Page MenuHome GnuPG
Feed Advanced Search

Fri, Feb 27

gniibe closed T7629: gcc 15 warns about -Wunterminated-string-initialization in gnupg as Resolved.
Fri, Feb 27, 7:21 AM · gnupg, Bug Report

Thu, Feb 26

ebo removed a project from T7885: Kleopatra: Unsupported backup of secret kyber key should be handled more gracefully: gpd5x.
Thu, Feb 26, 3:22 PM · gnupg, kleopatra

Wed, Feb 25

gniibe added a comment to T7071: gpg: Support of No CRC in ASCII armor.

Also applied to 2.4 branch.

Wed, Feb 25, 3:56 AM · gnupg, Bug Report
gniibe added a comment to T7629: gcc 15 warns about -Wunterminated-string-initialization in gnupg.

Libraries have been fixed (as well as GnuPG itself), so, closing.

Wed, Feb 25, 1:33 AM · gnupg, Bug Report

Tue, Feb 24

werner updated the task description for T7999: Release GnuPG 2.5.18.
Tue, Feb 24, 3:33 PM · gnupg, Release Info

Fri, Feb 20

werner closed T7071: gpg: Support of No CRC in ASCII armor as Resolved.

Cool. Works for me now.

Fri, Feb 20, 1:37 PM · gnupg, Bug Report
gniibe added a comment to T7071: gpg: Support of No CRC in ASCII armor.

rG62b8bf2f introduced the regression. The intent of the fix was about comparison of -----END , which has nine characters.
But it also added afx->buffer_pos ==1, that affected.

Fri, Feb 20, 6:22 AM · gnupg, Bug Report

Thu, Feb 19

werner reopened T7071: gpg: Support of No CRC in ASCII armor as "Open".

Using --enarmor and removing the checksum I sometimes get

Thu, Feb 19, 5:03 PM · gnupg, Bug Report

Tue, Feb 10

werner triaged T8084: ctype(3) API use as Low priority.
Tue, Feb 10, 11:50 AM · NetBSD, gnupg, Bug Report

Mon, Feb 9

werner added a project to T8084: ctype(3) API use: NetBSD.

AFAICS all conditions are protected by isascii(3) which

Mon, Feb 9, 9:49 AM · NetBSD, gnupg, Bug Report

Wed, Feb 4

wiz added a project to T8084: ctype(3) API use: gnupg.
Wed, Feb 4, 11:18 AM · NetBSD, gnupg, Bug Report

Jan 29 2026

timegrid added a comment to T6152: Allow giving context to gpg-agent.

Current state in gpg4win-5.0.0:

Jan 29 2026, 4:09 PM · gnupg26, Feature Request, S/MIME
wiz added a comment to T6275: gnupg26: Improve gnupg_spawn_process function.

It seems this broke the self tests (and gpgme, and notmuch) on NetBSD: https://dev.gnupg.org/T8065

Jan 29 2026, 2:09 PM · gnupg, libassuan, gpgrt

Jan 27 2026

werner set External Link to https://lists.gnupg.org/pipermail/gnupg-announce/2026q1/000501.html on T7996: Release GnuPG 2.5.17 (security).
Jan 27 2026, 5:52 PM · CVE, gnupg, Release Info
werner closed T8055: pinentry-tty: Correct/Cancel/Wrong - what does "C" select? as Resolved.
Jan 27 2026, 5:17 PM · gnupg, pinentry, Bug Report
werner changed the visibility for T7996: Release GnuPG 2.5.17 (security).
Jan 27 2026, 5:11 PM · CVE, gnupg, Release Info
werner added a comment to T7996: Release GnuPG 2.5.17 (security).

This is a security update

Jan 27 2026, 3:47 PM · CVE, gnupg, Release Info
werner renamed T7996: Release GnuPG 2.5.17 (security) from Release GnuPG 2.5.17 to Release GnuPG 2.5.17 (security).
Jan 27 2026, 3:44 PM · CVE, gnupg, Release Info
ebo moved T7434: Kleopatra: Initial keylisting hangs for ~60 seconds (gpg-agent: Socket ...S.gpg-agent cannot be bound) from Done to gpd-5.0.0 on the gpd5x board.
Jan 27 2026, 1:58 PM · gpd5x (gpd-5.0.0), gnupg, kleopatra

Jan 25 2026

mfilippov added a comment to T8047: Support secure memory on Windows.

@werner I added an implementation https://dev.gnupg.org/D622
that matches Linux behavior and avoids the message about secure memory not being supported on Windows. The change is scoped to the pinentry tool and intentionally follows Linux behavior. Does this approach look reasonable to you?

