The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "gnupg", "binary_version": "1.4.16-1ubuntu2.3" }, { "binary_name": "gnupg-curl", "binary_version": "1.4.16-1ubuntu2.3" }, { "binary_name": "gnupg-udeb", "binary_version": "1.4.16-1ubuntu2.3" }, { "binary_name": "gpgv", "binary_version": "1.4.16-1ubuntu2.3" }, { "binary_name": "gpgv-udeb", "binary_version": "1.4.16-1ubuntu2.3" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "gnupg-agent", "binary_version": "2.0.22-3ubuntu1.3" }, { "binary_name": "gnupg2", "binary_version": "2.0.22-3ubuntu1.3" }, { "binary_name": "gpgsm", "binary_version": "2.0.22-3ubuntu1.3" }, { "binary_name": "gpgv2", "binary_version": "2.0.22-3ubuntu1.3" }, { "binary_name": "scdaemon", "binary_version": "2.0.22-3ubuntu1.3" } ] }