First published: Thu May 02 2019(Updated: )
Marcus Brinkmann discovered that GnuPG before 2.2.8 improperly handled certain command line parameters. A remote attacker could use this to spoof the output of GnuPG and cause unsigned e-mail to appear signed. (CVE-2018-12020) It was discovered that python-gnupg incorrectly handled the GPG passphrase. A remote attacker could send a specially crafted passphrase that would allow them to control the output of encryption and decryption operations. (CVE-2019-6690)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python-gnupg | <0.4.3-1ubuntu1.19.04.1 | 0.4.3-1ubuntu1.19.04.1 |
Ubuntu OpenSSH Client | =19.04 | |
All of | ||
ubuntu/python3-gnupg | <0.4.3-1ubuntu1.19.04.1 | 0.4.3-1ubuntu1.19.04.1 |
Ubuntu OpenSSH Client | =19.04 | |
All of | ||
ubuntu/python-gnupg | <0.4.1-1ubuntu1.18.10.1 | 0.4.1-1ubuntu1.18.10.1 |
Ubuntu OpenSSH Client | =18.10 | |
All of | ||
ubuntu/python3-gnupg | <0.4.1-1ubuntu1.18.10.1 | 0.4.1-1ubuntu1.18.10.1 |
Ubuntu OpenSSH Client | =18.10 | |
All of | ||
ubuntu/python-gnupg | <0.4.1-1ubuntu1.18.04.1 | 0.4.1-1ubuntu1.18.04.1 |
Ubuntu OpenSSH Client | =18.04 | |
All of | ||
ubuntu/python3-gnupg | <0.4.1-1ubuntu1.18.04.1 | 0.4.1-1ubuntu1.18.04.1 |
Ubuntu OpenSSH Client | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this advisory is CVE-2018-12020.
The affected software is python-gnupg and python3-gnupg.
The severity of CVE-2018-12020 is not specified in the advisory.
A remote attacker could use CVE-2018-12020 to spoof the output of GnuPG and cause unsigned e-mail to appear signed.
To fix this vulnerability, update python-gnupg and python3-gnupg to version 0.4.3-1ubuntu1.19.04.1 (for Ubuntu 19.04), 0.4.1-1ubuntu1.18.10.1 (for Ubuntu 18.10), or 0.4.1-1ubuntu1.18.04.1 (for Ubuntu 18.04).