Bug 30591 - gnupg2 new security issue fixed upstream (CVE-2022-34903)
Summary: gnupg2 new security issue fixed upstream (CVE-2022-34903)
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 8
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA8-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2022-06-30 19:41 CEST by David Walser
Modified: 2022-07-13 22:45 CEST (History)
4 users (show)

See Also:
Source RPM: gnupg2-2.2.27-1.mga8.src.rpm
CVE:
Status comment: Patch available from upstream


Attachments

Description David Walser 2022-06-30 19:41:35 CEST
A security issue fixed upstream in GnuPG has been announced today (June 30):
https://www.openwall.com/lists/oss-security/2022/06/30/1

The commit that fixed the issue is referenced in the message above.
David Walser 2022-06-30 19:41:43 CEST

Status comment: (none) => Patch available from upstream

Comment 1 Lewis Smith 2022-06-30 21:03:01 CEST
Note this is M8 only. Assuming this patch is for v2... because we have v3... in Cauldron.
Assigning to Stig who has done all the latest version updates for this SRPM.

Assignee: bugsquad => smelror

Comment 2 David Walser 2022-06-30 23:05:38 CEST
The patch is in upstream master, so it'll be included in the next version update in Cauldron, so I'm not worried about that.  It'll need to be backported for Mageia 8.
Comment 3 David Walser 2022-07-02 19:53:24 CEST
A CVE has been assigned:
https://www.openwall.com/lists/oss-security/2022/07/02/1

Summary: gnupg2 new security issue fixed upstream => gnupg2 new security issue fixed upstream (CVE-2022-34903)

Comment 4 David Walser 2022-07-04 20:47:10 CEST
Debian has issued an advisory for this on July 3:
https://www.debian.org/security/2022/dsa-5174
Comment 5 David Walser 2022-07-08 20:40:06 CEST
Ubuntu has issued an advisory for this on July 5:
https://ubuntu.com/security/notices/USN-5503-1
Comment 6 David Walser 2022-07-08 21:35:46 CEST
Fedora has issued an advisory for this on July 7:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/NPTAR76EIZY7NQFENSOZO7U473257OVZ/
Comment 7 David Walser 2022-07-11 19:30:14 CEST
Version 2.3.7 has been released today (July 11) with the fix:
https://lists.gnupg.org/pipermail/gnupg-announce/2022q3/000474.html
Comment 8 Stig-Ørjan Smelror 2022-07-11 20:18:53 CEST
Advisory
========

Gnupg2 has been updated to fix CVE-2022-34903.

CVE-2022-34903: GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.

References
==========
https://lists.gnupg.org/pipermail/gnupg-announce/2022q3/000474.html
https://nvd.nist.gov/vuln/detail/CVE-2022-34903


Files
=====

Uploaded to core/updates_testing

gnupg2-2.2.36-1.mga8

from gnupg2-2.2.36-1.mga8.src.rpm

Assignee: smelror => qa-bugs

Comment 9 Herman Viaene 2022-07-13 10:40:37 CEST
MGA8-64 Plasma on Acer Aspire 5253
No installation issues.
New territory for me, so looked for info on previous bugs and on https://www.devdungeon.com/content/gpg-tutorial
Created new pair in kleopatra, then run gpg2 --list-keys and $ gpg2 --list-secret-keys commands to display the key info: worked OK.
Then used kleopatra to encrypt a text file, renamed the resulting .gpg file and decrypted this one (avoiding to overwrite the orginal .txt file) and that all worked OK.
Judging from previous updates, this test should be good enough, so OK'ing, unless someone with more indepth knowledge ......

Whiteboard: (none) => MGA8-64-OK
CC: (none) => herman.viaene

Comment 10 Thomas Andrews 2022-07-13 14:00:38 CEST
Validating. Advisory in Comment 8.

CC: (none) => andrewsfarm, sysadmin-bugs
Keywords: (none) => validated_update

Dave Hodgins 2022-07-13 19:10:29 CEST

CC: (none) => davidwhodgins
Keywords: (none) => advisory

Comment 11 Mageia Robot 2022-07-13 22:45:01 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2022-0259.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.