CVE-2020-25125

NameCVE-2020-25125
DescriptionGnuPG 2.2.21 and 2.2.22 (and Gpg4win 3.1.12) has an array overflow, leading to a crash or possibly unspecified other impact, when a victim imports an attacker's OpenPGP key, and this key has AEAD preferences. The overflow is caused by a g10/key-check.c error. NOTE: GnuPG 2.3.x is unaffected. GnuPG 2.2.23 is a fixed version.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gnupg2 (PTS)buster2.2.12-1+deb10u1fixed
buster (security)2.2.12-1+deb10u2fixed
bullseye2.2.27-2+deb11u1fixed
bullseye (security)2.2.27-2+deb11u2fixed
bookworm, sid2.2.35-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gnupg2source(unstable)(not affected)

Notes

- gnupg2 <not-affected> (Only affects versions 2.2.21 and 2.2.22)
https://dev.gnupg.org/T5050
https://lists.gnupg.org/pipermail/gnupg-announce/2020q3/000448.html

Search for package or bug name: Reporting problems