Descriptiongpgv in GnuPG before, when using unattended signature verification, returns a 0 exit code in certain cases even when the detached signature file does not carry a signature, which could cause programs that use gpgv to assume that the signature verification has succeeded. Note: this also occurs when running the equivalent command "gpg --verify".
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: local)
Debian Bugs353017, 353019, 354620

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gnupg (PTS)jessie, jessie (security)1.4.18-7+deb8u5fixed
gnupg2 (PTS)jessie, jessie (security)2.0.26-6+deb8u2fixed
stretch, stretch (security)2.1.18-8~deb9u2fixed
buster, sid2.2.10-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gnupgsource(unstable), 353019, 354620
gnupg2source(unstable)(not affected)


- gnupg2 <not-affected> (Vulnerable code not activated)

Search for package or bug name: Reporting problems