{"id":"USN-2258-1","summary":"gnupg, gnupg2 vulnerability","details":"Jean-René Reinhard, Olivier Levillain and Florian Maury discovered that\nGnuPG incorrectly handled certain OpenPGP messages. If a user or automated\nsystem were tricked into processing a specially-crafted message, GnuPG\ncould consume resources, resulting in a denial of service.\n","modified":"2026-02-10T04:40:49Z","published":"2014-06-26T17:36:35Z","related":["UBUNTU-CVE-2014-4617"],"upstream":["CVE-2014-4617","UBUNTU-CVE-2014-4617"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2258-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-4617"}],"affected":[{"package":{"name":"gnupg","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/gnupg@1.4.16-1ubuntu2.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.16-1ubuntu2.1"}]}],"versions":["1.4.14-1ubuntu2","1.4.15-1.1ubuntu1","1.4.15-1.1ubuntu2","1.4.15-2ubuntu1","1.4.16-1ubuntu1","1.4.16-1ubuntu2"],"ecosystem_specific":{"binaries":[{"binary_name":"gnupg","binary_version":"1.4.16-1ubuntu2.1"},{"binary_name":"gnupg-curl","binary_version":"1.4.16-1ubuntu2.1"},{"binary_name":"gpgv","binary_version":"1.4.16-1ubuntu2.1"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2014-4617"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2258-1.json"}},{"package":{"name":"gnupg2","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/gnupg2@2.0.22-3ubuntu1.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.22-3ubuntu1.1"}]}],"versions":["2.0.20-1ubuntu3","2.0.22-1ubuntu1","2.0.22-3ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_name":"gnupg-agent","binary_version":"2.0.22-3ubuntu1.1"},{"binary_name":"gnupg2","binary_version":"2.0.22-3ubuntu1.1"},{"binary_name":"gpgsm","binary_version":"2.0.22-3ubuntu1.1"},{"binary_name":"gpgv2","binary_version":"2.0.22-3ubuntu1.1"},{"binary_name":"scdaemon","binary_version":"2.0.22-3ubuntu1.1"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2014-4617"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2258-1.json"}}],"schema_version":"1.7.3"}