GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim’s keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.
CPE | Name | Operator | Version |
---|---|---|---|
debian_linux | eq | 10.0 | |
debian_linux | eq | 11.0 | |
fedora | eq | 35 | |
fedora | eq | 36 | |
gnupg | le | 2.3.6 |
www.openwall.com/lists/oss-security/2022/07/02/1
bugs.debian.org/1014157
dev.gnupg.org/T6027
lists.fedoraproject.org/archives/list/[email protected]/message/FRLWJQ76A4UKHI3Q36BKSJKS4LFLQO33/
lists.fedoraproject.org/archives/list/[email protected]/message/NPTAR76EIZY7NQFENSOZO7U473257OVZ/
lists.fedoraproject.org/archives/list/[email protected]/message/VN63GBTMRWO36Y7BKA2WQHROAKCXKCBL/
lists.fedoraproject.org/archives/list/[email protected]/message/VU64FUVG2PRZBSHFOQRSP7KDVEIZ23OS/
security.netapp.com/advisory/ntap-20220826-0005/
www.debian.org/security/2022/dsa-5174
www.openwall.com/lists/oss-security/2022/06/30/1