GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of
service (crash) and possibly execute arbitrary code via crafted duplicate
keys that are imported from key servers, which triggers “memory corruption
around deduplication of user IDs.”
Author | Note |
---|---|
jdstrand | verified all ubuntu releases not affected (amd64 kvm) upcoming 1.4.9 and 2.0.9 will have fix |