GnuPG (GNU Privacy Guard) 2.2.21

CPE Details

GnuPG (GNU Privacy Guard) 2.2.21
2.2.21
2020-09-04
13h33 +00:00
2023-06-06
16h58 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:gnupg:gnupg:2.2.21:*:*:*:*:*:*:*

Informations

Vendor

gnupg

Product

gnupg

Version

2.2.21

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-34903 2022-07-01 19h05 +00:00 GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.
6.5
Medium
CVE-2020-25125 2020-09-03 15h48 +00:00 GnuPG 2.2.21 and 2.2.22 (and Gpg4win 3.1.12) has an array overflow, leading to a crash or possibly unspecified other impact, when a victim imports an attacker's OpenPGP key, and this key has AEAD preferences. The overflow is caused by a g10/key-check.c error. NOTE: GnuPG 2.3.x is unaffected. GnuPG 2.2.23 is a fixed version.
7.8
High