{"id":"USN-3675-2","summary":"gnupg2 vulnerability","details":"USN-3675-1 fixed a vulnerability in GnuPG 2 for Ubuntu 18.04 LTS and\nUbuntu 17.10. This update provides the corresponding update for GnuPG 2\nin Ubuntu 16.04 LTS and Ubuntu 14.04 LTS.\n\nOriginal advisory details:\n\n Marcus Brinkmann discovered that during decryption or verification,\n GnuPG did not properly filter out terminal sequences when reporting the\n original filename. An attacker could use this to specially craft a file\n that would cause an application parsing GnuPG output to incorrectly\n interpret the status of the cryptographic operation reported by GnuPG.\n","modified":"2026-04-27T15:20:09.997878Z","published":"2018-06-15T00:43:32Z","related":["UBUNTU-CVE-2018-12020"],"upstream":["CVE-2018-12020","UBUNTU-CVE-2018-12020"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3675-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-12020"}],"affected":[{"package":{"name":"gnupg2","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/gnupg2@2.0.22-3ubuntu1.4?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.22-3ubuntu1.4"}]}],"versions":["2.0.20-1ubuntu3","2.0.22-1ubuntu1","2.0.22-3ubuntu1","2.0.22-3ubuntu1.1","2.0.22-3ubuntu1.3"],"ecosystem_specific":{"binaries":[{"binary_name":"gnupg-agent","binary_version":"2.0.22-3ubuntu1.4"},{"binary_name":"gnupg2","binary_version":"2.0.22-3ubuntu1.4"},{"binary_name":"gpgsm","binary_version":"2.0.22-3ubuntu1.4"},{"binary_name":"gpgv2","binary_version":"2.0.22-3ubuntu1.4"},{"binary_name":"scdaemon","binary_version":"2.0.22-3ubuntu1.4"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3675-2.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-12020"}],"ecosystem":"Ubuntu:14.04:LTS"}}},{"package":{"name":"gnupg2","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/gnupg2@2.1.11-6ubuntu2.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.1.11-6ubuntu2.1"}]}],"versions":["2.0.28-3ubuntu1","2.0.28-3ubuntu2","2.1.11-6ubuntu1","2.1.11-6ubuntu2"],"ecosystem_specific":{"binaries":[{"binary_name":"dirmngr","binary_version":"2.1.11-6ubuntu2.1"},{"binary_name":"gnupg-agent","binary_version":"2.1.11-6ubuntu2.1"},{"binary_name":"gnupg2","binary_version":"2.1.11-6ubuntu2.1"},{"binary_name":"gpgsm","binary_version":"2.1.11-6ubuntu2.1"},{"binary_name":"gpgv2","binary_version":"2.1.11-6ubuntu2.1"},{"binary_name":"scdaemon","binary_version":"2.1.11-6ubuntu2.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3675-2.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-12020"}],"ecosystem":"Ubuntu:16.04:LTS"}}}],"schema_version":"1.7.5"}