MGASA-2019-0108

Source
https://advisories.mageia.org/MGASA-2019-0108.html
Import Source
https://advisories.mageia.org/MGASA-2019-0108.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2019-0108
Related
Published
2019-03-14T21:39:55Z
Modified
2019-03-14T20:25:49Z
Summary
Updated gnupg2 packages fix security vulnerability
Details

GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060. (CVE-2018-1000858)

References
Credits

Affected packages

Mageia:6 / gnupg2

Package

Name
gnupg2
Purl
pkg:rpm/mageia/gnupg2?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.21-3.2.mga6

Ecosystem specific

{
    "section": "core"
}