--------------------------------------------------------------------------------
Fedora EPEL Update Notification
FEDORA-EPEL-2022-d9c834f286
2022-07-28 00:59:19.449402
--------------------------------------------------------------------------------
Name : gnupg1
Product : Fedora EPEL 9
Version : 1.4.23
Release : 19.el9
URL :
http://www.gnupg.org/
Summary : A GNU utility for secure communication and data storage
Description :
GnuPG (GNU Privacy Guard) is a GNU utility for encrypting data and
creating digital signatures. GnuPG has advanced key management
capabilities and is compliant with the proposed OpenPGP Internet
standard described in RFC2440. Since GnuPG doesn't use any patented
algorithm, it is not compatible with any version of PGP2 (PGP2.x uses
only IDEA for symmetric-key encryption, which is patented worldwide).
--------------------------------------------------------------------------------
Update Information:
Security fix for CVE-2022-34903
--------------------------------------------------------------------------------
ChangeLog:
* Tue Jul 19 2022 Brian C. Lane <bcl(a)redhat.com> - 1.4.23-19
- g10/status.c: Backport fix for status buffer overrun
Resolves: rhbz#rhbz#2108445
- Note that this includes the fix for [CVE-2022-34903]
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2102868 - CVE-2022-34903 gpg: Signature spoofing via status line injection
https://bugzilla.redhat.com/show_bug.cgi?id=2102868
--------------------------------------------------------------------------------
This update can be installed with the "yum" update programs. Use
su -c 'yum update gnupg1' at the command line.
For more information, refer to "YUM", available at
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7\
/html/System_Administrators_Guide/ch-yum.html
All packages are signed with the Fedora EPEL GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------