The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "1.4.16-1ubuntu2.3", "binary_name": "gnupg" }, { "binary_version": "1.4.16-1ubuntu2.3", "binary_name": "gnupg-curl" }, { "binary_version": "1.4.16-1ubuntu2.3", "binary_name": "gnupg-udeb" }, { "binary_version": "1.4.16-1ubuntu2.3", "binary_name": "gpgv" }, { "binary_version": "1.4.16-1ubuntu2.3", "binary_name": "gpgv-udeb" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "2.0.22-3ubuntu1.3", "binary_name": "gnupg-agent" }, { "binary_version": "2.0.22-3ubuntu1.3", "binary_name": "gnupg2" }, { "binary_version": "2.0.22-3ubuntu1.3", "binary_name": "gpgsm" }, { "binary_version": "2.0.22-3ubuntu1.3", "binary_name": "gpgv2" }, { "binary_version": "2.0.22-3ubuntu1.3", "binary_name": "scdaemon" } ] }