GPG Suite 2018.3
Security Update
This releases addresses EFAIL on macOS Sierra and includes a fix for SigSpoof.
SigSpoof is an exploit affecting GnuPG < 2.2.8 which allowed an attacker to fake any signature under special circumstances. GPG Suite never used the --verbose option of GnuPG by default, so unless 'verbose' was manually added to gpg.conf , our users should have been unaffected by this vulnerability. Mitigations included in 2018.3 make sure that even users with the 'verbose' option in their gpg.conf are no longer affected.
This releases addresses EFAIL on macOS Sierra and includes a fix for SigSpoof.
SigSpoof is an exploit affecting GnuPG < 2.2.8 which allowed an attacker to fake any signature under special circumstances. GPG Suite never used the --verbose option of GnuPG by default, so unless 'verbose' was manually added to gpg.conf , our users should have been unaffected by this vulnerability. Mitigations included in 2018.3 make sure that even users with the 'verbose' option in their gpg.conf are no longer affected.
EFAIL mitigations in GPGMail (10.13 and 10.12 only at the moment)
- Remote content is no longer loaded within encrpyted messages
- If a message contains more than one encrypted part only the first part is decrypted
- In case of mixed content (plain content and encrypted content), the plain content is isolated
- Additional mitigations for S/MIME since unfortunately Apple has yet to completely fix EFAIL
Mitigations against SigSpoof
- GnuPG was upgraded to 2.2.8
- In order to fix older versions of GnuPG --no-verbose is always added to the arguments passed to GnuPG by Libmacgpg
GPGMail 3.0b7 (10.13 only)
Improvements
- Allows decryption of messages or attachments without integrity protection if explicitly required by the user [#982]
Fixes
- Adds error strings for attachments without integrity protection
GPGMail 2.7.3 (10.12 only)
Improvements
- EFAIL mitigations for GPGMail [#983]
- Allows decryption of messages or attachments without integrity protection if explicitly required by the user [#982]
GPG Keychain 1.4.4
Fixes
- Fingerprint is evenly spaced again [#454]
- Make sure if a fingerprint is copied it is properly formatted [#454]
- Text for "Delete key" checkbox was not properly displayed on macOS 10.9 [#449]
GPGServices 1.11.3
Improvements
- Re-allow decryption of text and files without integrity protection [#245]
- Display a big warning dialog if a user attempts to decrypt text or files without integrity protection (missing MDC) [#245]
Fixes
- Encryption of large files got stuck on macOS 10.13 [#244]
MacGPG 2.2.8
Improvements
- Updated to GnuPG 2.2.8 which includes fixes for SigSpoof [#716]
- Update Libgcrypt to 1.8.3
Libmacgpg 0.8.5
Improvements
- Use separate file handles for GnuPG error and status output (mitigation against SigSpoof) [#164]
- Always pass --no-verbose to GnuPG (mitigation against SigSpoof) [#164]
- Allow the decryption of PGP data without integrity protection if forced to do so