-------------------------------------------------------------------------------- Fedora EPEL Update Notification FEDORA-EPEL-2022-3f3b227ed1 2022-07-28 00:45:36.037951 --------------------------------------------------------------------------------
Name : gnupg1 Product : Fedora EPEL 8 Version : 1.4.23 Release : 15.el8 URL : http://www.gnupg.org/ Summary : A GNU utility for secure communication and data storage Description : GnuPG (GNU Privacy Guard) is a GNU utility for encrypting data and creating digital signatures. GnuPG has advanced key management capabilities and is compliant with the proposed OpenPGP Internet standard described in RFC2440. Since GnuPG doesn't use any patented algorithm, it is not compatible with any version of PGP2 (PGP2.x uses only IDEA for symmetric-key encryption, which is patented worldwide).
-------------------------------------------------------------------------------- Update Information:
Security fix for CVE-2022-34903 -------------------------------------------------------------------------------- ChangeLog:
* Tue Jul 19 2022 Brian C. Lane bcl@redhat.com - 1.4.23-15 - g10/status.c: Backport fix for status buffer overrun Resolves: rhbz#2102868 - Note that this includes the fix for [CVE-2022-34903] -------------------------------------------------------------------------------- References:
[ 1 ] Bug #2102868 - CVE-2022-34903 gpg: Signature spoofing via status line injection https://bugzilla.redhat.com/show_bug.cgi?id=2102868 --------------------------------------------------------------------------------
This update can be installed with the "yum" update programs. Use su -c 'yum update gnupg1' at the command line. For more information, refer to "YUM", available at https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7%5C /html/System_Administrators_Guide/ch-yum.html
All packages are signed with the Fedora EPEL GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------