USN-3675-2: GnuPG 2 vulnerability
15 June 2018
GnuPG 2 could be made to present validity information incorrectly.
Releases
Packages
- gnupg2 - GNU privacy guard - a free PGP replacement
Details
USN-3675-1 fixed a vulnerability in GnuPG 2 for Ubuntu 18.04 LTS and
Ubuntu 17.10. This update provides the corresponding update for GnuPG 2
in Ubuntu 16.04 LTS and Ubuntu 14.04 LTS.
Original advisory details:
Marcus Brinkmann discovered that during decryption or verification,
GnuPG did not properly filter out terminal sequences when reporting the
original filename. An attacker could use this to specially craft a file
that would cause an application parsing GnuPG output to incorrectly
interpret the status of the cryptographic operation reported by GnuPG.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
Ubuntu 14.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-3675-3: gnupg
- USN-3675-1: gpgsm, scdaemon, gpgv-win32, gpg-agent, gpg-wks-client, gnupg-l10n, gpg-wks-server, gpgconf, gpgv, gpg, gnupg-udeb, gpgv-udeb, gnupg2, gnupg, gpgv2, dirmngr, gnupg-curl, gnupg-agent, gnupg-utils, gpgv-static
- USN-3964-1: python3-gnupg, python-gnupg
- USN-4839-1: python3-gnupg, python-gnupg