ELA-636-1 gnupg2 security update

signature spoofing

2022-07-11
Packagegnupg2
Version2.0.26-6+deb8u3 (jessie), 2.1.18-8~deb9u5 (stretch)
Related CVEs CVE-2018-9234 CVE-2022-34903


CVE-2022-34903

Demi Marie Obenour discovered a flaw in GnuPG, allowing for signature
spoofing via arbitrary injection into the status line. An attacker who
controls the secret part of any signing-capable key or subkey in the
victim's keyring, can take advantage of this flaw to provide a
correctly-formed signature that some software, including gpgme, will
accept to have validity and signer fingerprint chosen from the attacker.

CVE-2018-9234

GnuPG does not enforce a configuration in which key certification requires an
offline master Certify key, which results in apparently valid certifications
that occurred only with access to a signing subkey.


For Debian 8 jessie, these problems have been fixed in version 2.0.26-6+deb8u3.

For Debian 9 stretch, these problems have been fixed in version 2.1.18-8~deb9u5.

We recommend that you upgrade your gnupg2 packages.

Further information about Extended LTS security advisories can be found in the dedicated section of our website.