Also applied to 2.4 branch.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Fri, Feb 27
Thu, Feb 26
Wed, Feb 25
Libraries have been fixed (as well as GnuPG itself), so, closing.
Tue, Feb 24
Fri, Feb 20
Cool. Works for me now.
rG62b8bf2f introduced the regression. The intent of the fix was about comparison of -----END , which has nine characters.
But it also added afx->buffer_pos ==1, that affected.
Thu, Feb 19
Using --enarmor and removing the checksum I sometimes get
Tue, Feb 10
Mon, Feb 9
AFAICS all conditions are protected by isascii(3) which
Wed, Feb 4
Jan 29 2026
It seems this broke the self tests (and gpgme, and notmuch) on NetBSD: https://dev.gnupg.org/T8065
Jan 27 2026
This is a security update
Jan 25 2026
@werner I added an implementation https://dev.gnupg.org/D622
that matches Linux behavior and avoids the message about secure memory not being supported on Windows. The change is scoped to the pinentry tool and intentionally follows Linux behavior. Does this approach look reasonable to you?
I think "O" is a better key:
We need to change the accelerator. Right now gpg-agent uses
Jan 23 2026
I don't think that we will implement that any time soon. Today we too often require more mlock-able memory than available and in this case Libgcrypt resorts to allocating new memory arenas which are not locked. This is not as worse as one might think: the majro advantage with secmem is that a free() on secmem allocated memory will also wipe that memory. A better solution has always been to use an encrypted swap/paging file. 25 years ago, it was not easy to configure but today there should be no problem and hopefully already the default.
While key generation works now with an expiry date up to 2106-02-04, the representation on the command line is a bit ugly.
Jan 22 2026
Jan 21 2026
Jan 20 2026
On 2026-01-20, I found the message to security@gnupg.org of:
Message-ID: 4e708880-04ac-45bc-8d16-6b585f2652a1n@aisle.com
in may spam folder. It has a 10MB long attachment. That might be one of reasons to be identified as a spam.
Considering the current implementation (tpm2d doesn't support keyinfo like scdaemon), it would be good to check the buffer size.
(If key information is accessible easily, we can check with a specific key.)
Jan 15 2026
Looks good to me on gpg4win-5.0.0 @ win11. Tested with 20 starts of each combination:
- with / without keyboxd
- quitting kleopatra / killing all processes
I think this has been resolved in Gpg4win 5.
Jan 9 2026
Will be in the next release.
it does not make sense to have a workboard item for this parent ticket.
Looks good to me on gpg4win-5.0.0-beta479 @ win11:
This does not happen any more, tested with Gpg4win-5.0.0-beta479
Tested with Gpg4win-5.0.0-beta479
with Gpg4win-5.0.0-beta479 the listing after creating the new key with ADSK looks ok now:
Given that the 2.2 fix has been tested and resolved and we don't have another ticket for 2.6, we can close this one.
Note that for exploiting this bug a second preimage attack for SHA-1 is required. This kind of attack on SHA1 is not yet possible.
Jan 8 2026
Jan 7 2026
So why are there different grades of failure? Why is "invalid packet" a less scary error message than "WARNING: message was not integrity protected" when both are equally bad things?
Right. And the MDC detects this and only if says okay you get a good decryption status back.
This warning shall only show up if a message was really modified and not in case of a simple truncation.
Jan 5 2026
Jan 2 2026
(Testing for now for better visibility. Real or Semi-real bugs with fixes are already set to Resolved)
The described attack is not easy to understand and as of today the
gpg.fail website seems to have the same content as the draft we
received on 2025-10-23. There it states:
Dec 31 2025
Fixed in 2.5.16
Dec 30 2025
Also fixed in the other active branches.