Jan 25 2026, 9:02 PM · Windows, gnupg, Feature Request
werner changed the status of T8045: Stack-based buffer overflow in TPM2 `PKDECRYPT` from Open to Testing.
Jan 25 2026, 5:02 PM · gnupg26, CVE, TPM, Bug Report
werner triaged T8055: pinentry-tty: Correct/Cancel/Wrong - what does "C" select? as Low priority.
Jan 25 2026, 4:38 PM · gnupg, pinentry, Bug Report
werner added a comment to T8055: pinentry-tty: Correct/Cancel/Wrong - what does "C" select?.

I think "O" is a better key:

Jan 25 2026, 4:37 PM · gnupg, pinentry, Bug Report
werner added a comment to T8055: pinentry-tty: Correct/Cancel/Wrong - what does "C" select?.

We need to change the accelerator. Right now gpg-agent uses

Jan 25 2026, 4:14 PM · gnupg, pinentry, Bug Report
ametzler1 created T8055: pinentry-tty: Correct/Cancel/Wrong - what does "C" select?.
Jan 25 2026, 7:47 AM · gnupg, pinentry, Bug Report

Jan 23 2026

werner triaged T8047: Support secure memory on Windows as Low priority.

I don't think that we will implement that any time soon. Today we too often require more mlock-able memory than available and in this case Libgcrypt resorts to allocating new memory arenas which are not locked. This is not as worse as one might think: the majro advantage with secmem is that a free() on secmem allocated memory will also wipe that memory. A better solution has always been to use an encrypted swap/paging file. 25 years ago, it was not easy to configure but today there should be no problem and hopefully already the default.

Jan 23 2026, 9:25 PM · Windows, gnupg, Feature Request
ebo removed a project from T4195: Fix time API in gpgme: Restricted Project.
Jan 23 2026, 3:22 PM · gnupg, kleopatra, gpgme, Feature Request
ebo added a comment to T4195: Fix time API in gpgme.

While key generation works now with an expiry date up to 2106-02-04, the representation on the command line is a bit ugly.

Jan 23 2026, 3:22 PM · gnupg, kleopatra, gpgme, Feature Request

Jan 22 2026

gniibe renamed T8045: Stack-based buffer overflow in TPM2 `PKDECRYPT` from Security (internal) - Stack-based buffer overflow in TPM2 `PKDECRYPT` to Stack-based buffer overflow in TPM2 `PKDECRYPT`.
Jan 22 2026, 12:33 AM · gnupg26, CVE, TPM, Bug Report

Jan 21 2026

werner shifted T8045: Stack-based buffer overflow in TPM2 `PKDECRYPT` from the Restricted Space space to the S1 Public space.
Jan 21 2026, 12:40 PM · gnupg26, CVE, TPM, Bug Report

Jan 20 2026

gniibe added a comment to T8044: gpg-agent stack buffer overflow in pkdecrypt using KEM.

On 2026-01-20, I found the message to security@gnupg.org of:
Message-ID: 4e708880-04ac-45bc-8d16-6b585f2652a1n@aisle.com
in may spam folder. It has a 10MB long attachment. That might be one of reasons to be identified as a spam.

Jan 20 2026, 6:42 AM · CVE, gnupg26, gpgagent, Bug Report
gniibe added a comment to T8045: Stack-based buffer overflow in TPM2 `PKDECRYPT`.

Considering the current implementation (tpm2d doesn't support keyinfo like scdaemon), it would be good to check the buffer size.
(If key information is accessible easily, we can check with a specific key.)

Jan 20 2026, 6:06 AM · gnupg26, CVE, TPM, Bug Report
gniibe created T8045: Stack-based buffer overflow in TPM2 `PKDECRYPT`.
Jan 20 2026, 1:54 AM · gnupg26, CVE, TPM, Bug Report
gniibe added projects to T8044: gpg-agent stack buffer overflow in pkdecrypt using KEM: gpgagent, gnupg.
Jan 20 2026, 1:52 AM · CVE, gnupg26, gpgagent, Bug Report

Jan 15 2026

werner set External Link to https://gnupg.org/blog/20251226-cleartext-signatures.html on T7900: Cleartext Signature Forgery in GnuPG.
Jan 15 2026, 4:05 PM · Not A Bug, OpenBSD, gnupg
timegrid closed T7434: Kleopatra: Initial keylisting hangs for ~60 seconds (gpg-agent: Socket ...S.gpg-agent cannot be bound) as Resolved.

Looks good to me on gpg4win-5.0.0 @ win11. Tested with 20 starts of each combination:

  • with / without keyboxd
  • quitting kleopatra / killing all processes
Jan 15 2026, 1:06 PM · gpd5x (gpd-5.0.0), gnupg, kleopatra
ikloecker moved T7434: Kleopatra: Initial keylisting hangs for ~60 seconds (gpg-agent: Socket ...S.gpg-agent cannot be bound) from Backlog to QA on the gpd5x board.
Jan 15 2026, 10:31 AM · gpd5x (gpd-5.0.0), gnupg, kleopatra
ikloecker changed the status of T7434: Kleopatra: Initial keylisting hangs for ~60 seconds (gpg-agent: Socket ...S.gpg-agent cannot be bound) from Open to Testing.

