First published: Fri Jun 08 2018(Updated: )
GnuPG before version 2.2.8 does not properly sanitize original filenames of signed or encrypted messages allowing for the insertion of line feeds and other control characters. An attacker could exploit this by injecting such characters to craft status messages and fake the validity of signatures. External Reference: <a href="https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html">https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html</a> Upstream Issue: <a href="https://dev.gnupg.org/T4012">https://dev.gnupg.org/T4012</a> Upstream Patches: <a href="https://dev.gnupg.org/rG2326851c60793653069494379b16d84e4c10a0ac">https://dev.gnupg.org/rG2326851c60793653069494379b16d84e4c10a0ac</a> <a href="https://dev.gnupg.org/rG210e402acd3e284b32db1901e43bf1470e659e49">https://dev.gnupg.org/rG210e402acd3e284b32db1901e43bf1470e659e49</a> <a href="https://dev.gnupg.org/rG13f135c7a252cc46cff96e75968d92b6dc8dce1b">https://dev.gnupg.org/rG13f135c7a252cc46cff96e75968d92b6dc8dce1b</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Eus | =7.5 | |
Redhat Enterprise Linux Server Eus | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
Canonical Ubuntu Linux | =19.04 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Gnupg Gnupg | <2.2.8 | |
redhat/gnupg2 | <2.2.8 | 2.2.8 |
debian/enigmail | 2:2.2.4-0.3 | |
debian/gnupg1 | 1.4.23-1.1 1.4.23-2 | |
debian/gnupg2 | 2.2.27-2+deb11u2 2.2.40-1.1 2.2.45-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.