First published: Fri Sep 20 2013(Updated: )
GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gnupg Gnupg | =1.4.0 | |
Gnupg Gnupg | =1.4.2 | |
Gnupg Gnupg | =1.4.3 | |
Gnupg Gnupg | =1.4.4 | |
Gnupg Gnupg | =1.4.5 | |
Gnupg Gnupg | =1.4.6 | |
Gnupg Gnupg | =1.4.8 | |
Gnupg Gnupg | =1.4.10 | |
Gnupg Gnupg | =1.4.11 | |
Gnupg Gnupg | =1.4.12 | |
Gnupg Gnupg | =1.4.13 | |
Gnupg Gnupg | =2.0 | |
Gnupg Gnupg | =2.0.1 | |
Gnupg Gnupg | =2.0.3 | |
Gnupg Gnupg | =2.0.4 | |
Gnupg Gnupg | =2.0.5 | |
Gnupg Gnupg | =2.0.6 | |
Gnupg Gnupg | =2.0.7 | |
Gnupg Gnupg | =2.0.8 | |
Gnupg Gnupg | =2.0.10 | |
Gnupg Gnupg | =2.0.11 | |
Gnupg Gnupg | =2.0.12 | |
Gnupg Gnupg | =2.0.13 | |
Gnupg Gnupg | =2.0.14 | |
Gnupg Gnupg | =2.0.15 | |
Gnupg Gnupg | =2.0.16 | |
Gnupg Gnupg | =2.0.17 | |
Gnupg Gnupg | =2.0.18 | |
Gnupg Gnupg | =2.0.19 | |
Gnupg Gnupg | =2.1.0-beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.