You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa python-gnupg

Sigurnosni nedostaci programskog paketa python-gnupg

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-3964-1
May 02, 2019

python-gnupg vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 19.04
– Ubuntu 18.10
– Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in python-gnupg

Software Description:
– python-gnupg: Python wrapper for the GNU Privacy Guard

Details:

Marcus Brinkmann discovered that GnuPG before 2.2.8 improperly handled certain
command line parameters. A remote attacker could use this to spoof the output of
GnuPG and cause unsigned e-mail to appear signed.
(CVE-2018-12020)

It was discovered that python-gnupg incorrectly handled the GPG passphrase. A
remote attacker could send a specially crafted passphrase that would allow them
to control the output of encryption and decryption operations.
(CVE-2019-6690)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.04:
python-gnupg 0.4.3-1ubuntu1.19.04.1
python3-gnupg 0.4.3-1ubuntu1.19.04.1

Ubuntu 18.10:
python-gnupg 0.4.1-1ubuntu1.18.10.1
python3-gnupg 0.4.1-1ubuntu1.18.10.1

Ubuntu 18.04 LTS:
python-gnupg 0.4.1-1ubuntu1.18.04.1
python3-gnupg 0.4.1-1ubuntu1.18.04.1

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3964-1
CVE-2018-12020, CVE-2019-6690

Package Information:
https://launchpad.net/ubuntu/+source/python-gnupg/0.4.3-1ubuntu1.19.04.1
https://launchpad.net/ubuntu/+source/python-gnupg/0.4.1-1ubuntu1.18.10.1
https://launchpad.net/ubuntu/+source/python-gnupg/0.4.1-1ubuntu1.18.04.1

—–BEGIN PGP SIGNATURE—–
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=njRb
—–END PGP SIGNATURE—–

AutorJosip Papratovic
Cert idNCERT-REF-2019-05-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Ranjivost Cisco Nexus 9000 serije preklopnika

Otkrivena je ranjivost u pozadinskoj funkcionalnosti ACI (Application Centric Infrastructure) Mode Switch softvera kod Cisco Nexus 9000 Serije preklopnika. Otkrivena...

Close