|Bugzilla:||891142: CVE-2012-6085 GnuPG: read_block() corrupt key input validation|
The MITRE CVE dictionary describes this issue as:
The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.
This issue affects the version of gnupg2 as shipped with Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.
CVSS v2 metrics
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Red Hat security errata
|Red Hat Enterprise Linux version 5 (gnupg)||RHSA-2013:1458||October 24, 2013|
|Red Hat Enterprise Linux version 5 (gnupg2)||RHSA-2013:1459||October 24, 2013|
|Red Hat Enterprise Linux version 6 (gnupg2)||RHSA-2013:1459||October 24, 2013|
This page is generated automatically and has not been checked for errors or omissions.
For clarification or corrections please contact the Red Hat Security Response Team.