|Description||gpgv in GnuPG before 220.127.116.11, when using unattended signature verification, returns a 0 exit code in certain cases even when the detached signature file does not carry a signature, which could cause programs that use gpgv to assume that the signature verification has succeeded. Note: this also occurs when running the equivalent command "gpg --verify".|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)|
|NVD severity||medium (attack range: local)|
|Debian Bugs||353017, 353019, 354620|
Vulnerable and fixed packages
The table below lists information on source packages.
|gnupg (PTS)||jessie, jessie (security)||1.4.18-7+deb8u5||fixed|
|gnupg2 (PTS)||jessie, jessie (security)||2.0.26-6+deb8u2||fixed|
|stretch, stretch (security)||2.1.18-8~deb9u2||fixed|
The information below is based on the following data on fixed versions.
- gnupg2 <not-affected> (Vulnerable code not activated)