Your submission was sent successfully! Close

USN-3675-3: GnuPG vulnerability

18 June 2018

GnuPG could be made to incorrectly interpret the status of the cryptographic operation if it received specially crafted file.

Releases

Packages

  • gnupg - GNU privacy guard - a free PGP replacement

Details

USN-3675-1 fixed a vulnerability in GnuPG. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

Marcus Brinkmann discovered that during decryption or verification,
GnuPG did not properly filter out terminal sequences when reporting the
original filename. An attacker could use this to specially craft a file
that would cause an application parsing GnuPG output to incorrectly
interpret the status of the cryptographic operation reported by GnuPG.
(CVE-2018-12020)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.04

In general, a standard system update will make all the necessary changes.

References

Related notices

  • USN-3675-2: gnupg-agent, gpgsm, gpgv-udeb, dirmngr, gpgv2, scdaemon, gnupg2
  • USN-3675-1: gpgv2, gnupg2, gpg, gnupg-curl, gpg-wks-server, gpgconf, gpg-wks-client, gpgv-static, gpgv, gnupg-udeb, gnupg-agent, gnupg, gnupg-l10n, scdaemon, gpg-agent, gpgsm, gpgv-udeb, gnupg-utils, dirmngr, gpgv-win32
  • USN-3964-1: python-gnupg, python3-gnupg