Bug 1589620 (CVE-2018-12020)
Summary: | CVE-2018-12020 gnupg2: Improper sanitization of filenames allows for the display of fake status messages and the bypass of signature verification | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Sam Fowler <sfowler> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | bcl, crypto-team, p.malishev, rdieter, slawomir, tmraz, yozone |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | gnupg2 2.2.8 | Doc Type: | If docs needed, set a value |
Doc Text: |
A data validation flaw was found in the way gnupg processes file names during decryption and signature validation. An attacker may be able to inject messages into gnupg verbose message logging which may have the potential to bypass the integrity of signature authentication mechanisms and could have other unintended consequences if applications take action(s) based on parsed verbose gnupg output.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-10 10:28:34 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1589621, 1589622, 1589624, 1590366, 1590367, 1590378, 1590379, 1590380, 1724852, 1724853 | ||
Bug Blocks: | 1589623 |
Description
Sam Fowler
2018-06-11 01:45:51 UTC
Created gnupg2 tracking bugs for this issue: Affects: fedora-all [bug 1589621] Created gnupg tracking bugs for this issue: Affects: fedora-all [bug 1589624] This can be demonstrated by the following: echo hello > $'file\n[GNUPG:] FAKE' # Note the newline in the parameter to the gpg call. Used tab completion for this. gpg -o custompoc.gpg --passphrase abc -c 'file [GNUPG:] FAKE' gpg --passphrase abc --no-options -vd custompoc.gpg 2>&1 gpg: AES encrypted data gpg: encrypted with 1 passphrase gpg: original file name='file [GNUPG:] FAKE' hello Statement: Red Hat Product Security has rated this issue as having a security impact of Important, and a future update may address this flaw. Mitigation: This flaw can be mitigated by appending the --no-verbose command line flag. This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2018:2180 https://access.redhat.com/errata/RHSA-2018:2180 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:2181 https://access.redhat.com/errata/RHSA-2018:2181 |