Packages
- python-gnupg - Python wrapper for the GNU Privacy Guard
Details
Marcus Brinkmann discovered that GnuPG before 2.2.8 improperly handled certain
command line parameters. A remote attacker could use this to spoof the output of
GnuPG and cause unsigned e-mail to appear signed.
(CVE-2018-12020)
It was discovered that python-gnupg incorrectly handled the GPG passphrase. A
remote attacker could send a specially crafted passphrase that would allow them
to control the output of encryption and decryption operations.
(CVE-2019-6690)
Marcus Brinkmann discovered that GnuPG before 2.2.8 improperly handled certain
command line parameters. A remote attacker could use this to spoof the output of
GnuPG and cause unsigned e-mail to appear signed.
(CVE-2018-12020)
It was discovered that python-gnupg incorrectly handled the GPG passphrase. A
remote attacker could send a specially crafted passphrase that would allow them
to control the output of encryption and decryption operations.
(CVE-2019-6690)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
19.04 disco | python-gnupg – 0.4.3-1ubuntu1.19.04.1 | ||
python3-gnupg – 0.4.3-1ubuntu1.19.04.1 | |||
18.10 cosmic | python-gnupg – 0.4.1-1ubuntu1.18.10.1 | ||
python3-gnupg – 0.4.1-1ubuntu1.18.10.1 | |||
18.04 bionic | python-gnupg – 0.4.1-1ubuntu1.18.04.1 | ||
python3-gnupg – 0.4.1-1ubuntu1.18.04.1 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.