The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of GnuPG: creation of fake status messages

Synthesis of the vulnerability 

An attacker can create fake status messages in GnuPG, in order to deceive the victime.
Vulnerable products: Debian, VNX Operating Environment, VNX Series, Fedora, GnuPG, Junos Space, openSUSE Leap, Solaris, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu, Unix (platform) ~ not comprehensive.
Severity of this weakness: 2/4.
Creation date: 08/06/2018.
Revision date: 02/05/2019.
Références of this bulletin: bulletinjul2018, CVE-2018-12020, DSA-2020-030, DSA-4222-1, DSA-4223-1, FEDORA-2018-4ef71d3525, FEDORA-2018-69780fc4d7, FEDORA-2018-a4e13742b4, JSA10917, openSUSE-SU-2018:1706-1, openSUSE-SU-2018:1708-1, openSUSE-SU-2018:1722-1, openSUSE-SU-2018:1724-1, RHSA-2018:2180-01, RHSA-2018:2181-01, SSA:2018-159-01, SSA:2018-170-01, SUSE-SU-2018:1696-1, SUSE-SU-2018:1698-1, SUSE-SU-2018:2243-1, T4012, USN-3675-1, USN-3675-2, USN-3675-3, USN-3964-1, VIGILANCE-VUL-26364.

Description of the vulnerability 

An attacker can create fake status messages in GnuPG, in order to deceive the victime.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This computer vulnerability impacts software or systems such as Debian, VNX Operating Environment, VNX Series, Fedora, GnuPG, Junos Space, openSUSE Leap, Solaris, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu, Unix (platform) ~ not comprehensive.

Our Vigil@nce team determined that the severity of this weakness bulletin is medium.

The trust level is of type confirmed by the editor, with an origin of document.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a beginner ability can exploit this weakness.

Solutions for this threat 

GnuPG: version 2.2.8.
The version 2.2.8 is fixed:
  https://gnupg.org/download/

GnuPG: version 1.4.23.
The version 1.4.23 is fixed:
  https://www.gnupg.org/download/index.html

GnuPG: patch for fake status messages.
A patch is indicated in information sources.

Debian 9: new gnupg1 packages.
New packages are available:
  Debian 9: gnupg1 1.4.21-4+deb9u1

Debian: new gnupg2 packages.
New packages are available:
  Debian 8: gnupg2 2.0.26-6+deb8u2
  Debian 9: gnupg2 2.1.18-8~deb9u2

Dell EMC VNXe3200: version 3.1.11.10003441.
The version 3.1.11.10003441 is fixed:
  https://www.dell.com/support/

Enigmail: version 2.0.7.
The version 2.0.7 is fixed:
  https://www.enigmail.net/index.php/en/download/

Fedora 28: new gnupg packages (18/06/2018).
New packages are available:
  Fedora 28: gnupg 1.4.22-7.fc28

Fedora: new gnupg packages (20/06/2018).
New packages are available:
  Fedora 27: gnupg 1.4.23-1.fc27
  Fedora 28: gnupg 1.4.23-1.fc28

Junos Space: version 18.4R1.
The version 18.4R1 is fixed.

openSUSE Leap 15.0: new python-python-gnupg packages.
New packages are available:
  openSUSE Leap 15.0: python2-python-gnupg 0.4.3-lp150.2.3.1, python3-python-gnupg 0.4.3-lp150.2.3.1

openSUSE Leap: new enigmail packages.
New packages are available:
  openSUSE Leap 42.3: enigmail 2.0.7-21.1
  openSUSE Leap 15.0: enigmail 2.0.7-lp150.2.12.1

openSUSE Leap: new gpg2 packages.
New packages are available:
  openSUSE Leap 42.3: gpg2 2.0.24-9.3.1
  openSUSE Leap 15.0: gpg2 2.2.5-lp150.3.3.1

Oracle Solaris: patch for third party software of July 2018 v1.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

RHEL: new gnupg2 packages.
New packages are available:
  RHEL 6: gnupg2 2.0.14-9.el6_10
  RHEL 7: gnupg2 2.0.22-5.el7_5

Slackware: new gnupg2 packages.
New packages are available:
  Slackware 13.37: gnupg2 2.0.31-*-1_slack13.37
  Slackware 14.0: gnupg2 2.0.31-*-1_slack14.0
  Slackware 14.1: gnupg2 2.0.31-*-1_slack14.1
  Slackware 14.2: gnupg2 2.0.31-*-1_slack14.2

Slackware: new gnupg packages.
New packages are available:
  Slackware 13.0: gnupg 1.4.23-*-1_slack13.0
  Slackware 13.1: gnupg 1.4.23-*-1_slack13.1
  Slackware 13.37: gnupg 1.4.23-*-1_slack13.37
  Slackware 14.0: gnupg 1.4.23-*-1_slack14.0
  Slackware 14.1: gnupg 1.4.23-*-1_slack14.1
  Slackware 14.2: gnupg 1.4.23-*-1_slack14.2

SUSE LE 11 SP3/4: new gpg2 packages.
New packages are available:
  SUSE LE 11 SP3: gpg2 2.0.9-25.33.42.3.1
  SUSE LE 11 SP4: gpg2 2.0.9-25.33.42.3.1

SUSE LE 12: new enigmail packages.
New packages are available:
  SUSE LE 12 RTM-SP3: enigmail 2.0.7-18.1

SUSE LE 12: new gpg2 packages.
New packages are available:
  SUSE LE 12 RTM: gpg2 2.0.24-9.3.1
  SUSE LE 12 SP1: gpg2 2.0.24-9.3.1
  SUSE LE 12 SP2: gpg2 2.0.24-9.3.1
  SUSE LE 12 SP3: gpg2 2.0.24-9.3.1

SUSE LE 15: new enigmail packages.
New packages are available:
  SUSE LE 15 RTM: enigmail 2.0.7-3.7.2

Ubuntu: new gnupg packages.
New packages are available:
  Ubuntu 18.04 LTS: gnupg 2.2.4-1ubuntu1.1, gpg 2.2.4-1ubuntu1.1
  Ubuntu 17.10: gnupg 2.1.15-1ubuntu8.1
  Ubuntu 16.04 LTS: gnupg 1.4.20-1ubuntu3.2, gnupg2 2.1.11-6ubuntu2.1
  Ubuntu 14.04 LTS: gnupg 1.4.16-1ubuntu2.5, gnupg2 2.0.22-3ubuntu1.4
  Ubuntu 12.04 ESM: gnupg 1.4.11-3ubuntu2.11

Ubuntu: new python-gnupg packages.
New packages are available:
  Ubuntu 19.04: python-gnupg 0.4.3-1ubuntu1.19.04.1, python3-gnupg 0.4.3-1ubuntu1.19.04.1
  Ubuntu 18.10: python-gnupg 0.4.1-1ubuntu1.18.10.1, python3-gnupg 0.4.1-1ubuntu1.18.10.1
  Ubuntu 18.04 LTS: python-gnupg 0.4.1-1ubuntu1.18.04.1, python3-gnupg 0.4.1-1ubuntu1.18.04.1
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a computer vulnerability watch. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.