-4242 |
Affected by 7 other vulnerabilities. |
|
|
VCID-7czy-2y37-d7bg
Aliases: CVE-2013-4402 |
Affected by 7 other vulnerabilities. |
|
|
VCID-7hrs-wfbd-bbcf
Aliases: CVE-2017-7526 |
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used. |
Affected by 0 other vulnerabilities. |
|
VCID-7qw9-vefx-p7g2
Aliases: CVE-2014-4617 |
Affected by 7 other vulnerabilities. |
|
|
VCID-9hja-pfy5-hfh6
Aliases: CVE-2015-0837 |
The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during modular exponentiation, related to a "Last-Level Cache Side-Channel Attack." |
Affected by 3 other vulnerabilities. |
|
VCID-gcbw-63wa-sqhp
Aliases: CVE-2016-6313 |
Affected by 0 other vulnerabilities. |
|
|
VCID-jke4-qk8u-8bcm
Aliases: CVE-2014-5270 |
Affected by 3 other vulnerabilities. |
|
|
VCID-mgnk-r26g-hbhc
Aliases: CVE-2013-4576 |
Affected by 7 other vulnerabilities. |
|
|
VCID-p649-eevs-abhw
Aliases: CVE-2014-3591 |
Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluctuations in the electromagnetic field during multiplication. |
Affected by 3 other vulnerabilities. |
|
VCID-p6xn-vjxt-3qcu
Aliases: CVE-2018-12020 |
mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes. |
Affected by 0 other vulnerabilities. |
|
VCID-vt39-dedw-nkec
Aliases: CVE-2015-1606 |
The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file. |
Affected by 3 other vulnerabilities. |
|
VCID-w1j5-xx92-q7e5
Aliases: CVE-2013-4351 |
Affected by 7 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||