Name | CVE-2018-12020 |
Description | mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2862-1, DSA-4222-1, DSA-4223-1, DSA-4224-1 |
Debian Bugs | 901088 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
enigmail (PTS) | bullseye | 2:2.2.4-0.3 | fixed |
gnupg1 (PTS) | bookworm, bullseye | 1.4.23-1.1 | fixed |
sid, trixie | 1.4.23-2 | fixed | |
gnupg2 (PTS) | bullseye (security), bullseye | 2.2.27-2+deb11u2 | fixed |
bookworm | 2.2.40-1.1 | fixed | |
sid, trixie | 2.2.45-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
enigmail | source | jessie | (unfixed) | end-of-life | ||
enigmail | source | (unstable) | 2:2.0.7-1 | |||
gnupg | source | jessie | 1.4.18-7+deb8u5 | DSA-4224-1 | ||
gnupg | source | (unstable) | (unfixed) | |||
gnupg1 | source | stretch | 1.4.21-4+deb9u1 | DSA-4223-1 | ||
gnupg1 | source | (unstable) | 1.4.22-5 | 901088 | ||
gnupg2 | source | jessie | 2.0.26-6+deb8u2 | DSA-4222-1 | ||
gnupg2 | source | stretch | 2.1.18-8~deb9u2 | DSA-4222-1 | ||
gnupg2 | source | (unstable) | 2.2.8-1 | |||
python-gnupg | source | stretch | 0.3.9-1+deb9u1 | DLA-2862-1 |
[jessie] - enigmail <end-of-life> (see https://lists.debian.org/debian-lts-announce/2019/02/msg00002.html)
https://dev.gnupg.org/T4012
https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=210e402acd3e284b32db1901e43bf1470e659e49 (STABLE-BRANCH-2-2)
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=2326851c60793653069494379b16d84e4c10a0ac (STABLE-BRANCH-1-4)
https://www.openwall.com/lists/oss-security/2018/06/13/10
https://neopg.io/blog/gpg-signature-spoof/