Описание
The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 1.4.12-7ubuntu1 |
hardy | released | 1.4.6-2ubuntu5.2 |
lucid | released | 1.4.10-2ubuntu1.2 |
oneiric | released | 1.4.11-3ubuntu1.11.10.2 |
precise | released | 1.4.11-3ubuntu2.2 |
quantal | released | 1.4.11-3ubuntu4.1 |
upstream | released | 1.4.13,1.4.12-7 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | released | 2.0.19-2ubuntu1 |
hardy | ignored | end of life |
lucid | released | 2.0.14-1ubuntu1.5 |
oneiric | released | 2.0.17-2ubuntu2.11.10.2 |
precise | released | 2.0.17-2ubuntu2.12.04.2 |
quantal | released | 2.0.17-2ubuntu3.1 |
upstream | released | 2.0.19-2 |
Показывать по
EPSS
5.8 Medium
CVSS2
Связанные уязвимости
The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.
The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.
The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 a ...
The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.
EPSS
5.8 Medium
CVSS2