6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
0.004 Low
EPSS
Percentile
74.0%
Medium
Canonical Ubuntu
Demi Marie Obenour discovered that GnuPG incorrectly handled injection in the status message. A remote attacker could possibly use this issue to forge signatures. Update Instructions: Run sudo ua fix USN-5503-1
to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dirmngr – 2.2.4-1ubuntu1.6 gpgv-static – 2.2.4-1ubuntu1.6 gnupg – 2.2.4-1ubuntu1.6 scdaemon – 2.2.4-1ubuntu1.6 gpgsm – 2.2.4-1ubuntu1.6 gpgv – 2.2.4-1ubuntu1.6 gpg – 2.2.4-1ubuntu1.6 gnupg-agent – 2.2.4-1ubuntu1.6 gnupg2 – 2.2.4-1ubuntu1.6 gnupg-l10n – 2.2.4-1ubuntu1.6 gpg-wks-client – 2.2.4-1ubuntu1.6 gpgconf – 2.2.4-1ubuntu1.6 gpg-wks-server – 2.2.4-1ubuntu1.6 gpg-agent – 2.2.4-1ubuntu1.6 gpgv-win32 – 2.2.4-1ubuntu1.6 gnupg-utils – 2.2.4-1ubuntu1.6 gpgv2 – 2.2.4-1ubuntu1.6 No subscription required
CVEs contained in this USN include: CVE-2022-34903.
Severity is medium unless otherwise noted.
Users of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:
2022-08-26: Initial vulnerability report published.
CPE | Name | Operator | Version |
---|---|---|---|
bionic stemcells | lt | 1.91 | |
cflinuxfs3 | lt | 0.309.0 | |
cf deployment | lt | 21.7.0 |
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
0.004 Low
EPSS
Percentile
74.0%