I think this has been resolved in Gpg4win 5.

Jan 15 2026, 10:31 AM · gpd5x (gpd-5.0.0), gnupg, kleopatra

Jan 9 2026

werner closed T7994: Documentation: mention `status-fd` in "Programmatic use of GnuPG" as Resolved.

Will be in the next release.

Jan 9 2026, 2:02 PM · gnupg, Documentation
werner removed a project from T6815: PQC encryption for GnuPG: gnupg26.

it does not make sense to have a workboard item for this parent ticket.

Jan 9 2026, 1:40 PM · OpenPGP, PQC, gnupg
timegrid closed T7893: GnuPG: Decryption fails if the pinentry dialog for the first tried recipient is canceled as Resolved.

Looks good to me on gpg4win-5.0.0-beta479 @ win11:

Jan 9 2026, 1:18 PM · gnupg26, gnupg
ebo closed T7491: Confusing additional pinentry on creation of new keypair with ADSK configured as Resolved.

This does not happen any more, tested with Gpg4win-5.0.0-beta479

Jan 9 2026, 1:09 PM · gpgagent, gnupg26, gnupg
ebo closed T7315: Allow export and import of PQC secret keys., a subtask of T6815: PQC encryption for GnuPG, as Resolved.
Jan 9 2026, 12:29 PM · OpenPGP, PQC, gnupg
ebo closed T7315: Allow export and import of PQC secret keys. as Resolved.

Tested with Gpg4win-5.0.0-beta479

Jan 9 2026, 12:29 PM · gnupg26, OpenPGP, PQC, gnupg
ebo closed T7892: keyboxd: subkey listing issue with ADSKs as Resolved.

with Gpg4win-5.0.0-beta479 the listing after creating the new key with ADSK looks ok now:

Jan 9 2026, 11:44 AM · gnupg26, Bug Report, keyboxd, gnupg
werner closed T7805: Permission denied on batch deletion of mixed (openpgp+smime) certs as Resolved.

Given that the 2.2 fix has been tested and resolved and we don't have another ticket for 2.6, we can close this one.

Jan 9 2026, 11:07 AM · gnupg, vsd, kleopatra
werner closed T7904: GnuPG may downgrade digest algorithm to SHA1, a subtask of T7900: Cleartext Signature Forgery in GnuPG, as Resolved.
Jan 9 2026, 11:01 AM · Not A Bug, OpenBSD, gnupg
werner closed T7904: GnuPG may downgrade digest algorithm to SHA1 as Resolved.

Note that for exploiting this bug a second preimage attack for SHA-1 is required. This kind of attack on SHA1 is not yet possible.

Jan 9 2026, 11:01 AM · gnupg, Bug Report

Jan 8 2026

werner changed the status of T7892: keyboxd: subkey listing issue with ADSKs from Open to Testing.
Jan 8 2026, 4:13 PM · gnupg26, Bug Report, keyboxd, gnupg

Jan 7 2026

andrewgdotcom added a comment to T7907: Encrypted Message Malleability Checks are Incorrectly Enforced Causing Plaintext Recovery Attacks.

So why are there different grades of failure? Why is "invalid packet" a less scary error message than "WARNING: message was not integrity protected" when both are equally bad things?

Jan 7 2026, 4:37 PM · Not A Bug, gnupg
werner added a comment to T7907: Encrypted Message Malleability Checks are Incorrectly Enforced Causing Plaintext Recovery Attacks.

Right. And the MDC detects this and only if says okay you get a good decryption status back.

Jan 7 2026, 11:57 AM · Not A Bug, gnupg
andrewgdotcom added a comment to T7907: Encrypted Message Malleability Checks are Incorrectly Enforced Causing Plaintext Recovery Attacks.

This warning shall only show up if a message was really modified and not in case of a simple truncation.

Jan 7 2026, 10:42 AM · Not A Bug, gnupg

Jan 5 2026

werner updated the task description for T7906: Memory Corruption in ASCII-Armor Parsing.
Jan 5 2026, 4:27 PM · gnupg, Bug Report
werner changed the visibility for T7907: Encrypted Message Malleability Checks are Incorrectly Enforced Causing Plaintext Recovery Attacks.
Jan 5 2026, 11:27 AM · Not A Bug, gnupg
werner changed the visibility for T7901: Cleartext Signature Forgery in NotDashEscaped header implementation in GnuPG.
Jan 5 2026, 11:26 AM · gnupg, Bug Report
werner changed the visibility for T7900: Cleartext Signature Forgery in GnuPG.
Jan 5 2026, 11:26 AM · Not A Bug, OpenBSD, gnupg

Jan 2 2026

werner changed the status of T7900: Cleartext Signature Forgery in GnuPG from Open to Testing.

