|Description||gpgv in GnuPG before 18.104.22.168, when using unattended signature verification, returns a 0 exit code in certain cases even when the detached signature file does not carry a signature, which could cause programs that use gpgv to assume that the signature verification has succeeded. Note: this also occurs when running the equivalent command "gpg --verify".|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)|
|Debian Bugs||353017, 353019, 354620|
Vulnerable and fixed packages
The table below lists information on source packages.
|gnupg2 (PTS)||buster, buster (security)||2.2.12-1+deb10u2||fixed|
|bullseye (security), bullseye||2.2.27-2+deb11u2||fixed|
|sid, trixie, bookworm||2.2.40-1.1||fixed|
The information below is based on the following data on fixed versions.
- gnupg2 <not-affected> (Vulnerable code not activated)