USN-4839-1: python-gnupg vulnerabilities
15 March 2021
Several security issues were fixed in python-gnupg.
Releases
Packages
- python-gnupg - Python wrapper for the Gnu Privacy Guard (Python 2.x)
Details
Marcus Brinkmann discovered that python-gnupg improperly handled certain
command line parameters. A remote attacker could use this to spoof the
output of python-gnupg and cause unsigned e-mail to appear signed.
(CVE-2018-12020)
It was discovered that python-gnupg incorrectly handled the GPG passphrase.
A remote attacker could send a specially crafted passphrase that would
allow them to control the output of encryption and decryption operations.
(CVE-2019-6690)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
python3-gnupg
-
0.3.8-2ubuntu0.1~esm1
Available with Ubuntu Pro
-
python-gnupg
-
0.3.8-2ubuntu0.1~esm1
Available with Ubuntu Pro
Ubuntu 14.04
-
python3-gnupg
-
0.3.6-1ubuntu0.1~esm1
Available with Ubuntu Pro
-
python-gnupg
-
0.3.6-1ubuntu0.1~esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-3964-1: python-gnupg, python3-gnupg
- USN-3675-3: gnupg
- USN-3675-2: gnupg2, gpgsm, scdaemon, gpgv2, gnupg-agent, dirmngr, gpgv-udeb
- USN-3675-1: gpgv, gpg-wks-client, gnupg, gnupg2, gpgsm, gnupg-curl, gnupg-l10n, gpg-agent, gpg-wks-server, gpgv-static, gnupg-utils, dirmngr, gpgv-win32, gnupg-udeb, scdaemon, gpgv2, gnupg-agent, gpg, gpgconf, gpgv-udeb