Page MenuHome GnuPG
Feed Advanced Search

Wed, Feb 4

wiz added a project to T8084: ctype(3) API use: gnupg.
Wed, Feb 4, 11:18 AM · gnupg, Bug Report

Thu, Jan 29

timegrid added a comment to T6152: Allow giving context to gpg-agent.

Current state in gpg4win-5.0.0:

Thu, Jan 29, 4:09 PM · gnupg26, Feature Request, S/MIME
wiz added a comment to T6275: gnupg26: Improve gnupg_spawn_process function.

It seems this broke the self tests (and gpgme, and notmuch) on NetBSD: https://dev.gnupg.org/T8065

Thu, Jan 29, 2:09 PM · gnupg, libassuan, gpgrt

Tue, Jan 27

werner set External Link to https://lists.gnupg.org/pipermail/gnupg-announce/2026q1/000501.html on T7996: Release GnuPG 2.5.17 (security).
Tue, Jan 27, 5:52 PM · CVE, gnupg, Release Info
werner closed T8055: pinentry-tty: Correct/Cancel/Wrong - what does "C" select? as Resolved.
Tue, Jan 27, 5:17 PM · gnupg, pinentry, Bug Report
werner changed the visibility for T7996: Release GnuPG 2.5.17 (security).
Tue, Jan 27, 5:11 PM · CVE, gnupg, Release Info
werner added a comment to T7996: Release GnuPG 2.5.17 (security).

This is a security update

Tue, Jan 27, 3:47 PM · CVE, gnupg, Release Info
werner renamed T7996: Release GnuPG 2.5.17 (security) from Release GnuPG 2.5.17 to Release GnuPG 2.5.17 (security).
Tue, Jan 27, 3:44 PM · CVE, gnupg, Release Info
ebo moved T7434: Kleopatra: Initial keylisting hangs for ~60 seconds (gpg-agent: Socket ...S.gpg-agent cannot be bound) from Done to gpd-5.0.0 on the gpd5x board.
Tue, Jan 27, 1:58 PM · gpd5x (gpd-5.0.0), gnupg, kleopatra

Sun, Jan 25

mfilippov added a comment to T8047: Support secure memory on Windows.

@werner I added an implementation https://dev.gnupg.org/D622
that matches Linux behavior and avoids the message about secure memory not being supported on Windows. The change is scoped to the pinentry tool and intentionally follows Linux behavior. Does this approach look reasonable to you?

Sun, Jan 25, 9:02 PM · Windows, gnupg, Feature Request
werner changed the status of T8045: Stack-based buffer overflow in TPM2 `PKDECRYPT` from Open to Testing.
Sun, Jan 25, 5:02 PM · gnupg26, CVE, TPM, Bug Report
werner triaged T8055: pinentry-tty: Correct/Cancel/Wrong - what does "C" select? as Low priority.
Sun, Jan 25, 4:38 PM · gnupg, pinentry, Bug Report
werner added a comment to T8055: pinentry-tty: Correct/Cancel/Wrong - what does "C" select?.

I think "O" is a better key:

Sun, Jan 25, 4:37 PM · gnupg, pinentry, Bug Report
werner added a comment to T8055: pinentry-tty: Correct/Cancel/Wrong - what does "C" select?.

We need to change the accelerator. Right now gpg-agent uses

Sun, Jan 25, 4:14 PM · gnupg, pinentry, Bug Report
ametzler1 created T8055: pinentry-tty: Correct/Cancel/Wrong - what does "C" select?.
Sun, Jan 25, 7:47 AM · gnupg, pinentry, Bug Report

Fri, Jan 23

werner triaged T8047: Support secure memory on Windows as Low priority.

I don't think that we will implement that any time soon. Today we too often require more mlock-able memory than available and in this case Libgcrypt resorts to allocating new memory arenas which are not locked. This is not as worse as one might think: the majro advantage with secmem is that a free() on secmem allocated memory will also wipe that memory. A better solution has always been to use an encrypted swap/paging file. 25 years ago, it was not easy to configure but today there should be no problem and hopefully already the default.

