Gradle usage of long IDs for PGP keys opens potential for collision attacks
CVE-2023-26053

6.6MEDIUM

Key Information:

Vendor

Gradle

Status
Vendor
CVE Published:
2 March 2023

What is CVE-2023-26053?

This vulnerability in the Gradle build tool allows for a collision attack targeting long IDs (64bits) used for PGP keys during dependency verification. Users who include long IDs in the 'trusted-key' or 'pgp' elements of their dependency verification metadata may be exposed to potential security threats. The recommended fix is to ensure that only full fingerprint IDs are utilized in the 'trusted-key' or 'pgp' elements. Recent patches have been applied in Gradle versions 6.9.4, 7.6.1, and 8.0, addressing this issue to improve the integrity of build processes. For successful protection against this vulnerability, it's imperative to apply the latest updates.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

gradle >= 6.2, < 6.9.4 < 6.2, 6.9.4

gradle >= 7.0.0, < 7.6.1 < 7.0.0, 7.6.1

References

CVSS V3.1

Score:
6.6
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.