UBUNTU-CVE-2019-14855

Source
https://ubuntu.com/security/CVE-2019-14855
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-14855.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2019-14855
Upstream
Downstream
Related
Published
2020-03-20T16:15:00Z
Modified
2026-01-30T01:12:45.423356Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N CVSS Calculator
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.

References

Affected packages

Ubuntu:18.04:LTS
gnupg2

Package

Name
gnupg2
Purl
pkg:deb/ubuntu/gnupg2@2.2.4-1ubuntu1.3?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.4-1ubuntu1.3

Affected versions

2.*
2.1.15-1ubuntu8
2.2.4-1ubuntu1
2.2.4-1ubuntu1.1
2.2.4-1ubuntu1.2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.2.4-1ubuntu1.3",
            "binary_name": "dirmngr"
        },
        {
            "binary_version": "2.2.4-1ubuntu1.3",
            "binary_name": "gnupg"
        },
        {
            "binary_version": "2.2.4-1ubuntu1.3",
            "binary_name": "gnupg-agent"
        },
        {
            "binary_version": "2.2.4-1ubuntu1.3",
            "binary_name": "gnupg-l10n"
        },
        {
            "binary_version": "2.2.4-1ubuntu1.3",
            "binary_name": "gnupg-utils"
        },
        {
            "binary_version": "2.2.4-1ubuntu1.3",
            "binary_name": "gnupg2"
        },
        {
            "binary_version": "2.2.4-1ubuntu1.3",
            "binary_name": "gpg"
        },
        {
            "binary_version": "2.2.4-1ubuntu1.3",
            "binary_name": "gpg-agent"
        },
        {
            "binary_version": "2.2.4-1ubuntu1.3",
            "binary_name": "gpg-wks-client"
        },
        {
            "binary_version": "2.2.4-1ubuntu1.3",
            "binary_name": "gpg-wks-server"
        },
        {
            "binary_version": "2.2.4-1ubuntu1.3",
            "binary_name": "gpgconf"
        },
        {
            "binary_version": "2.2.4-1ubuntu1.3",
            "binary_name": "gpgsm"
        },
        {
            "binary_version": "2.2.4-1ubuntu1.3",
            "binary_name": "gpgv"
        },
        {
            "binary_version": "2.2.4-1ubuntu1.3",
            "binary_name": "gpgv-static"
        },
        {
            "binary_version": "2.2.4-1ubuntu1.3",
            "binary_name": "gpgv-win32"
        },
        {
            "binary_version": "2.2.4-1ubuntu1.3",
            "binary_name": "gpgv2"
        },
        {
            "binary_version": "2.2.4-1ubuntu1.3",
            "binary_name": "scdaemon"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-14855.json"
gnupg1

Package

Name
gnupg1
Purl
pkg:deb/ubuntu/gnupg1@1.4.22-3ubuntu2?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.4.22-1ubuntu1
1.4.22-3ubuntu1
1.4.22-3ubuntu2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.4.22-3ubuntu2",
            "binary_name": "gnupg1"
        },
        {
            "binary_version": "1.4.22-3ubuntu2",
            "binary_name": "gnupg1-l10n"
        },
        {
            "binary_version": "1.4.22-3ubuntu2",
            "binary_name": "gpgv1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-14855.json"
Ubuntu:20.04:LTS
gnupg1

Package

Name
gnupg1
Purl
pkg:deb/ubuntu/gnupg1@1.4.23-1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.4.23-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.4.23-1",
            "binary_name": "gnupg1"
        },
        {
            "binary_version": "1.4.23-1",
            "binary_name": "gnupg1-l10n"
        },
        {
            "binary_version": "1.4.23-1",
            "binary_name": "gpgv1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-14855.json"
Ubuntu:22.04:LTS
gnupg1

Package

Name
gnupg1
Purl
pkg:deb/ubuntu/gnupg1@1.4.23-1.1build1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.4.23-1.1build1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.4.23-1.1build1",
            "binary_name": "gnupg1"
        },
        {
            "binary_version": "1.4.23-1.1build1",
            "binary_name": "gnupg1-l10n"
        },
        {
            "binary_version": "1.4.23-1.1build1",
            "binary_name": "gpgv1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-14855.json"
Ubuntu:24.04:LTS
gnupg1

