USN-3964-1: python-gnupg vulnerabilities
2 May 2019
Several security issues were fixed in python-gnupg
Releases
Packages
- python-gnupg - Python wrapper for the GNU Privacy Guard
Details
Marcus Brinkmann discovered that GnuPG before 2.2.8 improperly handled certain
command line parameters. A remote attacker could use this to spoof the output of
GnuPG and cause unsigned e-mail to appear signed.
(CVE-2018-12020)
It was discovered that python-gnupg incorrectly handled the GPG passphrase. A
remote attacker could send a specially crafted passphrase that would allow them
to control the output of encryption and decryption operations.
(CVE-2019-6690)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 19.04
Ubuntu 18.10
Ubuntu 18.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-3675-3: gnupg
- USN-3675-2: gnupg2, gpgv-udeb, gpgv2, dirmngr, gpgsm, gnupg-agent, scdaemon
- USN-3675-1: gnupg-utils, dirmngr, gnupg-l10n, gpg-wks-server, scdaemon, gnupg, gpgv-udeb, gpg-wks-client, gpgconf, gnupg-udeb, gpgv-win32, gpgv2, gpgv, gpgsm, gnupg-curl, gnupg-agent, gpg, gpg-agent, gnupg2, gpgv-static
- USN-4839-1: python-gnupg, python3-gnupg