Fri, Jan 23, 9:25 PM · Windows, gnupg, Feature Request
ebo removed a project from T4195: Fix time API in gpgme: Restricted Project.
Fri, Jan 23, 3:22 PM · gnupg, kleopatra, gpgme, Feature Request
ebo added a comment to T4195: Fix time API in gpgme.

While key generation works now with an expiry date up to 2106-02-04, the representation on the command line is a bit ugly.

Fri, Jan 23, 3:22 PM · gnupg, kleopatra, gpgme, Feature Request

Thu, Jan 22

gniibe renamed T8045: Stack-based buffer overflow in TPM2 `PKDECRYPT` from Security (internal) - Stack-based buffer overflow in TPM2 `PKDECRYPT` to Stack-based buffer overflow in TPM2 `PKDECRYPT`.
Thu, Jan 22, 12:33 AM · gnupg26, CVE, TPM, Bug Report

Wed, Jan 21

werner shifted T8045: Stack-based buffer overflow in TPM2 `PKDECRYPT` from the Restricted Space space to the S1 Public space.
Wed, Jan 21, 12:40 PM · gnupg26, CVE, TPM, Bug Report

Tue, Jan 20

gniibe added a comment to T8044: gpg-agent stack buffer overflow in pkdecrypt using KEM.

On 2026-01-20, I found the message to security@gnupg.org of:
Message-ID: 4e708880-04ac-45bc-8d16-6b585f2652a1n@aisle.com
in may spam folder. It has a 10MB long attachment. That might be one of reasons to be identified as a spam.

Tue, Jan 20, 6:42 AM · CVE, gnupg26, gpgagent, Bug Report
gniibe added a comment to T8045: Stack-based buffer overflow in TPM2 `PKDECRYPT`.

Considering the current implementation (tpm2d doesn't support keyinfo like scdaemon), it would be good to check the buffer size.
(If key information is accessible easily, we can check with a specific key.)

Tue, Jan 20, 6:06 AM · gnupg26, CVE, TPM, Bug Report
gniibe created T8045: Stack-based buffer overflow in TPM2 `PKDECRYPT`.
Tue, Jan 20, 1:54 AM · gnupg26, CVE, TPM, Bug Report
gniibe added projects to T8044: gpg-agent stack buffer overflow in pkdecrypt using KEM: gpgagent, gnupg.
Tue, Jan 20, 1:52 AM · CVE, gnupg26, gpgagent, Bug Report

Thu, Jan 15

werner set External Link to https://gnupg.org/blog/20251226-cleartext-signatures.html on T7900: Cleartext Signature Forgery in GnuPG.
Thu, Jan 15, 4:05 PM · Not A Bug, OpenBSD, gnupg
timegrid closed T7434: Kleopatra: Initial keylisting hangs for ~60 seconds (gpg-agent: Socket ...S.gpg-agent cannot be bound) as Resolved.

Looks good to me on gpg4win-5.0.0 @ win11. Tested with 20 starts of each combination:

  • with / without keyboxd
  • quitting kleopatra / killing all processes
Thu, Jan 15, 1:06 PM · gpd5x (gpd-5.0.0), gnupg, kleopatra
ikloecker moved T7434: Kleopatra: Initial keylisting hangs for ~60 seconds (gpg-agent: Socket ...S.gpg-agent cannot be bound) from Backlog to QA on the gpd5x board.
Thu, Jan 15, 10:31 AM · gpd5x (gpd-5.0.0), gnupg, kleopatra
ikloecker changed the status of T7434: Kleopatra: Initial keylisting hangs for ~60 seconds (gpg-agent: Socket ...S.gpg-agent cannot be bound) from Open to Testing.

I think this has been resolved in Gpg4win 5.

Thu, Jan 15, 10:31 AM · gpd5x (gpd-5.0.0), gnupg, kleopatra

Fri, Jan 9

werner closed T7994: Documentation: mention `status-fd` in "Programmatic use of GnuPG" as Resolved.

