Page MenuHome GnuPG

Multiple Plaintext Attack on Detached PGP Signatures in GnuPG
Closed, ResolvedPublic

Description

An attacker can put a plaintext in detached signature so that a user might see it by gpg --decrypt.
A user could be deceived (or confused, at least).

Event Timeline

gniibe created this object in space Restricted Space.
gniibe created this object with visibility "g10code (Project)".
gniibe created this object with edit policy "g10code (Project)".

We have fixed it but the commit also states:

But note: Using the output of the verify command for detached
signatures is useless because with a non-manipulated signature nothing
would haven been written.

gniibe mentioned this in Unknown Object (Maniphest Task).Nov 10 2025, 2:51 AM
werner shifted this object from the Restricted Space space to the S1 Public space.Fri, Dec 26, 2:57 PM
werner changed the visibility from "g10code (Project)" to "Public (No Login Required)".
werner triaged this task as Normal priority.Mon, Dec 29, 3:46 PM
werner edited projects, added OpenPGP, Not A Bug; removed g10code, Bug Report.

Note using the output of --decrypt directly on the tty is a Bad Idea(tm). You won't cat arbitrary files to your tty for the same reason.

BTW, if you watched CitizenFour please don't follow the example given in the first scene where someone types gpg -d on the tty.

werner claimed this task.