Vulnerability Description
gpg-key2ps in signing-party 1.1.x and 2.x before 2.10-1 contains an unsafe shell call enabling shell injection via a User ID.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Signing-Party Project | Signing-Party | >= 1.1, < 2.10 |
| Debian | Debian Linux | 8.0 |
| Opensuse | Leap | 15.0 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00029.htmlMailing ListThird Party Advisory
- https://bugs.debian.org/928256ExploitIssue TrackingMailing List
- https://lists.debian.org/debian-lts-announce/2019/05/msg00001.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00029.htmlMailing ListThird Party Advisory
- https://bugs.debian.org/928256ExploitIssue TrackingMailing List
- https://lists.debian.org/debian-lts-announce/2019/05/msg00001.htmlMailing ListThird Party Advisory
FAQ
What is CVE-2019-11627?
CVE-2019-11627 is a vulnerability with a CVSS score of 9.8 (CRITICAL). gpg-key2ps in signing-party 1.1.x and 2.x before 2.10-1 contains an unsafe shell call enabling shell injection via a User ID.
How severe is CVE-2019-11627?
CVE-2019-11627 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-11627?
Check the references section above for vendor advisories and patch information. Affected products include: Signing-Party Project Signing-Party, Debian Debian Linux, Opensuse Leap.