Bug 47563 - gnupg: Multiple issues (4.2)
gnupg: Multiple issues (4.2)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.2
All Linux
: P3 normal (vote)
: UCS 4.2-4-errata
Assigned To: Quality Assurance
Philipp Hahn
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2018-08-09 12:26 CEST by Quality Assurance
Modified: 2018-08-15 16:20 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2018-08-09 12:26:59 CEST
New Debian gnupg 1.4.18-7+deb8u5 fixes:
This update addresses the following issue(s):
* 
CVE_2018-6829 is open
* mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes. (CVE-2018-12020)

1.4.18-7+deb8u5 (Fri, 08 Jun 2018 21:55:06 +0200) * Non-maintainer upload by the Security Team. * gpg: Sanitize diagnostic with the original file name (CVE-2018-12020)
* CVE-2018-12020 gnupg2: Improper sanitization of filenames allows for the display of fake status messages and the bypass of signature verification (CVE-2018-12020)
Comment 1 Quality Assurance univentionstaff 2018-08-09 18:48:23 CEST
--- mirror/ftp/4.2/unmaintained/4.2-4/source/gnupg_1.4.18-7+deb8u4.dsc
+++ apt/ucs_4.2-0-errata4.2-4/source/gnupg_1.4.18-7+deb8u5.dsc
@@ -1,3 +1,8 @@
+1.4.18-7+deb8u5 [Fri, 08 Jun 2018 21:55:06 +0200] Salvatore Bonaccorso <carnil@debian.org>:
+
+  * Non-maintainer upload by the Security Team.
+  * gpg: Sanitize diagnostic with the original file name (CVE-2018-12020)
+
 1.4.18-7+deb8u4 [Wed, 30 Aug 2017 08:08:14 +0200] Guido Günther <agx@sigxcpu.org>:
 
   * Backport fixes for CVE-2017-7526 from STABLE-BRANCH-1-4 branch

<http://10.200.17.11/4.2-4/#6763424375066198406>
Comment 2 Philipp Hahn univentionstaff 2018-08-10 11:51:35 CEST
OK: yaml
OK: errata-announce
OK: patch
OK: piuparts

[4.2-4] 3e118feedc Bug #47563: gnupg 1.4.18-7+deb8u5
 doc/errata/staging/gnupg.yaml | 10 +++-------
 1 file changed, 3 insertions(+), 7 deletions(-)

[4.2-4] 3ad61546b2 Bug #47563: gnupg 1.4.18-7+deb8u5
 doc/errata/staging/gnupg.yaml | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
Comment 3 Arvid Requate univentionstaff 2018-08-15 16:20:53 CEST
<http://errata.software-univention.de/ucs/4.2/453.html>