Debian Linux Security Advisory 2076-1 – It was discovered that GnuPG 2 uses a freed pointer when verify a signature or importing a certificate with many Subject Alternate Names, potentially leading to arbitrary code execution.
You can download this advisory from the following link: https://packetstormsecurity.com/files/download/92230/dsa-2076-1.txt
Source: https://packetstormsecurity.com/files/92230/Debian-Linux-Security-Advisory-2076-1.html

