A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.
The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Gnupg | Gnupg | * | 2.2.18 (excluding) |
Gnupg | Ubuntu | precise/esm | * |
Gnupg | Ubuntu | trusty | * |
Gnupg | Ubuntu | trusty/esm | * |
Gnupg | Ubuntu | xenial | * |
Gnupg1 | Ubuntu | bionic | * |
Gnupg1 | Ubuntu | disco | * |
Gnupg1 | Ubuntu | eoan | * |
Gnupg1 | Ubuntu | groovy | * |
Gnupg1 | Ubuntu | hirsute | * |
Gnupg1 | Ubuntu | impish | * |
Gnupg1 | Ubuntu | kinetic | * |
Gnupg1 | Ubuntu | lunar | * |
Gnupg1 | Ubuntu | mantic | * |
Gnupg1 | Ubuntu | trusty | * |
Gnupg2 | Ubuntu | bionic | * |
Gnupg2 | Ubuntu | disco | * |
Gnupg2 | Ubuntu | eoan | * |
Gnupg2 | Ubuntu | esm-infra/xenial | * |
Gnupg2 | Ubuntu | trusty | * |
Gnupg2 | Ubuntu | upstream | * |
Gnupg2 | Ubuntu | xenial | * |