(Testing for now for better visibility. Real or Semi-real bugs with fixes are already set to Resolved)

Jan 2 2026, 4:38 PM · Not A Bug, OpenBSD, gnupg
werner changed the status of T7902: OpenPGP Cleartext Signature Framework, a subtask of T7900: Cleartext Signature Forgery in GnuPG, from Open to Testing.
Jan 2 2026, 4:35 PM · Not A Bug, OpenBSD, gnupg
werner changed the status of T7902: OpenPGP Cleartext Signature Framework from Open to Testing.
Jan 2 2026, 4:35 PM · Not A Bug, OpenPGP, FAQ, gnupg
werner closed T7903: Multiple Plaintext Attack on Detached PGP Signatures in GnuPG, a subtask of T7900: Cleartext Signature Forgery in GnuPG, as Resolved.
Jan 2 2026, 4:24 PM · Not A Bug, OpenBSD, gnupg
werner closed T7903: Multiple Plaintext Attack on Detached PGP Signatures in GnuPG as Resolved.
Jan 2 2026, 4:24 PM · Not A Bug, OpenPGP, gnupg
werner changed the status of T7907: Encrypted Message Malleability Checks are Incorrectly Enforced Causing Plaintext Recovery Attacks, a subtask of T7900: Cleartext Signature Forgery in GnuPG, from Open to Testing.
Jan 2 2026, 4:22 PM · Not A Bug, OpenBSD, gnupg
werner changed the status of T7907: Encrypted Message Malleability Checks are Incorrectly Enforced Causing Plaintext Recovery Attacks from Open to Testing.

The described attack is not easy to understand and as of today the
gpg.fail website seems to have the same content as the draft we
received on 2025-10-23. There it states:

Jan 2 2026, 4:22 PM · Not A Bug, gnupg

Dec 31 2025

William closed T7941: gpg: keydb_search_first failed: SQL error as Resolved.

Fixed in 2.5.16

Dec 31 2025, 2:19 AM · workaround, gnupg, Bug Report

Dec 30 2025

werner updated the task description for T8001: Release GnuPG 2.4.9.
Dec 30 2025, 1:49 PM · gnupg, Release Info
werner updated the task description for T7428: Release GnuPG 2.4.8.
Dec 30 2025, 1:48 PM · gnupg, Release Info
werner triaged T8001: Release GnuPG 2.4.9 as Normal priority.
Dec 30 2025, 1:48 PM · gnupg, Release Info
werner set External Link to https://lists.gnupg.org/pipermail/gnupg-announce/2025q4/000500.html on T7995: Release GnuPG 2.5.16.
Dec 30 2025, 10:19 AM · gnupg, Release Info
werner closed T7906: Memory Corruption in ASCII-Armor Parsing as Resolved.

Also fixed in the other active branches.

Dec 30 2025, 9:56 AM · gnupg, Bug Report
werner closed T7906: Memory Corruption in ASCII-Armor Parsing, a subtask of T7900: Cleartext Signature Forgery in GnuPG, as Resolved.
Dec 30 2025, 9:56 AM · Not A Bug, OpenBSD, gnupg
werner updated the task description for T7940: Release GnuPG 2.5.15.
Dec 30 2025, 9:18 AM · gnupg, Release Info
werner updated the task description for T7995: Release GnuPG 2.5.16.
Dec 30 2025, 9:16 AM · gnupg, Release Info
werner updated the task description for T7996: Release GnuPG 2.5.17 (security).
Dec 30 2025, 9:15 AM · CVE, gnupg, Release Info
werner updated the task description for T7996: Release GnuPG 2.5.17 (security).
Dec 30 2025, 9:15 AM · CVE, gnupg, Release Info

Dec 29 2025

werner updated the task description for T7998: Release GnuPG 2.5.19.
Dec 29 2025, 11:50 PM · Release Info, gnupg
werner updated the task description for T7999: Release GnuPG 2.5.18.
Dec 29 2025, 11:49 PM · gnupg, Release Info
werner updated the task description for T7996: Release GnuPG 2.5.17 (security).
Dec 29 2025, 11:47 PM · CVE, gnupg, Release Info
werner updated the task description for T7995: Release GnuPG 2.5.16.
Dec 29 2025, 11:46 PM · gnupg, Release Info
werner triaged T8000: Release GnuPG 2.6.0 as Low priority.
Dec 29 2025, 11:45 PM · Release Info, gnupg