Search for packages
Package details: pkg:deb/ubuntu/gnupg2@1.9.21-0ubuntu1
purl pkg:deb/ubuntu/gnupg2@1.9.21-0ubuntu1
Next non-vulnerable version 2.2.19-3ubuntu2
Latest non-vulnerable version 2.2.19-3ubuntu2
Risk 4.0
Vulnerabilities affecting this package (8)
Vulnerability Summary Fixed by
VCID-2c8m-9dgp-aaae
Aliases:
CVE-2019-13050
CVE-2019-13050 GnuPG: interaction between the sks-keyserver code and GnuPG allows for a Certificate Spamming Attack which leads to persistent DoS
2.2.19-3ubuntu1
Affected by 1 other vulnerability.
VCID-4u1u-zxbs-aaag
Aliases:
CVE-2018-12020
mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.
2.2.8-1ubuntu1
Affected by 2 other vulnerabilities.
VCID-5tp1-furh-aaak
Aliases:
CVE-2015-1606
The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.
2.0.22-3ubuntu1.3
Affected by 4 other vulnerabilities.
VCID-bv5h-ayrs-aaan
Aliases:
CVE-2018-1000858
GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060.
2.2.4-1ubuntu1.2
Affected by 3 other vulnerabilities.
VCID-gkq6-68mx-aaak
Aliases:
CVE-2018-9234
GnuPG 2.2.4 and 2.2.5 does not enforce a configuration in which key certification requires an offline master Certify key, which results in apparently valid certifications that occurred only with access to a signing subkey.
2.0.22-3ubuntu1.3
Affected by 4 other vulnerabilities.
2.2.4-1ubuntu1.1
Affected by 4 other vulnerabilities.
VCID-m3q4-wftu-aaaa
Aliases:
CVE-2019-14855
A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.
2.2.19-3ubuntu2
Affected by 0 other vulnerabilities.
VCID-sjc5-hg88-aaaa
Aliases:
CVE-2015-1607
kbx/keybox-search.c in GnuPG before 1.4.19, 2.0.x before 2.0.27, and 2.1.x before 2.1.2 does not properly handle bitwise left-shifts, which allows remote attackers to cause a denial of service (invalid read operation) via a crafted keyring file, related to sign extensions and "memcpy with overlapping ranges."
2.0.22-3ubuntu1.3
Affected by 4 other vulnerabilities.
VCID-xh3w-3nre-aaan
Aliases:
CVE-2014-4617
The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence.
2.0.22-3ubuntu1.1
Affected by 7 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version