vulnerability
Oracle Linux: CVE-2022-34903: ELSA-2022-6463: gnupg2 security update (MODERATE) (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:H/Au:N/C:N/I:C/A:N) | 06/30/2022 | 09/14/2022 | 01/07/2025 |
Severity
5
CVSS
(AV:N/AC:H/Au:N/C:N/I:C/A:N)
Published
06/30/2022
Added
09/14/2022
Modified
01/07/2025
Description
GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.
A vulnerability was found in GnuPG. This issue occurs due to an escape detection loop at the write_status_text_and_buffer() function in g10/cpr.c. This flaw allows a malicious actor to bypass access control.
A vulnerability was found in GnuPG. This issue occurs due to an escape detection loop at the write_status_text_and_buffer() function in g10/cpr.c. This flaw allows a malicious actor to bypass access control.
Solution(s)
oracle-linux-upgrade-gnupg2oracle-linux-upgrade-gnupg2-smime

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.