Description
GNOME Evolution through 3.38.3 produces a "Valid signature" message for an unknown identifier on a previously trusted key because Evolution does not retrieve enough information from the GnuPG API. NOTE: third parties dispute the significance of this issue, and dispute whether Evolution is the best place to change this behavior
Published: 2021-02-01
Score: 3.3 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T16:53:17.551Z

Reserved: 2021-02-01T00:00:00.000Z

Link: CVE-2021-3349

cve-icon Vulnrichment

Updated: 2024-08-03T16:53:17.551Z

cve-icon NVD

Status : Modified

Published: 2021-02-01T05:15:11.880

Modified: 2024-11-21T06:21:21.493

Link: CVE-2021-3349

cve-icon Redhat

Severity : Low

Publid Date: 2021-02-01T00:00:00Z

Links: CVE-2021-3349 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses