MGASA-2013-0303

Source
https://advisories.mageia.org/MGASA-2013-0303.html
Import Source
https://advisories.mageia.org/MGASA-2013-0303.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2013-0303
Related
Published
2013-10-09T22:47:49Z
Modified
2013-10-09T22:47:37Z
Summary
Updated gnupg packages fix CVE-2013-4402
Details

Updated gnupg package fixes security vulnerability:

Special crafted input data may be used to cause a denial of service against GPG. GPG can be forced to recursively parse certain parts of OpenPGP messages ad infinitum (CVE-2013-4402).

References
Credits

Affected packages

Mageia:3 / gnupg

Package

Name
gnupg
Purl
pkg:rpm/mageia/gnupg?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.14-1.1.mga3

Ecosystem specific

{
    "section": "core"
}

Mageia:2 / gnupg

Package

Name
gnupg
Purl
pkg:rpm/mageia/gnupg?distro=mageia-2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.12-1.3.mga2

Ecosystem specific

{
    "section": "core"
}