GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote malicious users to bypass intended cryptographic protection mechanisms by leveraging the subkey.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
gnupg gnupg 1.4.8 |
||
gnupg gnupg 1.4.10 |
||
gnupg gnupg 1.4.4 |
||
gnupg gnupg 1.4.0 |
||
gnupg gnupg 1.4.6 |
||
gnupg gnupg 1.4.13 |
||
gnupg gnupg 1.4.12 |
||
gnupg gnupg 1.4.2 |
||
gnupg gnupg 1.4.11 |
||
gnupg gnupg 1.4.3 |
||
gnupg gnupg 1.4.5 |
||
gnupg gnupg 2.0.1 |
||
gnupg gnupg 2.0.7 |
||
gnupg gnupg 2.0.15 |
||
gnupg gnupg 2.0.8 |
||
gnupg gnupg 2.0.11 |
||
gnupg gnupg 2.0.6 |
||
gnupg gnupg 2.0.10 |
||
gnupg gnupg 2.0.13 |
||
gnupg gnupg 2.0 |
||
gnupg gnupg 2.0.5 |
||
gnupg gnupg 2.0.17 |
||
gnupg gnupg 2.0.12 |
||
gnupg gnupg 2.0.18 |
||
gnupg gnupg 2.0.16 |
||
gnupg gnupg 2.0.14 |
||
gnupg gnupg 2.0.4 |
||
gnupg gnupg 2.0.3 |
||
gnupg gnupg 2.0.19 |
||
gnupg gnupg 2.1.0 |