Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.852024
Category:SuSE Local Security Checks
Title:openSUSE: Security Advisory for python-python-gnupg (openSUSE-SU-2018:1722-1)
Summary:The remote host is missing an update for the 'python-python-gnupg'; package(s) announced via the openSUSE-SU-2018:1722-1 advisory.
Description:Summary:
The remote host is missing an update for the 'python-python-gnupg'
package(s) announced via the openSUSE-SU-2018:1722-1 advisory.

Vulnerability Insight:
This update for python-python-gnupg to version 0.4.3 fixes the following
issues:

The following security vulnerabilities were addressed:

- Sanitize diagnostic output of the original file name in verbose mode
(CVE-2018-12020 boo#1096745)

The following other changes were made:

- Add --no-verbose to the gpg command line, in case verbose is specified
is gpg.conf.

- Add expect_passphrase password for use on GnuPG = 2.1 when passing
passphrase to gpg via pinentry

- Provide a trust_keys method to allow setting the trust level for keys

- When the gpg executable is not found, note the path used in the
exception message

- Make error messages more informational

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended
installation methods
like YaST online_update or 'zypper patch'.

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-646=1

Affected Software/OS:
python-python-gnupg on openSUSE Leap 15.0.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-12020
BugTraq ID: 104450
http://www.securityfocus.com/bid/104450
Debian Security Information: DSA-4222 (Google Search)
https://www.debian.org/security/2018/dsa-4222
Debian Security Information: DSA-4223 (Google Search)
https://www.debian.org/security/2018/dsa-4223
Debian Security Information: DSA-4224 (Google Search)
https://www.debian.org/security/2018/dsa-4224
http://seclists.org/fulldisclosure/2019/Apr/38
http://openwall.com/lists/oss-security/2018/06/08/2
http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html
https://dev.gnupg.org/T4012
https://github.com/RUB-NDS/Johnny-You-Are-Fired
https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00027.html
http://www.openwall.com/lists/oss-security/2019/04/30/4
RedHat Security Advisories: RHSA-2018:2180
https://access.redhat.com/errata/RHSA-2018:2180
RedHat Security Advisories: RHSA-2018:2181
https://access.redhat.com/errata/RHSA-2018:2181
http://www.securitytracker.com/id/1041051
https://usn.ubuntu.com/3675-1/
https://usn.ubuntu.com/3675-2/
https://usn.ubuntu.com/3675-3/
https://usn.ubuntu.com/3964-1/
CopyrightCopyright (C) 2018 Greenbone Networks GmbH

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.