GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.
Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Link | Tags |
---|---|
http://thread.gmane.org/gmane.comp.encryption.gpg.devel/17712/focus=18138 | |
http://lists.opensuse.org/opensuse-updates/2013-10/msg00006.html | vendor advisory |
http://ubuntu.com/usn/usn-1987-1 | vendor advisory |
http://www.debian.org/security/2013/dsa-2773 | vendor advisory |
http://www.openwall.com/lists/oss-security/2013/09/13/4 | mailing list |
http://rhn.redhat.com/errata/RHSA-2013-1459.html | vendor advisory |
http://lists.opensuse.org/opensuse-updates/2013-10/msg00003.html | vendor advisory |
http://www.debian.org/security/2013/dsa-2774 | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1010137 |