Description of problem: GnuPG is vulnerable to status line injection via a long notation name. Version-Release number of selected component (if applicable): gnupg2-2.3.4-1.fc35 How reproducible: 100% Steps to Reproduce: See https://www.openwall.com/lists/oss-security/2022/06/30/1 Actual results: Fedora’s GnuPG is vulnerable. Expected results: Fedora’s GnuPG is not vulnerable. Additional info: https://www.openwall.com/lists/oss-security/2022/06/30/1
This is CVE-2022-34903
FEDORA-2022-aa14d396dd has been submitted as an update to Fedora 36. https://bodhi.fedoraproject.org/updates/FEDORA-2022-aa14d396dd
FEDORA-2022-aa14d396dd has been pushed to the Fedora 36 testing repository. Soon you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2022-aa14d396dd` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2022-aa14d396dd See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.
@jjelen would it be possible to patch this in Fedora 35 too?
Its building: https://koji.fedoraproject.org/koji/taskinfo?taskID=89159649
FEDORA-2022-1124e5882d has been submitted as an update to Fedora 35. https://bodhi.fedoraproject.org/updates/FEDORA-2022-1124e5882d
FEDORA-2022-aa14d396dd has been pushed to the Fedora 36 stable repository. If problem still persists, please make note of it in this bug report.
FEDORA-2022-1124e5882d has been pushed to the Fedora 35 testing repository. Soon you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2022-1124e5882d` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2022-1124e5882d See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.
FEDORA-2022-1124e5882d has been pushed to the Fedora 35 stable repository. If problem still persists, please make note of it in this bug report.