The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of SHA1: information disclosure via Chosen-Prefix Collision

Synthesis of the vulnerability 

An attacker can trigger a Chosen-Prefix Collision on SHA1, in order to alter a signature, to obtain sensitive information.
Vulnerable products: GnuPG, Ubuntu.
Severity of this weakness: 1/4.
Creation date: 09/01/2020.
Références of this bulletin: Shambles, USN-4233-1, USN-4233-2, VIGILANCE-VUL-31290.

Description of the vulnerability 

An attacker can trigger a Chosen-Prefix Collision on SHA1, in order to alter a signature, to obtain sensitive information.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This weakness note impacts software or systems such as GnuPG, Ubuntu.

Our Vigil@nce team determined that the severity of this threat note is low.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this computer weakness.

Solutions for this threat 

GnuPG: version 2.2.18.
The version 2.2.18 is fixed:
  https://gnupg.org/download/

Ubuntu: new libgnutls30 packages.
New packages are available:
  Ubuntu 18.04 LTS: libgnutls30 3.5.18-1ubuntu1.3
  Ubuntu 16.04 LTS: libgnutls30 3.4.10-4ubuntu1.7
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a software vulnerabilities bulletin. The Vigil@nce vulnerability database contains several thousand vulnerabilities.