Maxim Kammerer - 2010-10-17

Applied Cryptography 2ed, Table 14.2 (from which the list of leaked S-Boxes was taken, according to the comment in gost.c), also has 12 in that position.