Search CVE reports


Toggle filters

41 – 44 of 44 results


CVE-2006-3082

Medium priority

Some fixes available 15 of 16

parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string),...

2 affected packages

gnupg, gnupg2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
gnupg
gnupg2
Show less packages

CVE-2006-0049

Medium priority
Fixed

gpg in GnuPG before 1.4.2.2 does not properly verify non-detached signatures, which allows attackers to inject unsigned data via a data packet that is not associated with a control packet, which causes the check for concatenated...

1 affected package

gnupg

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
gnupg
Show less packages

CVE-2006-0455

Medium priority
Fixed

gpgv in GnuPG before 1.4.2.1, when using unattended signature verification, returns a 0 exit code in certain cases even when the detached signature file does not carry a signature, which could cause programs that use gpgv to...

1 affected package

gnupg

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
gnupg
Show less packages

CVE-2005-0366

Medium priority
Fixed

The integrity check feature in OpenPGP, when handling a message that was encrypted using cipher feedback (CFB) mode, allows remote attackers to recover part of the plaintext via a chosen-ciphertext attack when the first 2 bytes of...

1 affected package

gnupg

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
gnupg
Show less packages