This bug is CVE-2022-47629
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Dec 22 2022
Dec 6 2022
Oct 28 2022
Oct 18 2022
Oct 17 2022
Fixed Gpg4win version: https://lists.wald.intevation.org/pipermail/gpg4win-announce/2022/000098.html
As usual see https://gnupg.org/download for links to the latest packages. For Gpg4win see https://gpg4win.org
Oct 11 2022
Jul 29 2022
As 2.3.7 was released on the 11th of July, see https://lists.gnupg.org/pipermail/gnupg-announce/2022q3/000474.html
I guess that this issue should be closed and some issues moved to one with 2.3.8.
Jul 26 2022
Apr 7 2022
Updated the copy on our mirror as welll as the gpg4win and swdb packages files.
Apr 5 2022
The fix is from 2018 but was not picked up widely; see
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
Mar 17 2022
SWDB updated - thus the latest zlib will be part of the next Windows build.
Mar 15 2022
All 4 CVEs are findings related to standard conforming compiler optimizations which OTOH break long standing assumptions on C coding. “Let us show that our compiler produces the fastes code ever and ignore any assumptions coders had made over the last 50 year”.
Sep 14 2021
Thanks for the clarification!
The problem of (2), is local side-channel attacks to ElGamal encryption.
We evaluated the impact, mainly for the use case of GnuPG; ElGamal keys are not that popular any more. When such an attack is possible, easier attacks would be possible.
Sep 13 2021
I looks like the "cipher: Hardening ElGamal by introducing exponent blinding too." commit [1] was never applied to 1.8.x. Is that intentional? If so, is there a specific reasoning that it's not needed in 1.8.x? Thanks!
Aug 22 2021
Jul 12 2021
Jun 4 2021
May 25 2021
CVE-2021-33560
May 21 2021
Let me rephrase from a viewpoint of mine (an implementer).
May 20 2021
The paper describes another problem: interoperability (or interpretation) of "ElGamal encryption", and its impact.
Apr 12 2021
Do we have CVE number assigned?
Apr 9 2021
This would be difficult to set up for DSA. Remotely controlled
environment, asking signing same message, using deterministic
DSA... would be not that practical.
Apr 8 2021
So, in my opinion, applying the patch for ElGamal exponent blinding is enough (for now).
For DSA, I had assumed similar attack could be effective.
Mar 31 2021
Our tentative plan is:
Mar 24 2021
Mar 11 2021
Feb 25 2021
Feb 12 2021
Feb 3 2021
Jan 29 2021
Fix has been released. Keeping this in testing state for easier visibility of this task.
Sep 4 2020
Gpg4win 3.113 has also been released. Thus closing this issue.
Small correction: The fixed byte I talked about may have the values 1, 2, 3, or 4.
Sep 3 2020
This has CVE-2020-25125
2.2.23 has been released and announced.
The fix will be in the 2.2.23 release (T5045).
Jan 8 2020
FWIW, the second listed commit is the right one. You should only look at the STABLE-STABLE-2-2 branch. master and that branch differ; in particular we do not have a cut-off date in master (to be 2.3).
Nov 29 2019
I am currently investigating the issue known as CVE-2019-14855 for Debian's LTS version Debian 8 "Jessie" and even Debian 7 "Wheezy".
Nov 25 2019
Nov 24 2019
Nov 6 2019
That is due to the mitigation for CVE-2019-14855. I need to see how to find a more specific mitigation.
Oct 4 2019
See https://minerva.crocs.fi.muni.cz/ for a description of the timing attack.
Aug 29 2019
May 28 2019
May 13 2019
Apr 29 2019
Request for key | Thu, 7 Jun 2018 11:48 +0200 |
Reply from us | Thu, 7 Jun 2018 19:05 +0200 |
Report date | Fri, 8 Jun 2018 09:14 +0200 |
Fix committed | Fri, 8 Jun 2018 11:09 +0200 |
Announcement and release | Fri, 8 Jun 2018 15:41 +0200 |
Jun 14 2018
Thanks.
So what I remembered was 1 year and 1 month off the real EOL date.
Jun 13 2018
Here is our announcement: https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html
Informed Debian security team about our change of libgcrypt.
A new installer for GnuPG with Libgcrypt 1.8.3 is now available.
Releases are now available. Next task is to build a new GnuPG Windows installer.
1.8.3 and 1.7.10 are now released. Announcement will follow later the day.
Pushed fixes to the repository at 16:00+0900 (09:00+0200). It's 0700Z.
In master, it's
commit 9010d1576e278a4274ad3f4aa15776c28f6ba965 Author: NIIBE Yutaka <gniibe@fsij.org> Date: Wed Jun 13 15:28:58 2018 +0900
1.8.3 has not yet been released and thus there is no NEWS entries and there can't be a 1.8.3 tag. You are right that the README still says 1.7. I'll fix that for 1.8.3. Why do you think maintenance of 1.7 stopped; the AUTHORS file and the new EOL statements on the download page say that we are going to maintain it until 2019-06-30.
Jun 12 2018
Publication is planned for the 13th, 1500Z
Jun 11 2018
I just noticed, that a tag for Libgcrypt 1.8.3 seems to be missing: https://dev.gnupg.org/source/libgcrypt/tags/LIBGCRYPT-1.8-BRANCH/
Jun 9 2018
Jun 8 2018
Unfortunately 2.2.8 does not build with older libgpg-error versions. Commit rG18274db32b5dea7fe8db67043a787578c975de4d should fix this.
2.2.8. with a fix has been released. Announcement
[Better use the gnupg tag. Specific versions end up on the workboard and there may only be one.]
@dkg can you please take this up with Debian and other distros? See the commit for a brief description.