DEBIAN-CVE-2021-3349

Source
https://security-tracker.debian.org/tracker/CVE-2021-3349
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2021-3349.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2021-3349
Upstream
Published
2021-02-01T05:15:11.880Z
Modified
2025-11-19T01:03:12.165660Z
Severity
  • 3.3 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

GNOME Evolution through 3.38.3 produces a "Valid signature" message for an unknown identifier on a previously trusted key because Evolution does not retrieve enough information from the GnuPG API. NOTE: third parties dispute the significance of this issue, and dispute whether Evolution is the best place to change this behavior

References

Affected packages

Debian:11 / evolution

Package

Name
evolution
Purl
pkg:deb/debian/evolution?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.38.3-1
3.38.3-1+deb11u1
3.38.3-1+deb11u2
3.38.3-1+deb11u3
3.39.2-1
3.39.3-1
3.40.0-1
3.40.1-1
3.40.2-1
3.40.4-1
3.42.0-1
3.42.0-2
3.42.1-1
3.42.2-1
3.42.3-1
3.42.4-1
3.43.2-1
3.43.2-2
3.43.3-1
3.44.0-1
3.44.0-2
3.44.1-1
3.44.1-2
3.44.2-1
3.44.3-1
3.44.3-2
3.44.4-1
3.45.2-1
3.45.2-2
3.45.3-1
3.45.3-2
3.46.0-1
3.46.0-2
3.46.1-1
3.46.2-1
3.46.3-1
3.46.4-1
3.46.4-2
3.47.2-1
3.47.3-1
3.48.0-1
3.48.1-1
3.48.2-1
3.48.3-1
3.48.4-1
3.49.2-1
3.49.2-2
3.49.2-3
3.49.3-1
3.50.0-1
3.50.1-1
3.50.2-1
3.50.3-1
3.51.2-1
3.52.0-1
3.52.1-1
3.52.1-2
3.52.1-3
3.52.1-4
3.52.2-1
3.52.2-2
3.52.3-1
3.53.2-1
3.53.3-1
3.54.0-1
3.54.1-1
3.54.2-1
3.54.3-1
3.54.3-2
3.55.1-1
3.55.1-2
3.55.2-1
3.55.3-1
3.56.0-1
3.56.1-1
3.56.2-1
3.56.2-2
3.56.2-3
3.56.2-4
3.56.2-5
3.56.2-7
3.56.2-8

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2021-3349.json"

Debian:12 / evolution

Package

Name
evolution
Purl
pkg:deb/debian/evolution?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.46.4-2
3.46.4-2+deb12u1
3.47.2-1
3.47.3-1
3.48.0-1
3.48.1-1
3.48.2-1
3.48.3-1
3.48.4-1
3.49.2-1
3.49.2-2
3.49.2-3
3.49.3-1
3.50.0-1
3.50.1-1
3.50.2-1
3.50.3-1
3.51.2-1
3.52.0-1
3.52.1-1
3.52.1-2
3.52.1-3
3.52.1-4
3.52.2-1
3.52.2-2
3.52.3-1
3.53.2-1
3.53.3-1
3.54.0-1
3.54.1-1
3.54.2-1
3.54.3-1
3.54.3-2
3.55.1-1
3.55.1-2
3.55.2-1
3.55.3-1
3.56.0-1
3.56.1-1
3.56.2-1
3.56.2-2
3.56.2-3
3.56.2-4
3.56.2-5
3.56.2-7
3.56.2-8

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2021-3349.json"

Debian:13 / evolution

Package

Name
evolution
Purl
pkg:deb/debian/evolution?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.56.1-1
3.56.1-1+deb13u1
3.56.2-0+deb13u1
3.56.2-1
3.56.2-2
3.56.2-3
3.56.2-4
3.56.2-5
3.56.2-7
3.56.2-8

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2021-3349.json"

Debian:14 / evolution

Package

Name
evolution
Purl
pkg:deb/debian/evolution?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.56.1-1
3.56.2-1
3.56.2-2
3.56.2-3
3.56.2-4
3.56.2-5
3.56.2-7
3.56.2-8

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2021-3349.json"