Will be in the next release.

Fri, Jan 9, 2:02 PM · gnupg, Documentation
werner removed a project from T6815: PQC encryption for GnuPG: gnupg26.

it does not make sense to have a workboard item for this parent ticket.

Fri, Jan 9, 1:40 PM · OpenPGP, PQC, gnupg
timegrid closed T7893: GnuPG: Decryption fails if the pinentry dialog for the first tried recipient is canceled as Resolved.

Looks good to me on gpg4win-5.0.0-beta479 @ win11:

Fri, Jan 9, 1:18 PM · gnupg26, gnupg
ebo closed T7491: Confusing additional pinentry on creation of new keypair with ADSK configured as Resolved.

This does not happen any more, tested with Gpg4win-5.0.0-beta479

Fri, Jan 9, 1:09 PM · gpgagent, gnupg26, gnupg
ebo closed T7315: Allow export and import of PQC secret keys., a subtask of T6815: PQC encryption for GnuPG, as Resolved.
Fri, Jan 9, 12:29 PM · OpenPGP, PQC, gnupg
ebo closed T7315: Allow export and import of PQC secret keys. as Resolved.

Tested with Gpg4win-5.0.0-beta479

Fri, Jan 9, 12:29 PM · gnupg26, OpenPGP, PQC, gnupg
ebo closed T7892: keyboxd: subkey listing issue with ADSKs as Resolved.

with Gpg4win-5.0.0-beta479 the listing after creating the new key with ADSK looks ok now:

Fri, Jan 9, 11:44 AM · gnupg26, Bug Report, keyboxd, gnupg
werner closed T7805: Permission denied on batch deletion of mixed (openpgp+smime) certs as Resolved.

Given that the 2.2 fix has been tested and resolved and we don't have another ticket for 2.6, we can close this one.

Fri, Jan 9, 11:07 AM · gnupg, vsd, kleopatra
werner closed T7904: GnuPG may downgrade digest algorithm to SHA1, a subtask of T7900: Cleartext Signature Forgery in GnuPG, as Resolved.
Fri, Jan 9, 11:01 AM · Not A Bug, OpenBSD, gnupg
werner closed T7904: GnuPG may downgrade digest algorithm to SHA1 as Resolved.

Note that for exploiting this bug a second preimage attack for SHA-1 is required. This kind of attack on SHA1 is not yet possible.

Fri, Jan 9, 11:01 AM · gnupg, Bug Report

Thu, Jan 8

werner changed the status of T7892: keyboxd: subkey listing issue with ADSKs from Open to Testing.
Thu, Jan 8, 4:13 PM · gnupg26, Bug Report, keyboxd, gnupg

Wed, Jan 7

andrewgdotcom added a comment to T7907: Encrypted Message Malleability Checks are Incorrectly Enforced Causing Plaintext Recovery Attacks.

So why are there different grades of failure? Why is "invalid packet" a less scary error message than "WARNING: message was not integrity protected" when both are equally bad things?

Wed, Jan 7, 4:37 PM · Not A Bug, gnupg
werner added a comment to T7907: Encrypted Message Malleability Checks are Incorrectly Enforced Causing Plaintext Recovery Attacks.

Right. And the MDC detects this and only if says okay you get a good decryption status back.

Wed, Jan 7, 11:57 AM · Not A Bug, gnupg
andrewgdotcom added a comment to T7907: Encrypted Message Malleability Checks are Incorrectly Enforced Causing Plaintext Recovery Attacks.

This warning shall only show up if a message was really modified and not in case of

a simple truncation.

