Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2012-6085

Published: 31 December 2012

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.

Notes

AuthorNote
seth-arnold
reproducer key available from dropbox url

Priority

Medium

Status

Package Release Status
gnupg
Launchpad, Ubuntu, Debian
hardy
Released (1.4.6-2ubuntu5.2)
lucid
Released (1.4.10-2ubuntu1.2)
oneiric
Released (1.4.11-3ubuntu1.11.10.2)
precise
Released (1.4.11-3ubuntu2.2)
quantal
Released (1.4.11-3ubuntu4.1)
upstream
Released (1.4.13,1.4.12-7)
Patches:
upstream: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=patch;h=f795a0d59e197455f8723c300eebf59e09853efa
vendor: http://www.debian.org/security/2013/dsa-2601


gnupg2
Launchpad, Ubuntu, Debian
hardy Ignored
(reached end-of-life)
lucid
Released (2.0.14-1ubuntu1.5)
oneiric
Released (2.0.17-2ubuntu2.11.10.2)
precise
Released (2.0.17-2ubuntu2.12.04.2)
quantal
Released (2.0.17-2ubuntu3.1)
upstream
Released (2.0.19-2)
Patches:


upstream: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=patch;h=498882296ffac7987c644aaf2a0aa108a2925471
vendor: http://www.debian.org/security/2013/dsa-2601