CVE-2015-1606

The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:25

Type Values Removed Values Added
References () http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commit%3Bh=f0f71a721ccd7ab9e40b8b6b028b59632c0cc648 - () http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commit%3Bh=f0f71a721ccd7ab9e40b8b6b028b59632c0cc648 -
References () http://www.debian.org/security/2015/dsa-3184 - Third Party Advisory () http://www.debian.org/security/2015/dsa-3184 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2015/02/13/14 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2015/02/13/14 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2015/02/14/6 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2015/02/14/6 - Mailing List, Third Party Advisory
References () http://www.securitytracker.com/id/1031876 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1031876 - Third Party Advisory, VDB Entry
References () https://blog.fuzzing-project.org/5-Multiple-issues-in-GnuPG-found-through-keyring-fuzzing-TFPA-0012015.html - Third Party Advisory () https://blog.fuzzing-project.org/5-Multiple-issues-in-GnuPG-found-through-keyring-fuzzing-TFPA-0012015.html - Third Party Advisory

07 Nov 2023, 02:24

Type Values Removed Values Added
References
  • {'url': 'http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=f0f71a721ccd7ab9e40b8b6b028b59632c0cc648', 'name': 'http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=f0f71a721ccd7ab9e40b8b6b028b59632c0cc648', 'tags': ['Mailing List', 'Vendor Advisory'], 'refsource': 'MISC'}
  • () http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commit%3Bh=f0f71a721ccd7ab9e40b8b6b028b59632c0cc648 -

Information

Published : 2019-11-20 19:15

Updated : 2024-11-21 02:25


NVD link : CVE-2015-1606

Mitre link : CVE-2015-1606

CVE.ORG link : CVE-2015-1606


JSON object : View

Products Affected

gnupg

  • gnupg

debian

  • debian_linux
CWE
CWE-416

Use After Free