Wed, Jan 7, 10:42 AM · Not A Bug, gnupg

Jan 5 2026

werner updated the task description for T7906: Memory Corruption in ASCII-Armor Parsing.
Jan 5 2026, 4:27 PM · gnupg, Bug Report
werner changed the visibility for T7907: Encrypted Message Malleability Checks are Incorrectly Enforced Causing Plaintext Recovery Attacks.
Jan 5 2026, 11:27 AM · Not A Bug, gnupg
werner changed the visibility for T7901: Cleartext Signature Forgery in NotDashEscaped header implementation in GnuPG.
Jan 5 2026, 11:26 AM · gnupg, Bug Report
werner changed the visibility for T7900: Cleartext Signature Forgery in GnuPG.
Jan 5 2026, 11:26 AM · Not A Bug, OpenBSD, gnupg

Jan 2 2026

werner changed the status of T7900: Cleartext Signature Forgery in GnuPG from Open to Testing.

(Testing for now for better visibility. Real or Semi-real bugs with fixes are already set to Resolved)

Jan 2 2026, 4:38 PM · Not A Bug, OpenBSD, gnupg
werner changed the status of T7902: OpenPGP Cleartext Signature Framework, a subtask of T7900: Cleartext Signature Forgery in GnuPG, from Open to Testing.
Jan 2 2026, 4:35 PM · Not A Bug, OpenBSD, gnupg
werner changed the status of T7902: OpenPGP Cleartext Signature Framework from Open to Testing.
Jan 2 2026, 4:35 PM · Not A Bug, OpenPGP, FAQ, gnupg
werner closed T7903: Multiple Plaintext Attack on Detached PGP Signatures in GnuPG, a subtask of T7900: Cleartext Signature Forgery in GnuPG, as Resolved.
Jan 2 2026, 4:24 PM · Not A Bug, OpenBSD, gnupg
werner closed T7903: Multiple Plaintext Attack on Detached PGP Signatures in GnuPG as Resolved.
Jan 2 2026, 4:24 PM · Not A Bug, OpenPGP, gnupg
werner changed the status of T7907: Encrypted Message Malleability Checks are Incorrectly Enforced Causing Plaintext Recovery Attacks, a subtask of T7900: Cleartext Signature Forgery in GnuPG, from Open to Testing.
Jan 2 2026, 4:22 PM · Not A Bug, OpenBSD, gnupg
werner changed the status of T7907: Encrypted Message Malleability Checks are Incorrectly Enforced Causing Plaintext Recovery Attacks from Open to Testing.

The described attack is not easy to understand and as of today the
gpg.fail website seems to have the same content as the draft we
received on 2025-10-23. There it states:

Jan 2 2026, 4:22 PM · Not A Bug, gnupg

Dec 31 2025

William closed T7941: gpg: keydb_search_first failed: SQL error as Resolved.

Fixed in 2.5.16

Dec 31 2025, 2:19 AM · workaround, gnupg, Bug Report

Dec 30 2025

werner updated the task description for T8001: Release GnuPG 2.4.9.
Dec 30 2025, 1:49 PM · gnupg, Release Info
werner updated the task description for T7428: Release GnuPG 2.4.8.
Dec 30 2025, 1:48 PM · gnupg, Release Info
werner triaged T8001: Release GnuPG 2.4.9 as Normal priority.
Dec 30 2025, 1:48 PM · gnupg, Release Info
werner set External Link to https://lists.gnupg.org/pipermail/gnupg-announce/2025q4/000500.html on T7995: Release GnuPG 2.5.16.
Dec 30 2025, 10:19 AM · gnupg, Release Info
werner closed T7906: Memory Corruption in ASCII-Armor Parsing as Resolved.

Also fixed in the other active branches.

Dec 30 2025, 9:56 AM · gnupg, Bug Report
werner closed T7906: Memory Corruption in ASCII-Armor Parsing, a subtask of T7900: Cleartext Signature Forgery in GnuPG, as Resolved.
Dec 30 2025, 9:56 AM · Not A Bug, OpenBSD, gnupg
werner updated the task description for T7940: Release GnuPG 2.5.15.
Dec 30 2025, 9:18 AM · gnupg, Release Info
werner updated the task description for T7995: Release GnuPG 2.5.16.
Dec 30 2025, 9:16 AM · gnupg, Release Info
werner updated the task description for T7996: Release GnuPG 2.5.17 (security).
Dec 30 2025, 9:15 AM · CVE, gnupg, Release Info
werner updated the task description for T7996: Release GnuPG 2.5.17 (security).
Dec 30 2025, 9:15 AM · CVE, gnupg, Release Info

