CVE-2006-0049

NameCVE-2006-0049
Descriptiongpg in GnuPG before 1.4.2.2 does not properly verify non-detached signatures, which allows attackers to inject unsigned data via a data packet that is not associated with a control packet, which causes the check for concatenated signatures to report that the signature is valid, a different vulnerability than CVE-2006-0455.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-993-2
Debian Bugs356125

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gnupg2 (PTS)buster, buster (security)2.2.12-1+deb10u2fixed
bullseye (security), bullseye2.2.27-2+deb11u2fixed
bookworm, trixie2.2.40-1.1fixed
sid2.2.40-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gnupgsourcewoody1.0.6-4woody5DSA-993-2
gnupgsourcesarge1.4.1-1.sarge3DSA-993-2
gnupgsource(unstable)1.4.2.2-1medium356125
gnupg2source(unstable)(not affected)

Notes

- gnupg2 <not-affected> (Vulnerable code not activated)

Search for package or bug name: Reporting problems