In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsThere is no fixed version for RHEL:8
gnupg2-smime
.
Note: Versions mentioned in the description apply only to the upstream gnupg2-smime
package and not the gnupg2-smime
package as distributed by RHEL
.
See How to fix?
for RHEL:8
relevant fixed versions and status.
In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a "verification DoS."