Описание
In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash).
Ссылки
- PatchProduct
- Mailing ListThird Party Advisory
Уязвимые конфигурации
Одно из
EPSS
3.7 Low
CVSS3
5.5 Medium
CVSS3
Дефекты
Связанные уязвимости
In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash).
In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash).
In GnuPG before 2.5.17, a long signature packet length causes parse_si ...
In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash).
EPSS
3.7 Low
CVSS3
5.5 Medium
CVSS3