Debian Security Advisory

DSA-4224-1 gnupg -- security update

Date Reported:
08 Jun 2018
Affected Packages:
Security database references:
In Mitre's CVE dictionary: CVE-2018-12020.
More information:

Marcus Brinkmann discovered that GnuPG performed insufficient sanitisation of file names displayed in status messages, which could be abused to fake the verification status of a signed email.

Details can be found in the upstream advisory at

For the oldstable distribution (jessie), this problem has been fixed in version 1.4.18-7+deb8u5.

We recommend that you upgrade your gnupg packages.

For the detailed security status of gnupg please refer to its security tracker page at: