First published: Wed Apr 04 2018(Updated: )
GnuPG 2.2.4 and 2.2.5 does not enforce a configuration in which key certification requires an offline master Certify key, which results in apparently valid certifications that occurred only with access to a signing subkey.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gnupg Gnupg | =2.2.4 | |
Gnupg Gnupg | =2.2.5 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Canonical Ubuntu Linux | =18.04 | |
debian/gnupg2 | 2.2.27-2+deb11u2 2.2.40-1.1 2.2.45-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-9234 is high with a severity value of 7.5.
CVE-2018-9234 affects GnuPG versions 2.2.4 and 2.2.5.
The recommended remedy for CVE-2018-9234 is to update GnuPG to version 2.2.6 or higher.
Yes, you can find more information about CVE-2018-9234 and known exploits or references at the following links: [link1], [link2], [link3].
The CWE category for CVE-2018-9234 is CWE-320.