Login
Newsletter
Werbung

Sicherheit: Mangelnde Prüfung von Signaturen in gnupg
Aktuelle Meldungen Distributionen
Name: Mangelnde Prüfung von Signaturen in gnupg
ID: FEDORA-2018-69780fc4d7
Distribution: Fedora
Plattformen: Fedora 27
Datum: Do, 5. Juli 2018, 22:54
Referenzen: https://bugzilla.redhat.com/show_bug.cgi?id=1589802
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12020
Applikationen: The GNU Privacy Guard

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2018-69780fc4d7
2018-07-05 15:16:30.994795
-------------------------------------------------------------------------------
-

Name : gnupg
Product : Fedora 27
Version : 1.4.23
Release : 1.fc27
URL : http://www.gnupg.org/
Summary : A GNU utility for secure communication and data storage
Description :
GnuPG (GNU Privacy Guard) is a GNU utility for encrypting data and
creating digital signatures. GnuPG has advanced key management
capabilities and is compliant with the proposed OpenPGP Internet
standard described in RFC2440. Since GnuPG doesn't use any patented
algorithm, it is not compatible with any version of PGP2 (PGP2.x uses
only IDEA for symmetric-key encryption, which is patented worldwide).

-------------------------------------------------------------------------------
-
Update Information:

- New upstream v1.4.23 (#1589802,#1589620,#1589624) - Remove patches included
in
upstream release - Note that this includes the fix for [CVE-2018-12020] ----
- doc Remove documentation for future option faked sys - build Don't use
dev
srandom on OpenBSD - Do not use C99 feature - g10 Fix regexp sanitization - g10
Push compress filter only if compressed - gpg Sanitize diagnostic with the
original file name [CVE-2018-12020]
-------------------------------------------------------------------------------
-
ChangeLog:

* Fri Jun 15 2018 Brian C. Lane <bcl@redhat.com> - 1.4.23-1
- New upstream v1.4.23 (#1589802,#1589620,#1589624)
- Remove patches included in upstream release
- Note that this includes the fix for [CVE-2018-12020]
* Fri Jun 8 2018 Brian C. Lane <bcl@redhat.com> - 1.4.22-4
- doc Remove documentation for future option faked sys
- build Don't use dev srandom on OpenBSD
- Do not use C99 feature
- g10 Fix regexp sanitization
- g10 Push compress filter only if compressed
- gpg Sanitize diagnostic with the original file name [CVE-2018-12020]
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1589624 - CVE-2018-12020 gnupg: gnupg2: Improper sanitization of
filenames allows for the display of fake status messages and the bypass of signature verification [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1589624
[ 2 ] Bug #1589802 - gnupg-1.4.23 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1589802
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2018-69780fc4d7' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QC7Y72LI3TU6QVG6T2YZRHTXTP4TGTA2/
Pro-Linux
Unterstützer werden
Neue Nachrichten
Werbung