[USN-3675-3] GnuPG vulnerability


–===============1000104963877305100==
Content-Type: multipart/signed; micalg=”pgp-sha256″;
protocol=”application/pgp-signature”; boundary=”=-k/82YsARbHptCOk9dFz4″

–=-k/82YsARbHptCOk9dFz4
Content-Type: text/plain; charset=”UTF-8″
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3675-3
June 18, 2018

gnupg vulnerability
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 ESM

Summary:

GnuPG could be made to incorrectly interpret the status of the
cryptographic operation if it received specially crafted file.

Software Description:
– gnupg: GNU privacy guard – a free PGP replacement

Details:

USN-3675-1 fixed a vulnerability in GnuPG. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

=C2=A0Marcus Brinkmann discovered that during decryption or verification,
=C2=A0GnuPG did not properly filter out terminal sequences when reporting
=C2=A0the original filename. An attacker could use this to specially craft =
a
=C2=A0file that would cause an application parsing GnuPG output to
=C2=A0incorrectly interpret the status of the cryptographic operation
=C2=A0reported by GnuPG. (CVE-2018-12020)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
=C2=A0 gnupg=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A01.4.11-3ubuntu2.11

In general, a standard system update will make all the necessary
changes.

References:
=C2=A0 https://usn.ubuntu.com/usn/usn-3675-3
=C2=A0 https://usn.ubuntu.com/usn/usn-3675-1
=C2=A0 CVE-2018-12020
–=-k/82YsARbHptCOk9dFz4
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=b6d1
—–END PGP SIGNATURE—–

–=-k/82YsARbHptCOk9dFz4–

–===============1000104963877305100==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============1000104963877305100==–