Medium
Canonical Ubuntu
Demi Marie Obenour discovered that GnuPG incorrectly handled injection in the status message. A remote attacker could possibly use this issue to forge signatures. Update Instructions: Run sudo ua fix USN-5503-1
to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dirmngr – 2.2.4-1ubuntu1.6 gpgv-static – 2.2.4-1ubuntu1.6 gnupg – 2.2.4-1ubuntu1.6 scdaemon – 2.2.4-1ubuntu1.6 gpgsm – 2.2.4-1ubuntu1.6 gpgv – 2.2.4-1ubuntu1.6 gpg – 2.2.4-1ubuntu1.6 gnupg-agent – 2.2.4-1ubuntu1.6 gnupg2 – 2.2.4-1ubuntu1.6 gnupg-l10n – 2.2.4-1ubuntu1.6 gpg-wks-client – 2.2.4-1ubuntu1.6 gpgconf – 2.2.4-1ubuntu1.6 gpg-wks-server – 2.2.4-1ubuntu1.6 gpg-agent – 2.2.4-1ubuntu1.6 gpgv-win32 – 2.2.4-1ubuntu1.6 gnupg-utils – 2.2.4-1ubuntu1.6 gpgv2 – 2.2.4-1ubuntu1.6 No subscription required
CVEs contained in this USN include: CVE-2022-34903.
Severity is medium unless otherwise noted.
Users of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:
2022-08-26: Initial vulnerability report published.
CPE | Name | Operator | Version |
---|---|---|---|
bionic stemcells | lt | 1.91 | |
cflinuxfs3 | lt | 0.309.0 | |
cf deployment | lt | 21.7.0 |