GnuPG 2.2.21 and 2.2.22 (and Gpg4win 3.1.12) has an array overflow, leading to a crash or possibly unspecified other impact, when a victim imports an attacker’s OpenPGP key, and this key has AEAD preferences. The overflow is caused by a g10/key-check.c error. NOTE: GnuPG 2.3.x is unaffected. GnuPG 2.2.23 is a fixed version.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | gnupg2 | < 2.2.40-1.1 | gnupg2_2.2.40-1.1_all.deb |
Debian | 11 | all | gnupg2 | < 2.2.27-2+deb11u2 | gnupg2_2.2.27-2+deb11u2_all.deb |
Debian | 10 | all | gnupg2 | < 2.2.12-1+deb10u2 | gnupg2_2.2.12-1+deb10u2_all.deb |
Debian | 999 | all | gnupg2 | < 2.2.43-6 | gnupg2_2.2.43-6_all.deb |
Debian | 13 | all | gnupg2 | < 2.2.40-3 | gnupg2_2.2.40-3_all.deb |