Dec 29 2025

werner updated the task description for T7998: Release GnuPG 2.5.19.
Dec 29 2025, 11:50 PM · Release Info, gnupg
werner updated the task description for T7999: Release GnuPG 2.5.18.
Dec 29 2025, 11:49 PM · gnupg, Release Info
werner updated the task description for T7996: Release GnuPG 2.5.17 (security).
Dec 29 2025, 11:47 PM · CVE, gnupg, Release Info
werner updated the task description for T7995: Release GnuPG 2.5.16.
Dec 29 2025, 11:46 PM · gnupg, Release Info
werner triaged T8000: Release GnuPG 2.6.0 as Low priority.
Dec 29 2025, 11:45 PM · Release Info, gnupg
werner triaged T7999: Release GnuPG 2.5.18 as Low priority.
Dec 29 2025, 11:45 PM · gnupg, Release Info
werner triaged T7998: Release GnuPG 2.5.19 as Low priority.
Dec 29 2025, 11:44 PM · Release Info, gnupg
werner triaged T7997: Release GnuPG 2.5.20 as Low priority.
Dec 29 2025, 11:43 PM · Release Info, gnupg
werner triaged T7996: Release GnuPG 2.5.17 (security) as Low priority.
Dec 29 2025, 11:42 PM · CVE, gnupg, Release Info
werner updated the task description for T7940: Release GnuPG 2.5.15.
Dec 29 2025, 11:40 PM · gnupg, Release Info
werner added a project to T7994: Documentation: mention `status-fd` in "Programmatic use of GnuPG": gnupg.

man gpg has a WARNING section right below the RETURN Value section. The 3rd paragraph gives hints on how to use gpg with scripts etc:

Dec 29 2025, 11:37 PM · gnupg, Documentation
werner added a comment to T7909: Other bugs reported by 49016 et al..

The int-truncation change breaks other things. I noticed this by chance in the interactive mode due to warning noticed. Before we ever do such things again we need to have regression tests for setting preferences. Or manually check everything. Need to do a 2.5.16 tomorrow :-(

Dec 29 2025, 9:18 PM · gnupg, g10code, Bug Report
werner updated the task description for T7940: Release GnuPG 2.5.15.
Dec 29 2025, 7:16 PM · gnupg, Release Info
werner triaged T7995: Release GnuPG 2.5.16 as Normal priority.
Dec 29 2025, 7:15 PM · gnupg, Release Info
werner changed the status of T7901: Cleartext Signature Forgery in NotDashEscaped header implementation in GnuPG, a subtask of T7900: Cleartext Signature Forgery in GnuPG, from Open to Testing.
Dec 29 2025, 7:13 PM · Not A Bug, OpenBSD, gnupg
werner changed the status of T7901: Cleartext Signature Forgery in NotDashEscaped header implementation in GnuPG from Open to Testing.
Dec 29 2025, 7:13 PM · gnupg, Bug Report
werner triaged T7900: Cleartext Signature Forgery in GnuPG as Normal priority.
Dec 29 2025, 4:54 PM · Not A Bug, OpenBSD, gnupg
werner triaged T7903: Multiple Plaintext Attack on Detached PGP Signatures in GnuPG as Normal priority.

Note using the output of --decrypt directly on the tty is a Bad Idea(tm). You won't cat arbitrary files to your tty for the same reason.

Dec 29 2025, 3:46 PM · Not A Bug, OpenPGP, gnupg
werner edited projects for T7902: OpenPGP Cleartext Signature Framework, added: FAQ, OpenPGP, Not A Bug; removed g10code, Bug Report.

https://gnupg.org/blog/20251226-cleartext-signatures.html explains why we have cleartext signatures and how you properly use them. The suggestion of the reporters to remove them entirely is a no-go because there are too many systems (open source or in-house) which rely on that format. If properly used (i.e. using --output to get the signed text) there is no problem. Anyway the suggestion has always been to use detached signatures using two files or PGP/MIME).

