Hello, Thank you for the bug report.
Salvatore Bonaccorso <car...@debian.org> wrote: > The following vulnerability was published for gnupg2: Vulnerability? ... well, a kind of. Given this is escalated to CVE, I considered and evaluated the problem again. I think that we need to fix the checking of signature by a key which does not have a capability to certify other keys. > CVE-2018-9234[0]: > | GnuPG 2.2.4 and 2.2.5 does not enforce a configuration in which key > | certification requires an offline master Certify key, which results in > | apparently valid certifications that occurred only with access to a > | signing subkey. This description sounds not accurate for me. In my opinion, the certifications are invalid. The smartcard problem was introduced by the commits of mine: commit fbb2259d22e6c6eadc2af722bdc52922da348677 Author: NIIBE Yutaka <gni...@fsij.org> Date: Mon May 22 09:27:36 2017 +0900 g10: Fix default-key selection for signing, possibly by card. and commit 97a2394ecafaa6f58e4a1f70ecfd04408dc15606 Author: NIIBE Yutaka <gni...@fsij.org> Date: Thu Apr 27 10:33:58 2017 +0900 g10: For signing, prefer available card key when no -u option. 2.1.21 or later versions have this problem. It will be fixed in forthcoming 2.2.6. Invalid certifications can only be generated by GnuPG 2.1/2.2 with smartcard, not by 2.0 or 1.4. > Please adjust the affected versions in the BTS as needed. Can you > clarify if this affects as well way back to STABLE-BRANCH-1-4? The checking of invalid certifications would be worth to all branches of GnuPG. For the fix of checking, I'm not that confident my proposed fix of gpg-CVE-2018-9234.diff at [0] is correct or not. Review is required. [0] https://dev.gnupg.org/T3844 --