Impact
This is a collision attack on long IDs (64bits) for PGP keys.
Users of dependency verification in Gradle are vulnerable if they use long IDs for PGP keys in a trusted-key
or pgp
element in their dependency verification metadata file.
Patches
The fix is to fail dependency verification if anything but a fingerprint is used in a trust element in dependency verification metadata.
The problem is fixed in Gradle 8.0 and above. The problem is also patched in Gradle 6.9.4 and 7.6.1.
Workarounds
Using only full fingerprint IDs for trusted-key
or pgp
element in the metadata is a protection against this issue.
References
Questions?
- For security related issues, please email us at security@gradle.com.
- For non-security related issues, please open an issue on GitHub.
Impact
This is a collision attack on long IDs (64bits) for PGP keys.
Users of dependency verification in Gradle are vulnerable if they use long IDs for PGP keys in a
trusted-key
orpgp
element in their dependency verification metadata file.Patches
The fix is to fail dependency verification if anything but a fingerprint is used in a trust element in dependency verification metadata.
The problem is fixed in Gradle 8.0 and above. The problem is also patched in Gradle 6.9.4 and 7.6.1.
Workarounds
Using only full fingerprint IDs for
trusted-key
orpgp
element in the metadata is a protection against this issue.References
Questions?