Gradle usage of long IDs for PGP keys opens potential for collision attacks
CVE-2023-26053
What is CVE-2023-26053?
This vulnerability in the Gradle build tool allows for a collision attack targeting long IDs (64bits) used for PGP keys during dependency verification. Users who include long IDs in the 'trusted-key' or 'pgp' elements of their dependency verification metadata may be exposed to potential security threats. The recommended fix is to ensure that only full fingerprint IDs are utilized in the 'trusted-key' or 'pgp' elements. Recent patches have been applied in Gradle versions 6.9.4, 7.6.1, and 8.0, addressing this issue to improve the integrity of build processes. For successful protection against this vulnerability, it's imperative to apply the latest updates.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
gradle >= 6.2, < 6.9.4 < 6.2, 6.9.4
gradle >= 7.0.0, < 7.6.1 < 7.0.0, 7.6.1
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
