It seemed that the reporter (also) claimed that a git repo could be weak/vulnerable when X.509 signature is used to validate the commits.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Tue, Mar 3
For the record (to show we don't hide a problem), I add some information.
Feb 23 2026
Feb 20 2026
Applied the change in: rK86c6e972421a: Fix a memory leak in _ksba_ber_decoder_decode.
Feb 18 2026
Feb 17 2026
Looks like this spot was missed when T5037: dn.cpp:181: suspicious loop was fixed. In libkleo's copy of the DN parser I applied the fix in 2023. Too many copies!
Feb 16 2026
I found a possible leak and a possible access of freed memory.
Feb 13 2026
Jan 29 2026
Jan 23 2026
Jan 21 2026
Jan 16 2026
See the gnupg-devel mailing list for more discussions. Subject: libgcrypt P256 signature malleability via weak DER enforcement"
Jan 14 2026
Some historic integer encoding glitches from Peter Gutmann's style guide:
May 20 2025
Please review the patch and feedback.
May 13 2025
Apr 23 2025
Jan 17 2025
Jan 15 2025
Dec 5 2024
A workaround exists with the new option --ignore-crl-extensions.
Oct 29 2024
Jun 21 2024
Now also done for libksba.
Jun 20 2024
Feb 29 2024
Fixed in libksba 1.6.6.
Feb 23 2024
Feb 14 2024
@Jakuje, you are right. This is a plain error and we should do a new release to avoid false errors.
Thank you, applied.
Feb 13 2024
Feb 12 2024
Nov 16 2023
Nov 10 2023
Oct 18 2023
Oct 13 2023
And yes in gpgsm.conf both the extensions are also marked with ignore-cert-extension.
While remembering this I added to our standard.conf (and for testing first to my local conf):
Jun 22 2023
We had one request to support this back in 2017 but it was closed because the respective CA stopped using this extension. See T2039.
Jun 19 2023
rGb1ecc8353ae3 is just what I meant, so that we can recommend such an option in the future as a workaround until a new update becomes available which supports such an extension.
Nah, the description for that extension is pretty strict and I won't feel comfortable to just ignore it. BTW there is also T6398 (nameConstraints) which needs support. But for debugging a ignore extension makes sense.
For support reasons I would say that it might make sense to also ignore the extensions from "ignore-cert-extension" when checking CRLs?
Mar 2 2023
(my example cert is 0x09BB0EEE)
Dec 22 2022
This bug is CVE-2022-47629
Dec 20 2022
Dec 14 2022
Dec 6 2022
I guess we can close this one.
Nov 23 2022
Here is the patch which will go into the next release
From f61a5ea4e0f6a80fd4b28ef0174bee77793cf070 Mon Sep 17 00:00:00 2001 From: Werner Koch <wk@gnupg.org> Date: Tue, 22 Nov 2022 16:36:46 +0100 Subject: [PATCH] Fix an integer overflow in the CRL signature parser.
Nov 22 2022
Oct 18 2022
Oct 17 2022
Fixed Gpg4win version: https://lists.wald.intevation.org/pipermail/gpg4win-announce/2022/000098.html
As usual see https://gnupg.org/download for links to the latest packages. For Gpg4win see https://gpg4win.org
Oct 11 2022
Fixed in 1.6.1.
Fixed in 1.6.1.
Oct 7 2022
Sep 22 2022
Sep 18 2022
Looks like libksba 1.6.1 is available for download at: https://gnupg.org/download/ , however tag is missing at: https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=summary