{"id":"CVE-2022-34903","details":"GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.","modified":"2026-04-16T04:33:26.602136754Z","published":"2022-07-01T22:15:08.120Z","related":["ALSA-2022:6463","ALSA-2022:6602","CGA-pffx-rqr5-vjxq","SUSE-SU-2022:2529-1","SUSE-SU-2022:2546-1","SUSE-SU-2022:3144-1","openSUSE-SU-2022:2546-1","openSUSE-SU-2024:12215-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NPTAR76EIZY7NQFENSOZO7U473257OVZ/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VN63GBTMRWO36Y7BKA2WQHROAKCXKCBL/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU64FUVG2PRZBSHFOQRSP7KDVEIZ23OS/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRLWJQ76A4UKHI3Q36BKSJKS4LFLQO33/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5174"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20220826-0005/"},{"type":"FIX","url":"https://bugs.debian.org/1014157"},{"type":"FIX","url":"https://dev.gnupg.org/T6027"},{"type":"EVIDENCE","url":"http://www.openwall.com/lists/oss-security/2022/07/02/1"},{"type":"EVIDENCE","url":"https://www.openwall.com/lists/oss-security/2022/06/30/1"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"2.3.6"}]},{"events":[{"introduced":"0"},{"last_affected":"35"}]},{"events":[{"introduced":"0"},{"last_affected":"36"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-34903.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N"}]}