Dec 29 2025, 3:37 PM · Not A Bug, OpenPGP, FAQ, gnupg

Dec 26 2025

werner renamed T7909: Other bugs reported by 49016 et al. from Bugs reported to Other bugs reported by 49016 et al..
Dec 26 2025, 3:50 PM · gnupg, g10code, Bug Report
werner shifted T7907: Encrypted Message Malleability Checks are Incorrectly Enforced Causing Plaintext Recovery Attacks from the Restricted Space space to the S1 Public space.
Dec 26 2025, 3:04 PM · Not A Bug, gnupg
werner added a comment to T7907: Encrypted Message Malleability Checks are Incorrectly Enforced Causing Plaintext Recovery Attacks.

We need to explain and debunk this attack after its publication,

Dec 26 2025, 3:03 PM · Not A Bug, gnupg
werner shifted T7905: Radix64 Line-Truncation Enabling Polyglot Attacks from the Restricted Space space to the S1 Public space.
Dec 26 2025, 2:59 PM · gnupg, g10code, Bug Report
werner shifted T7903: Multiple Plaintext Attack on Detached PGP Signatures in GnuPG from the Restricted Space space to the S1 Public space.
Dec 26 2025, 2:57 PM · Not A Bug, OpenPGP, gnupg
werner shifted T7902: OpenPGP Cleartext Signature Framework from the Restricted Space space to the S1 Public space.
Dec 26 2025, 2:55 PM · Not A Bug, OpenPGP, FAQ, gnupg
werner shifted T7901: Cleartext Signature Forgery in NotDashEscaped header implementation in GnuPG from the Restricted Space space to the S1 Public space.
Dec 26 2025, 2:54 PM · gnupg, Bug Report
werner added a comment to T7900: Cleartext Signature Forgery in GnuPG.

Regarding the cleartext signature please see this piece: https://gnupg.org/blog/20251226-cleartext-signatures.html

Dec 26 2025, 2:53 PM · Not A Bug, OpenBSD, gnupg
werner shifted T7900: Cleartext Signature Forgery in GnuPG from the Restricted Space space to the S1 Public space.
Dec 26 2025, 2:52 PM · Not A Bug, OpenBSD, gnupg
sihuan triaged T7991: zh_CN: Fix visual misalignment in signature verification output for CJK terminals as Low priority.
Dec 26 2025, 1:31 PM

Dec 16 2025

ebo renamed T7892: keyboxd: subkey listing issue with ADSKs from keyboxd: a new subkey is sometimes not stored in the fingerprint table. to keyboxd: subkey listing issue with ADSKs.
Dec 16 2025, 12:28 PM · gnupg26, Bug Report, keyboxd, gnupg
ebo moved T7892: keyboxd: subkey listing issue with ADSKs from QA to Backlog on the gnupg26 board.

This relates to T7917: Check for revocation of the ADSK's original subkey

Dec 16 2025, 12:25 PM · gnupg26, Bug Report, keyboxd, gnupg
ebo added a comment to T7892: keyboxd: subkey listing issue with ADSKs.

The expected behavior is that only "Ted" (the key from where the ADSK originates) is listed, regardless of ADSKs, on every listing.
Because for regular keys there can only ever be one, "gpg -k" shows always only one key.
Subkeys which are ADSKs shall therefore never be listed with this command.

Dec 16 2025, 12:23 PM · gnupg26, Bug Report, keyboxd, gnupg
ebo changed the status of T7892: keyboxd: subkey listing issue with ADSKs from Testing to Open.

Tested with Gpg4win-5.0.0-beta446, identically to the procedure from the description:

Dec 16 2025, 11:57 AM · gnupg26, Bug Report, keyboxd, gnupg