Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: php83Extensions.gnupg

Found 3 matching suggestions

Untriaged
created 1 week, 6 days ago
In GnuPG before 2.5.17, a stack-based buffer overflow exists in …

In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.

Affected products

GnuPG
  • <2.5.17

Matching in nixpkgs

Untriaged
created 1 week, 6 days ago
In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message …

In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped session key can cause a stack-based buffer overflow in gpg-agent during PKDECRYPT--kem=CMS handling. This can easily be leveraged for denial of service; however, there is also memory corruption that could lead to remote code execution.

Affected products

GnuPG
  • <2.5.17

Matching in nixpkgs

Untriaged
created 2 weeks, 1 day ago
In GnuPG before 2.5.17, a long signature packet length causes …

In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash).

Affected products

GnuPG
  • <2.5.17

Matching in nixpkgs