Debian Security Advisory
DSA-4224-1 gnupg -- security update
- Date Reported:
- 08 Jun 2018
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2018-12020.
- More information:
Marcus Brinkmann discovered that GnuPG performed insufficient sanitisation of file names displayed in status messages, which could be abused to fake the verification status of a signed email.
Details can be found in the upstream advisory at https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html
For the oldstable distribution (jessie), this problem has been fixed in version 1.4.18-7+deb8u5.
We recommend that you upgrade your gnupg packages.
For the detailed security status of gnupg please refer to its security tracker page at: https://security-tracker.debian.org/tracker/gnupg