First published: Wed Nov 20 2019(Updated: )
The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gnupg Gnupg | <2.1.2 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2015-1606.
The severity of CVE-2015-1606 is medium with a CVSS score of 5.5.
The affected software for CVE-2015-1606 includes Gnupg version up to and excluding 2.1.2 and Debian Linux versions 7.0 and 8.0.
CVE-2015-1606 allows remote attackers to cause a denial of service (invalid read and use-after-free) by exploiting a vulnerability in the keyring DB of GnuPG before 2.1.2.
Yes, the references for CVE-2015-1606 can be found at: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=f0f71a721ccd7ab9e40b8b6b028b59632c0cc648, http://www.debian.org/security/2015/dsa-3184, http://www.openwall.com/lists/oss-security/2015/02/13/14