{"id":"CVE-2018-12020","details":"mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the \"--status-fd 2\" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.","modified":"2026-04-16T06:21:05.919604761Z","published":"2018-06-08T21:29:00.237Z","related":["CGA-j6c6-hhxq-8ghm","SUSE-SU-2018:1696-1","SUSE-SU-2018:1698-1","SUSE-SU-2018:1698-2","SUSE-SU-2018:1814-1","SUSE-SU-2018:2243-1","openSUSE-SU-2024:10736-1","openSUSE-SU-2024:10815-1","openSUSE-SU-2024:11261-1","openSUSE-SU-2024:14158-1"],"references":[{"type":"WEB","url":"http://www.securitytracker.com/id/1041051"},{"type":"WEB","url":"http://www.securityfocus.com/bid/104450"},{"type":"ADVISORY","url":"http://openwall.com/lists/oss-security/2018/06/08/2"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2181"},{"type":"ADVISORY","url":"https://github.com/RUB-NDS/Johnny-You-Are-Fired"},{"type":"ADVISORY","url":"https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf"},{"type":"ADVISORY","url":"https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2019/Apr/38"},{"type":"ADVISORY","url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/12/msg00027.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3675-2/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4222"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4223"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4224"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2180"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2019/04/30/4"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3675-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3675-3/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3964-1/"},{"type":"FIX","url":"https://dev.gnupg.org/T4012"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.5"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"17.10"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.10"}]},{"events":[{"introduced":"0"},{"last_affected":"19.04"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"fixed":"2.2.8"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-12020.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}