Ubuntu 3964-1: python-gnupg vulnerabilities

    Date02 May 2019
    Posted ByLinuxSecurity Advisories
    Several security issues were fixed in python-gnupg
    Ubuntu Security Notice USN-3964-1
    May 02, 2019
    python-gnupg vulnerabilities
    A security issue affects these releases of Ubuntu and its derivatives:
    - Ubuntu 19.04
    - Ubuntu 18.10
    - Ubuntu 18.04 LTS
    Several security issues were fixed in python-gnupg
    Software Description:
    - python-gnupg: Python wrapper for the GNU Privacy Guard 
    Marcus Brinkmann discovered that GnuPG before 2.2.8 improperly handled certain
    command line parameters. A remote attacker could use this to spoof the output of
    GnuPG and cause unsigned e-mail to appear signed.
    It was discovered that python-gnupg incorrectly handled the GPG passphrase. A
    remote attacker could send a specially crafted passphrase that would allow them
    to control the output of encryption and decryption operations.
    Update instructions:
    The problem can be corrected by updating your system to the following
    package versions:
    Ubuntu 19.04:
      python-gnupg                    0.4.3-1ubuntu1.19.04.1
      python3-gnupg                   0.4.3-1ubuntu1.19.04.1
    Ubuntu 18.10:
      python-gnupg                    0.4.1-1ubuntu1.18.10.1
      python3-gnupg                   0.4.1-1ubuntu1.18.10.1
    Ubuntu 18.04 LTS:
      python-gnupg                    0.4.1-1ubuntu1.18.04.1
      python3-gnupg                   0.4.1-1ubuntu1.18.04.1
    In general, a standard system update will make all the necessary changes.
      CVE-2018-12020, CVE-2019-6690
    Package Information:
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    Do you read our distribution advisories on a regular basis?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"84","title":"Yes, for a single distribution","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"85","title":"Yes, for multiple distributions","votes":"6","type":"x","order":"2","pct":60,"resources":[]},{"id":"86","title":"No","votes":"4","type":"x","order":"3","pct":40,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.