Package

Name
gnupg1
Purl
pkg:deb/ubuntu/gnupg1@1.4.23-2?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.4.23-1.1build2
1.4.23-1.1build4
1.4.23-2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.4.23-2",
            "binary_name": "gnupg1"
        },
        {
            "binary_version": "1.4.23-2",
            "binary_name": "gnupg1-l10n"
        },
        {
            "binary_version": "1.4.23-2",
            "binary_name": "gpgv1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-14855.json"
Ubuntu:25.10
gnupg1

Package

Name
gnupg1
Purl
pkg:deb/ubuntu/gnupg1@1.4.23-3?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.4.23-3

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.4.23-3",
            "binary_name": "gnupg1"
        },
        {
            "binary_version": "1.4.23-3",
            "binary_name": "gnupg1-l10n"
        },
        {
            "binary_version": "1.4.23-3",
            "binary_name": "gpgv1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-14855.json"
Ubuntu:Pro:14.04:LTS
gnupg

Package

Name
gnupg
Purl
pkg:deb/ubuntu/gnupg@1.4.16-1ubuntu2.6+esm2?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.4.14-1ubuntu2
1.4.15-1.1ubuntu1
1.4.15-1.1ubuntu2
1.4.15-2ubuntu1
1.4.16-1ubuntu1
1.4.16-1ubuntu2
1.4.16-1ubuntu2.1
1.4.16-1ubuntu2.3
1.4.16-1ubuntu2.4
1.4.16-1ubuntu2.5
1.4.16-1ubuntu2.6
1.4.16-1ubuntu2.6+esm1
1.4.16-1ubuntu2.6+esm2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.4.16-1ubuntu2.6+esm2",
            "binary_name": "gnupg"
        },
        {
            "binary_version": "1.4.16-1ubuntu2.6+esm2",
            "binary_name": "gnupg-curl"
        },
        {
            "binary_version": "1.4.16-1ubuntu2.6+esm2",
            "binary_name": "gpgv"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-14855.json"
Ubuntu:Pro:16.04:LTS
gnupg

Package

Name
gnupg
Purl
pkg:deb/ubuntu/gnupg@1.4.20-1ubuntu3.3+esm3?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.4.18-7ubuntu1
1.4.19-6ubuntu1
1.4.20-1ubuntu1
1.4.20-1ubuntu2
1.4.20-1ubuntu3
1.4.20-1ubuntu3.1
1.4.20-1ubuntu3.2
1.4.20-1ubuntu3.3
1.4.20-1ubuntu3.3+esm2
1.4.20-1ubuntu3.3+esm3

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.4.20-1ubuntu3.3+esm3",
            "binary_name": "gnupg"
        },
        {
            "binary_version": "1.4.20-1ubuntu3.3+esm3",
            "binary_name": "gnupg-curl"
        },
        {
            "binary_version": "1.4.20-1ubuntu3.3+esm3",
            "binary_name": "gpgv"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-14855.json"
gnupg2

Package

Name
gnupg2
Purl
pkg:deb/ubuntu/gnupg2@2.1.11-6ubuntu2.1+esm3?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.0.28-3ubuntu1
2.0.28-3ubuntu2
2.1.11-6ubuntu1
2.1.11-6ubuntu2
2.1.11-6ubuntu2.1
2.1.11-6ubuntu2.1+esm1
2.1.11-6ubuntu2.1+esm2
2.1.11-6ubuntu2.1+esm3

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.1.11-6ubuntu2.1+esm3",
            "binary_name": "dirmngr"
        },
        {
            "binary_version": "2.1.11-6ubuntu2.1+esm3",
            "binary_name": "gnupg-agent"
        },
        {
            "binary_version": "2.1.11-6ubuntu2.1+esm3",
            "binary_name": "gnupg2"
        },
        {
            "binary_version": "2.1.11-6ubuntu2.1+esm3",
            "binary_name": "gpgsm"
        },
        {
            "binary_version": "2.1.11-6ubuntu2.1+esm3",
            "binary_name": "gpgv2"
        },
        {
            "binary_version": "2.1.11-6ubuntu2.1+esm3",
            "binary_name": "scdaemon"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-14855.json"