Your submission was sent successfully! Close

USN-3675-3: GnuPG vulnerability

18 June 2018

GnuPG could be made to incorrectly interpret the status of the cryptographic operation if it received specially crafted file.



  • gnupg - GNU privacy guard - a free PGP replacement


USN-3675-1 fixed a vulnerability in GnuPG. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

Marcus Brinkmann discovered that during decryption or verification,
GnuPG did not properly filter out terminal sequences when reporting the
original filename. An attacker could use this to specially craft a file
that would cause an application parsing GnuPG output to incorrectly
interpret the status of the cryptographic operation reported by GnuPG.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.04

In general, a standard system update will make all the necessary changes.


Related notices

  • USN-3675-2: gpgsm, gnupg2, dirmngr, gpgv2, gnupg-agent, scdaemon, gpgv-udeb
  • USN-3675-1: gpgv, gpgconf, gnupg-agent, gnupg-curl, scdaemon, gpg, gpgv-win32, gpgv-static, dirmngr, gpgv2, gpgv-udeb, gpg-agent, gnupg, gpg-wks-client, gpg-wks-server, gnupg-l10n, gnupg2, gpgsm, gnupg-udeb, gnupg-utils
  • USN-3964-1: python-gnupg, python3-gnupg