First published: Thu Jan 10 2019(Updated: )
Ben Fuhrmannek discovered that GnuPG incorrectly handled Web Key Directory lookups. A remote attacker could possibly use this issue to cause a denial of service, or perform Cross-Site Request Forgery attacks.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/gnupg | <2.2.8-3ubuntu1.1 | 2.2.8-3ubuntu1.1 |
=18.10 | ||
All of | ||
ubuntu/gpg-wks-client | <2.2.8-3ubuntu1.1 | 2.2.8-3ubuntu1.1 |
=18.10 | ||
All of | ||
ubuntu/gnupg | <2.2.4-1ubuntu1.2 | 2.2.4-1ubuntu1.2 |
=18.04 | ||
All of | ||
ubuntu/gpg-wks-client | <2.2.4-1ubuntu1.2 | 2.2.4-1ubuntu1.2 |
=18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is USN-3853-1.
The title of the vulnerability is GnuPG vulnerability.
The vulnerability involves GnuPG incorrectly handling Web Key Directory lookups, which could allow a remote attacker to cause a denial of service or perform Cross-Site Request Forgery attacks.
The affected software includes GnuPG version 2.2.8-3ubuntu1.1 and gpg-wks-client version 2.2.8-3ubuntu1.1 on Ubuntu 18.10, as well as GnuPG version 2.2.4-1ubuntu1.2 and gpg-wks-client version 2.2.4-1ubuntu1.2 on Ubuntu 18.04.
To fix this vulnerability, you should update GnuPG and gpg-wks-client to the specified versions (2.2.8-3ubuntu1.1 for Ubuntu 18.10 and 2.2.4-1ubuntu1.2 for Ubuntu 18.04).