Unrated severityNVD Advisory· Published Feb 15, 2006· Updated Apr 16, 2026
CVE-2006-0455
CVE-2006-0455
Description
gpgv in GnuPG before 1.4.2.1, when using unattended signature verification, returns a 0 exit code in certain cases even when the detached signature file does not carry a signature, which could cause programs that use gpgv to assume that the signature verification has succeeded. Note: this also occurs when running the equivalent command "gpg --verify".
Affected products
23cpe:2.3:a:gnu:privacy_guard:1.0:*:*:*:*:*:*:*+ 22 more
- cpe:2.3:a:gnu:privacy_guard:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.0.3b:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.2.2:rc1:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.4.2:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
32- secunia.com/advisories/18933nvdPatchVendor Advisory
- secunia.com/advisories/18934nvdPatchVendor Advisory
- secunia.com/advisories/18942nvdPatchVendor Advisory
- secunia.com/advisories/18955nvdPatchVendor Advisory
- secunia.com/advisories/18956nvdPatchVendor Advisory
- secunia.com/advisories/18968nvdPatchVendor Advisory
- www.gentoo.org/security/en/glsa/glsa-200602-10.xmlnvdPatchVendor Advisory
- www.novell.com/linux/security/advisories/2006_09_gpg.htmlnvdPatchVendor Advisory
- www.slackware.com/security/viewer.phpnvdPatch
- www.us.debian.org/security/2006/dsa-978nvdPatchVendor Advisory
- www.securityfocus.com/bid/16663nvdExploitPatch
- secunia.com/advisories/18845nvdVendor Advisory
- secunia.com/advisories/19130nvdVendor Advisory
- secunia.com/advisories/19249nvdVendor Advisory
- secunia.com/advisories/19532nvdVendor Advisory
- www.openpkg.org/security/OpenPKG-SA-2006.001-gnupg.htmlnvdVendor Advisory
- www.vupen.com/english/advisories/2006/0610nvdVendor Advisory
- patches.sgi.com/support/free/security/advisories/20060401-01-Unvd
- fedoranews.org/updates/FEDORA-2006-116.shtmlnvd
- lists.gnupg.org/pipermail/gnupg-announce/2006q1/000211.htmlnvd
- marc.infonvd
- www.mandriva.com/security/advisoriesnvd
- www.novell.com/linux/security/advisories/2006_05_sr.htmlnvd
- www.novell.com/linux/security/advisories/2006_13_gpg.htmlnvd
- www.osvdb.org/23221nvd
- www.redhat.com/support/errata/RHSA-2006-0266.htmlnvd
- www.securityfocus.com/archive/1/425289/100/0/threadednvd
- www.securityfocus.com/archive/1/433931/100/0/threadednvd
- www.trustix.org/errata/2006/0008nvd
- www.ubuntu.com/usn/usn-252-1nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/24744nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10084nvd
News mentions
0No linked articles in our index yet.