CVE-2018-9234
Published: 03 April 2018
GnuPG 2.2.4 and 2.2.5 does not enforce a configuration in which key certification requires an offline master Certify key, which results in apparently valid certifications that occurred only with access to a signing subkey.
Priority
CVSS 3 base score: 7.5
Status
Package | Release | Status |
---|---|---|
gnupg Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.2.6)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Not vulnerable
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Not vulnerable
|
|
gnupg2 Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.2.6)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(2.2.4-1ubuntu1.1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Not vulnerable
(2.1.11-6ubuntu2)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was not-affected [2.0.22-3ubuntu1.3])
|
|
Patches: Upstream: https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=a17d2d1f690ebe5d005b4589a5fe378b6487c657 |
Notes
Author | Note |
---|---|
mdeslaur | only affects 2.1.21 and later |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9234
- https://usn.ubuntu.com/usn/usn-3675-1
- NVD
- Launchpad
- Debian