drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in python-gnupg
Name: |
Zwei Probleme in python-gnupg |
|
ID: |
USN-3964-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 18.04 LTS, Ubuntu 18.10, Ubuntu 19.04 |
|
Datum: |
Do, 2. Mai 2019, 18:46 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12020 |
|
Applikationen: |
python-gnupg |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============5931142973838882966== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="VedlU4XL3XIiOHiyGrYqtuepKnVdDIjmK"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --VedlU4XL3XIiOHiyGrYqtuepKnVdDIjmK Content-Type: multipart/mixed; boundary="Z16sLdy62K1SP3EaYBWtSvHkk4sR1itoy"; protected-headers="v1" From: Mike Salvatore <mike.salvatore@canonical.com> To: ubuntu-security-announce@lists.ubuntu.com Cc: Ubuntu Security <security@ubuntu.com> Message-ID: <af8cce3e-b8af-ae79-5c6a-0f45d49ecf34@canonical.com> Subject: [USN-3964-1] python-gnupg vulnerabilities References: <20190502144823.AE7F226C26CB@lillypilly.canonical.com> In-Reply-To: <20190502144823.AE7F226C26CB@lillypilly.canonical.com>
--Z16sLdy62K1SP3EaYBWtSvHkk4sR1itoy Content-Type: text/plain; charset=utf-8 Content-Language: en-U Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-3964-1 May 02, 2019
python-gnupg vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.04 - Ubuntu 18.10 - Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in python-gnupg
Software Description: - python-gnupg: Python wrapper for the GNU Privacy Guard
Details:
Marcus Brinkmann discovered that GnuPG before 2.2.8 improperly handled certain command line parameters. A remote attacker could use this to spoof the output of GnuPG and cause unsigned e-mail to appear signed. (CVE-2018-12020)
It was discovered that python-gnupg incorrectly handled the GPG passphrase. A remote attacker could send a specially crafted passphrase that would allow them to control the output of encryption and decryption operations. (CVE-2019-6690)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 19.04: python-gnupg 0.4.3-1ubuntu1.19.04.1 python3-gnupg 0.4.3-1ubuntu1.19.04.1
Ubuntu 18.10: python-gnupg 0.4.1-1ubuntu1.18.10.1 python3-gnupg 0.4.1-1ubuntu1.18.10.1
Ubuntu 18.04 LTS: python-gnupg 0.4.1-1ubuntu1.18.04.1 python3-gnupg 0.4.1-1ubuntu1.18.04.1
In general, a standard system update will make all the necessary changes.
References: https://usn.ubuntu.com/usn/usn-3964-1 CVE-2018-12020, CVE-2019-6690
Package Information: https://launchpad.net/ubuntu/+source/python-gnupg/0.4.3-1ubuntu1.19.04.1 https://launchpad.net/ubuntu/+source/python-gnupg/0.4.1-1ubuntu1.18.10.1 https://launchpad.net/ubuntu/+source/python-gnupg/0.4.1-1ubuntu1.18.04.1
--Z16sLdy62K1SP3EaYBWtSvHkk4sR1itoy--
--VedlU4XL3XIiOHiyGrYqtuepKnVdDIjmK Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEwZbe96kJeWh2OITRdyg1Qz0oXX0FAlzLE+UACgkQdyg1Qz0o XX1laA//eVZkqukAEZrGBzJw4n/5Ba9b14/POGuCodH391D82neaSEVSACqHvdZk 7zKGwysto4dnaxKcT0XsSWx62Tc8EnDSHS2uUZATN8Zqd/DJLxi2r7cl3NQMt0sO SV4A9YMfRfyIU9PkhHatT1vqjvt9eJ8pgMlIAbmeG9VRilIf2KHS47o4gbuxEUDL VjMj3qJCEeU7WvmKGOrI8RWF38BWup010HxXCu9LeIz/vA6J1iaNVFdksYAjLE5C 03lPfWxy1BnwvDUXubSM6RIkk/ADf+wvaO0olzNyg7AVlNd+T5yE7WHaMzzCc9f2 96NvnOiEZE4RFf7YH0rqDWhPdoN+Cb0IFFQFYRh3mJHWJ1Bl9bgWn1XkNSOuwx3q S4kcHhMJqmBnvfRMmmNDEUlCnu0PwqPcGgTvCkWYQelDkD8NlcA2dHzQAzK4L7SF bU7Rr5VoVypugg3o99g6NTQ35jsaUjkmD1nxGYAc8CGD+sZZbERP0Qj5loWDRoT5 S/Zjt+0fnikabzdfYdcqVopP3yTCOlc3BjoUvrKxB4x+YUBHGr3RlN9NUZ5Ft1Xp SprIYqBlf/eTjPmOBtgeFEazy9U06rqyVbeB5h2aapnTjuFkswzt7qJDVuzc9AIS zvREAxGxkOmiRgFh+fv66XUBSiHAbUVwWX68tG3DopJYm2I9gkM= =njRb -----END PGP SIGNATURE-----
--VedlU4XL3XIiOHiyGrYqtuepKnVdDIjmK--
--===============5931142973838882966== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============5931142973838882966==--
|
|
|
|