{"id":"USN-4516-1","summary":"gnupg2 vulnerability","details":"It was discovered that GnuPG signatures could be forged when the SHA-1\nalgorithm is being used. This update removes validating signatures based on\nSHA-1 that were generated after 2019-01-19. In environments where this is\nstill required, a new option --allow-weak-key-signatures can be used to\nrevert this behaviour.\n","modified":"2026-02-10T04:41:55Z","published":"2020-09-17T17:41:13Z","related":["UBUNTU-CVE-2019-14855"],"upstream":["CVE-2019-14855","UBUNTU-CVE-2019-14855"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4516-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-14855"}],"affected":[{"package":{"name":"gnupg2","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/gnupg2@2.2.4-1ubuntu1.3?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.2.4-1ubuntu1.3"}]}],"versions":["2.1.15-1ubuntu8","2.2.4-1ubuntu1","2.2.4-1ubuntu1.1","2.2.4-1ubuntu1.2"],"ecosystem_specific":{"binaries":[{"binary_version":"2.2.4-1ubuntu1.3","binary_name":"dirmngr"},{"binary_version":"2.2.4-1ubuntu1.3","binary_name":"gnupg"},{"binary_version":"2.2.4-1ubuntu1.3","binary_name":"gnupg-agent"},{"binary_version":"2.2.4-1ubuntu1.3","binary_name":"gnupg-l10n"},{"binary_version":"2.2.4-1ubuntu1.3","binary_name":"gnupg-utils"},{"binary_version":"2.2.4-1ubuntu1.3","binary_name":"gnupg2"},{"binary_version":"2.2.4-1ubuntu1.3","binary_name":"gpg"},{"binary_version":"2.2.4-1ubuntu1.3","binary_name":"gpg-agent"},{"binary_version":"2.2.4-1ubuntu1.3","binary_name":"gpg-wks-client"},{"binary_version":"2.2.4-1ubuntu1.3","binary_name":"gpg-wks-server"},{"binary_version":"2.2.4-1ubuntu1.3","binary_name":"gpgconf"},{"binary_version":"2.2.4-1ubuntu1.3","binary_name":"gpgsm"},{"binary_version":"2.2.4-1ubuntu1.3","binary_name":"gpgv"},{"binary_version":"2.2.4-1ubuntu1.3","binary_name":"gpgv-static"},{"binary_version":"2.2.4-1ubuntu1.3","binary_name":"gpgv-win32"},{"binary_version":"2.2.4-1ubuntu1.3","binary_name":"gpgv2"},{"binary_version":"2.2.4-1ubuntu1.3","binary_name":"scdaemon"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2019-14855","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}]}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4516-1.json"}}],"schema_version":"1.7.3"}