USN-3675-3: GnuPG vulnerability
18 June 2018
GnuPG could be made to incorrectly interpret the status of the cryptographic operation if it received specially crafted file.
- gnupg - GNU privacy guard - a free PGP replacement
USN-3675-1 fixed a vulnerability in GnuPG. This update provides
the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
Marcus Brinkmann discovered that during decryption or verification,
GnuPG did not properly filter out terminal sequences when reporting the
original filename. An attacker could use this to specially craft a file
that would cause an application parsing GnuPG output to incorrectly
interpret the status of the cryptographic operation reported by GnuPG.
- USN-3675-2: gpgsm, gnupg2, dirmngr, gpgv2, gnupg-agent, scdaemon, gpgv-udeb
- USN-3675-1: gpgv, gpgconf, gnupg-agent, gnupg-curl, scdaemon, gpg, gpgv-win32, gpgv-static, dirmngr, gpgv2, gpgv-udeb, gpg-agent, gnupg, gpg-wks-client, gpg-wks-server, gnupg-l10n, gnupg2, gpgsm, gnupg-udeb, gnupg-utils
- USN-3964-1: python-gnupg, python3-gnupg